You’ll remember from Week 1 that, when thinking about computer security, it helps to think of information as an asset. Just like money in the bank, it is valuable, possibly irreplaceable, and crucially it can be lost or stolen.
When we think about our assets, traditionally we consider tangible things such as money, property, machinery and so on. Increasingly, it is recognised that information itself is an asset, crucial to adding value. In today’s digital world, it is increasingly apparent that information is the most important asset, for both businesses or individuals – just think of the value of music to a media company or a games program to a video game company.
Considering information as an asset allows us to create strategies for protecting information and minimising the consequences of any disaster.
Case study: San Francisco Medical Center
In October 2002, the University of California, San Francisco Medical Center received an email message from someone who claimed to be a doctor working in Pakistan and who threatened to release patient records onto the internet unless the money owed to her was paid. Several confidential medical transcripts were attached to the email.
UCSF staff were mystified, they had no dealings in Pakistan and certainly did not employ the person who sent the email. The Medical Center began an immediate investigation, concentrating on their transcription service, which had been outsourced to Transcription Stat, based in nearby Sausalito. It transpired that Transcription Stat farmed out work to 15 sub-contractors scattered across America. One of these sub-contractors was Florida-based Sonya Newburn, who in turn employed further sub-contractors, including Tom Spires of Texas. No one at Transcription Stat realised that Spires also employed his own sub-contractors, including the sender of the email. The sender alleged that Spires owed her money, and had not paid her for some time.
Newburn eventually agreed to pay the $500 that the email sender claimed was owed to her. In return the sender informed UCSF that she had had no intention of publicising personal information and had destroyed any records in her care. Of course, there is no way to prove that the records have actually been destroyed.
Naturally, you would not wish your own medical records to be publicised: they should be secure. This threat cost the organisation little in monetary terms, but how much in reputation? Just what is a reputation worth? Or, to put it another way, how much should you invest in information security to protect a reputation?
Information in this context is a very broad term and it applies to large and small organisations as well as to individual users. So a doctor’s surgery’s information assets would include things such as personal medical records, telephone contact lists, its emails as well as personal information about its employees. A manufacturing company will have electronic records of order books, correspondence with suppliers and customers, staff records, bank references and so on.
Risk management
Information security risk management assesses the value of information assets belonging to an individual or an organisation and, if appropriate, protects them on an ongoing basis.
Information is stored, used and transmitted using various media; some information is tangible, paper for example, and it is relatively straightforward to put in place strategies to protect this information – such as locking filing cabinets, or restricting access to archives.
On the other hand, some information is intangible, such as the ideas in employees’ minds, is much harder to protect. Companies might try to secure information by making sure their employees are happy, or by legal means such as having contracts that prevent people leaving and going to work for a rival.
Imperatives and incentives
Information security risk management considers the process in terms of two factors: imperatives or incentives. Imperatives are pressures that force you to act. Incentives are the rewards and opportunities that arise from acting.
The imperatives for information security arise from legislation and regulation. The Computer Misuse Act and the Data Protection Act, are examples of legislative imperatives. Regulatory imperatives include standards such as the Payment Card Industry Data Security Standard (PCI-DSS), which specifies how merchants should secure all card transactions.
The most important incentive is trust. People and organisations are more likely to work with other people and organisations who have secured their information. Establishing this trust requires that the parties involved examine each others’ information security practices to ensure that there are adequate safeguards to protect the information. One way of doing this is to show that the organisation has satisfied the requirements of standards such as PCI-DSS or the ISO27000 family of standards for designing and implementing information security management systems.
Risk analysis
We use the term risk in everyday speech, but a whole science has grown up around the identification, analysis and management of risks. You will now look briefly at how to apply some of these ideas to identifying, assessing and reducing risks that affect the security of your information.
Risk can be thought of as the chance of adverse consequences or loss occurring. Generally, risks can be identified and the likelihood of them occurring assessed.
The main technique for a qualitative analysis of risk is to construct a likelihood–impact matrix in which the likelihood and impact of each risk event are assessed against a defined scale and then plotted on a two-dimensional grid. The position on the grid represents the relative significance of each risk. The simplest matrix is formed by classifying both likelihood and impact as either high or low, which leads to a 2 by 2 grid. This basic classification of a high or low value leads to the following rank order for tackling risks:
- high-impact, high-likelihood risks
- high-impact, low-likelihood risks
- low-impact, high-likelihood risks.
Risk analysis in practice
Let’s think about a practical example of how qualitative risk analysis could be done for Lewis’s information assets.
Any successful attack on email, banking details and password information will have high impact and there is a high likelihood that these attacks will be targeted due to their high value. So they should go in the high-high box.
An attack that affects the study materials or digital photographs will have high impact, but there is a low likelihood given that these assets have minimal financial value to an attacker. These should be placed in the high-low box.
An attack on the digital music or videos will have low impact, since these can be downloaded again easily. However, this will have high likelihood because these assets can be easily copied and sold, this making these attractive to an attacker. Therefore, they go in the low-high box.
Conducting a risk analysis is an important part of protecting your information assets. Following Lewis’s example consider your own list of information assets and carry out a similar risk analysis to determine the impact and likelihood of attack for each type of information.
© The Open University
Its a great pleasure reading your article.Its full of information I am looking for and I love to post a comment that "The content of your post is awesome" Great work. It was really good to know about Managed Security Florida. Keep up the good work. Thanks for the sharing such a nice article.
ReplyDeleteThanks for the detailed blog.The blog post is informative,It consist of valuable information about what a audience basically look forward.You may also visit to the Global Tech Council to get the best deal that you are looking foward.
ReplyDeleteVisit -Information security certificate online
I accept there are numerous more pleasurable open doors ahead for people that took a gander at your site.
ReplyDeleteISO 27001 Certification Bahrain
ReplyDeleteThanks for the detailed blog.The blog post is informative.I really appreciate the blog post.For more information viist to global tech council to get the buy best deal.Global tech Council is leading a team of highly skilled professionals to deliver online cybersecurity training and certification at the best price. We deliver high benchmark service that matches the need of the customer and fit in the budget. If you are looking further for a rewarding career in the cybersecurity field then visit Global tech Council www.globaltechcouncil.org website in just one click and get the best deal.
Visit- Cyber security professional
Nice article please do visit my website for cyber security certification training program
ReplyDeleteI visited your blog you have shared amazing information, i really like the information provided by you, You have done a great work. I hope you will share some more information regarding Cyber Security. I appreciate your work.
ReplyDeleteCyber security certificate
Great Post. Thank you for sharing.
ReplyDeleteNice information…very well and clearly explained… Thank you so much for this valuable information…Great work keep doing. Looking for the best cyber security services in Hyderabad at affordable prices contact cyanous software solutions.
ReplyDeleteBest cyber security services in Hyderabad
Best software & web development company in Hyderabad
Thanks for sharing such valuable information. Data security & cyber security company offers managed IT services in Lexington, KY. A dedicated team of engineers remotely monitor and manage the security and health of your servers and workstations.
ReplyDeletecloud backup services
Thanks for making this blog helpful for me! I am doing online Cyber Security Training & Certification I would like to thank for the efforts you have made in writing this post. Thanks for sharing.
ReplyDeleteThis comment has been removed by the author.
ReplyDelete"Your Article is Good
ReplyDeleteCyber Security Services"
This is one of the best blog i have came through. Penetration Testing Expert offers cyber security risk assessment services. Contact us today!
ReplyDeletecyber security solutions
Cyber Security Training Course in Noida
ReplyDelete
ReplyDelete<a href="https://telegra.ph/Learn-Cyber-Security-Training-Course-Effectively-03-02
>Cyber Security training in Gurgaon
</a>
Very nice post! For best and reliable cyber security services and consultancy please contact us at:
ReplyDeletebest cybersecurity services
security and management solutions
advanced cybersecurity consultancy
Nice Article, Please do visit my website cyber security company
ReplyDeleteCyber Security Course in Noida
ReplyDeleteCyber Security Training in Noida
ReplyDeleteWonderful Post. This is a very helpful post. These are the useful tips for. I would like to share with my friends. To know more about me visit here MS-101T02: Microsoft 365 Compliance Management
ReplyDeleteHi Thanks for sharing nice information, If you are searching Cyber Security Training in USA, Please visit here.
ReplyDeleteLooking for the Best Cybersecurity Team to protect your business against cyber threats? Syscom is a Cybersecurity Solution Provider in Dubai, UAE
ReplyDeleteFor More Information Visit Here -- Cybersecurity solutions
Cyber Security Institute in Noida
ReplyDeleteCyber Security Training Institute in Noida
ReplyDeleteGreat article shared about Cyber security. Cyber security is one of the most talked-about topics these days. With the advancement of technology, the internet has made its place on the top of the priority list for everyone. A few months ago I have taken the services from SAITECH INCORPORATED, which provides an extensive technology solution provider encompassing domains such as cloud computing, hardware and software engineering, cyber security, and more.
ReplyDeleteProtect your business with top-notch cybersecurity solutions and 24/7 monitoring from a trusted Managed Security Services Provider (MSSP).
ReplyDeleteWyDur's Managed Endpoint Security solutions offer advanced protection against cyber attacks. With our cutting-edge technology and experienced team, you can rest assured that your devices and network are fully protected. Trust WyDur to keep your business safe and secure.
Managed Security Services in Hyderabad
Cyber security is much required against threat as most common links are used to attack | http://www.digitaltrackgulf.com has the best Cyber Security solutions for real-time threats.
ReplyDeleteI really liked your blog and I got many information from your blog thank so much for sharing this blog with us. cyber defense services in the UAE also provide assistance in responding to cyber attacks, helping companies to quickly and efficiently recover from a breach. Visit here also…
ReplyDeleteCyber defense services UAE
This is an informative blog. Thank you for sharing it. We provide various exclusive security solutions. Please explore more about DigitalTrack Gulf here Security Solutions in Dubai
ReplyDeleteMany thanks to everyone who made Cybersecurity Awareness .
ReplyDeleteWhat is hacking in cyber security?
ReplyDeleteHacking in cyber security services refers to the practice of exploiting vulnerabilities in computer systems, networks, or software to gain unauthorized access or cause harm. Hackers can use various techniques, such as phishing, malware, or exploiting software bugs, to infiltrate systems. While hacking is often associated with illegal activities, ethical hacking, or "white-hat hacking," is used by cybersecurity professionals to identify and fix security weaknesses to protect against malicious attacks.