IV CSM CS UNIT-V Notes (Full)
IV CSM CS UNIT-V Notes (Full)
In the global environment with continuous network connectivity, the possibilities for
cyberattacks can emanate from sources that are local, remote, domestic or foreign. They could be
launched by an individual or a group. They could be casual probes from hackers using personal
computers (PCs) in their homes, hand-held devices or intense scans from criminal groups.
PI is information that is, or can be, about or related to an identifiable individual. It includes any
information that can be linked to an individual or used to directly or indirectly identify an individual.
Most information the organization collects about an individual is likely to come under “PI”
category if it can be attributed to an individual. For an example, PI is an individual’s first name or
first initial and last name in combination with any of the following data:
A case in point is the infamous “Heartland Payment System Fraud” that was uncovered
in January 2010. This incident brings out the glaring point about seriousness of “insider attacks.
In this case, the concerned organization suffered a serious blow through nearly 100 million
credit cards compromised from at least 650 financial services companies. When a card is used
to make a purchase, the card information is trans- mitted through a payment network.
Yet another incidence is the Blue Cross Blue Shield (BCBS) Data Breach in October
2009 the theft of 57 hard drives from a BlueCross BlueShield of Tennessee training facility puts
the private information of approximately 500,000 customers at risk in at least 32 states.
The two lessons to be learnt from this are:
1. Physical security is very important.
2. Insider threats cannot be ignored.
A key message from this discussion is that cybercrimes do not happen on their own or
in isolation. Cybercrimes take place due to weakness of cybersecurity practices and “privacy”
which may get impacted when cybercrimes happen.
The key challenges from emerging new information threats to organizations are as follows:
1. Industrial espionage: There are several tools available for web administrators to
monitor and track the various pages and objects that are accessed on their website.
2. IP-based blocking: This process is often used for blocking the access of specific IP
addresses and/or domain names.
3. IP-based “cloaking”: Businesses are global in nature and economies are interconnected.
4. Cyberterrorism: “Cyberterrorism” refers to the direct intervention of a threat source
toward your organization’s website.
5. Confidential information leakage: “Insider attacks” are the worst ones. Typically, an
organization is protected from external threats by your firewall and antivirus solutions.
Reflecting on the discussion in the previous sections brings us to the point that
cybercrimes cost a lot to organizations.
Fig: Cost of cybercrimes.
When a cybercrime incidence occurs, there are a number of internal costs associated
with it for organizations and there are organizational impacts as well.
Detection and recovery constitute a very large percentage of internal costs. This is
supported by a benchmark study conducted by Ponemon Institute USA carried out with the sample
of 45 organizations representing more than 10 sectors and each with a head count of at least 500
employees.
The internal costs typically involve people costs, overhead costs and productivity losses.
The internal costs, in order from largest to the lowest and that has been supported by the benchmark
study mentioned:
1. Detection costs.
2. Recovery costs.
3. Post response costs.
4. Investigation costs.
5. Costs of escalation and incident management.
6. Cost of containment.
• The consequences of cybercrimes and their associated costs, mentioned
1. Information loss/data theft.
2. Business disruption.
3. Damages to equipment, plant and property.
4. Loss of revenue and brand tarnishing.
5. Other costs.
• There are many new endpoints in today’s complex networks; they include hand-held
devices.
Again, there are lessons to learn:
1. Endpoint protection: It is an often-ignored area but it is IP-based printers, although they
are passive devices, are also one of the endpoints.
2. Secure coding: These practices are important because they are a good mitigation control to
protect organizations from “Malicious Code” inside business applications.
3. HR checks: These are important prior to employment as well as after employment.
4. Access controls: These are always important, for example, shared IDs and shared laptops
are dangerous.
The most often quoted reasons by employees, for use of pirated software, are as follows:
There are tools to protect organization’s bandwidth by stopping unwanted traffic before
it even reaches your Internet connection.
Use of mobile handset devices in cybercrimes. Most mobile communication devices for
example, the personal digital assistant
Exposures to sensitive PI and confidential business information are possible if due care
is not taken by organizations while using the mode of “social media marketing.”
There are other tools too that organizations use; industry practices indicate the following:
1. Twitter is used with higher priority to reach out to maximum marketers in the technology
space and monitor the space.
2. Professional networking tool LinkedIn is used to connect with and create a communityof
top executives from the Fortune 500.
3. Facebook as the social group or social community tool is used to drive more traffic to
Websense website and increase awareness about Websense.
4. YouTube (the video capability tool to run demonstrations of products/services, etc.) is used
to increase the brand awareness and create a presence for corporate videos.
5. Wikipedia is also used for brand building and driving traffic.
The social and interactive aspect of online activity is known as social computing. The phrase may be
interpreted in contrast to personal computing, which refers to the activities of single users.
Blogs, wikis, Twitter, RSS, instant messaging, multi-gaming, and open source development are just a few
examples of social computing. It also includes social networking and social bookmarking sites. The
concept of Web 2.0 can be interpreted as the architecture for applications that support its processes. The
term “social computing” is somewhat of a misnomer. It should not be implied that social computer
applications are the same as artificial intelligence programs such as socially intelligent computing. The
computer is required to exhibit social capabilities and make the person using it feel more socially engaged
when they are not.
BENEFITS OF SOCIAL COMPUTING
Social networking allows organizations to do many things, including disseminating information among its
various users, keeping them up to date on new knowledge and experience, reducing interruptions, and
connecting them with the best experts for particular needs.
The notion of “social computing” refers to increasing knowledge access speed. In addition, it allows for a
wide range of information to be shared through interactions with numerous people. By connecting people
and thus lowering the cost of communication, computer technology improves communication among
many users. The methodology improves user performance and efficiency, increasing access to specialists.
Users obtain a better performance and greater efficiency due to this method.
Social computing reduces traveling expenses since it is linked to the internet process, lowering labor and
travel costs. As employee satisfaction rises, so does its role in improving performance and quality of
service.
EXAMPLES OF SOCIAL COMPUTING
Social computing uses computers and software to create communities around shared interests. All of these
examples and blogs, wikis, Twitter, RSS, instant messaging, multiplayer gaming, open-source
development, and social networking and social bookmarking sites are all forms. Web 2.0 is closely linked
to the notion of social computing.
Many less obvious kinds of social computing are accessible to us today. Consider eBay, where buyers can
leave user reviews of sellers and their responses. Look to Amazon, where you may now rate the reviewer
rather than only the product.
There are three kinds of spheres and their characteristics are as follows:
1. User sphere: Here data is stored on users’ desktops, PCs, laptops, mobile phones, Radio
Frequency Identification (RFID) chips, etc. Organization’s responsibility is to provide access to
users and monitor that access to ensure misuse does not happen.
2. Recipient sphere: Here, data lies with recipients: servers and databases of network providers,
service providers or other parties with whom data recipient shares data.
3. Joint sphere: Here data lies with web service provider’s servers and databases. This is the in
between sphere where it is not clear to whom does the data belong.
➔ Protecting People’s Privacy in the Organization
The costs associated with cybercrimes. A key point in that discussion is that people perceive
their PI/SPI to be very sensitive. From privacy perspective, people would hate to be monitored in
terms of what they are doing, where they are moving.
In the US, Social Security Number is a well-established system/mechanism for uniquely
identifying all American citizens; however, similar thoughts are now emerging in India. The UID
Project was started by Government of India and is running through an agency called Unique
Identification Authority of India (UIDAI) based on the similar concept.
Fig: Anonymity by web proxy.
Chapter 9
Cybersecurity:
Organizational Implications
The possibilities for cyberattacks can emanate from sources that are local, remote, domestic or
foreign. They could be launched by an individual or a group. They could be casual probes from
hackers using personal computers (PCs) in their homes, hand-held devices or intense scans from
criminal groups (Fig. 1).
The internal costs typically involve people costs, overhead costs and productivity losses (Fig. 2):
Guidelines for Internet Usage, Safe Computing Guidelines and Computer Usage
Policy
Recognize the need for proactively protecting company’s identity when online. Anonymizer
effectively mitigates threats with their identity protection and information assurance solutions;
however, there are risks too associated with “Anonymizers”. In view of the cyberthreats, it
becomes cardinally important for organizations to develop Safe Computing Guideline. They are
sometimes referred to as Organizational Guidelines for the Internet Usage or Computer Usage
Policy. Policies are always important as they provide an objective and direction for
implementation.
Cyber Security by Nina Godbole/Sunit Belapure
Copyright 2011 Wiley India Pvt. Ltd. All rights reserved.
Developing an Organizational Policy for Computer Usage
A “computer usage policy” should address the following elements:
1. Mission Statement
2. Introduction
3. Internet Safety
4. Confidentiality
5. User Responsibilities
6. Disciplinary Action for Privacy Violation and Disclaimer
7. Miscellaneous
Incident Handling
Handling of any type of service disruption or interruption.
The act of violating an explicit or implied security policy.
An adverse event in an information system, and/or network, or the threat of the occurrence of
such an event.
Any adverse event which compromises some aspect of computer or network security.
An occurrence in a system that is relevant to the security of the system (event).
Cyber Security
Protecting information, equipment, devices, computer, computer resource, communication
device and information stored therein from unauthorized access, use, disclosure, disruption,
modification or destruction.
“Event” and “adverse events” are the two related terms to be noted. An event is an observable
occurrence in a system or network. All events may not call for a countermeasure unless they are
“adverse events” which sometimes are referred to as “risk events.” Adverse events are events that
result in negative consequence.