Cyber - Security - Practices
Cyber - Security - Practices
Save your data and files on the secondary drive (ex: d:\).
Maintain an offline backup of your critical data.
Keep your Operating System and BIOS firmware updated with the latest
updates/patches.
Install enterprise antivirus client and ensure that the antivirus client is updated
with the latest virus definitions, signatures and
patches.
Use authorized and licensed software only
Ensure that proper security hardening is done on the systems When you leave
your desk temporarily, always lock/log-off
When you leave office, ensure that your computer and printers are properly
shutdown.
Keep your printer’s software updated with the latest updates/patches.
Setup unique passcodes for shared printers.
Use a Hardware Virtual Private Network (VPN) Token for connecting privately
to any IT assets located in the Data Centers.
Keep the GPS, Bluetooth, NFC and other sensors disabled on your computers
and mobile phones. They maybe enabled only when required.
Download Apps from official app stores of google (for android) and apple (for
iOS).
Before downloading an App, check the popularity of the app and read the user
reviews. Observe caution before downloading any app which has a bad
reputation or less user-base, etc
Use a Standard User (non-administrator) account for accessing your
computer/laptops for regular work.
Observe caution while opening any shortened uniform resource locator (URLs)
(ex: tinyurl.com/ab534/). Many malwares and phishing sites abuse URL
shortened services.
Observe caution while opening any links shared through SMS or social media,
etc., where the links are preceded by exciting offers/discounts, etc., or may
claim to provide details about any current affairs. Such links may lead to a
phishing/malware webpage, which could compromise your device.
Report suspicious emails or any security incident to [email protected]
Various U.S. & U.K. Laws for Data Privacy and Data Security
United States
• California Consumer Privacy Act (CCPA): Grants California residents rights
regarding their personal data.
• Health Insurance Portability and Accountability Act (HIPAA): Protects
sensitive patient health information.
• Federal Trade Commission (FTC) Act: Prohibits unfair or deceptive acts
related to data privacy.
United Kingdom
• General Data Protection Regulation (GDPR): A comprehensive data
protection regulation that applies to all EU member states and the UK.
• Data Protection Act 2018: Works alongside GDPR to regulate data processing
in the UK.
• Privacy and Electronic Communications Regulations (PECR): Governs
electronic communications and privacy.
Data privacy and security are two interconnected yet distinct areas that play a
crucial role in protecting individuals’ and organizations’ sensitive information.
Understanding their importance, advantages, and disadvantages is essential in
navigating the complex landscape of digital data protection. By adhering to relevant
laws and implementing robust measures, organizations can safeguard data while
fostering trust and compliance in an increasingly digital world.
1. Preventive Controls
Definition: Preventive controls are proactive measures implemented to prevent
security incidents before they occur. Their primary goal is to reduce vulnerabilities
and deter potential threats.
Key Examples:
• Firewalls: Act as barriers between trusted and untrusted networks, filtering
traffic based on predetermined security rules.
• Access Controls: Ensure that only authorized users have access to sensitive
data and systems. This includes role-based access control (RBAC) and least
privilege principles.
• Encryption: Protects data by converting it into a coded format that can only be
read by those with the correct decryption keys, securing both data at rest and in
transit.
• Security Awareness Training: Educates employees about security risks and
best practices, helping to cultivate a security-conscious culture and reduce the
likelihood of human errors.
Importance:
Preventive controls are crucial for minimizing risk, as they aim to eliminate threats
before they can exploit vulnerabilities.
2. Detective Controls
Definition: Detective controls are designed to identify and alert organizations to
security incidents as they occur, allowing for timely responses.
Key Examples:
• Intrusion Detection Systems (IDS): Monitor network traffic for suspicious
activities and generate alerts when potential threats are detected.
• Security Information and Event Management (SIEM) Systems: Aggregate
and analyze security data from across the organization to provide real-time
insights into security incidents.
• Log Monitoring: Involves reviewing logs generated by various systems to
detect anomalies and potential breaches.
Importance:
Detective controls are vital for early detection of security incidents, enabling
organizations to respond quickly to mitigate damage.
3. Corrective Controls
Definition: Corrective controls are implemented to address and remediate security
incidents after they have occurred, helping organizations recover and prevent future
incidents.
Key Examples:
• Incident Response Plans: Outline the procedures to follow when a security
breach occurs, ensuring a structured and effective response.
• Data Backups: Regularly backing up data ensures that it can be restored in the
event of data loss or corruption due to a security incident.
• Patch Management: The process of applying updates to software and systems
to fix vulnerabilities and enhance security.
Importance:
Corrective controls are essential for minimizing the impact of security incidents and
restoring normal operations as swiftly as possible.
4. Physical Controls
Definition: Physical controls protect the physical environment where data and
systems are housed. They prevent unauthorized physical access to facilities and
equipment.
Key Examples:
• Security Cameras: Monitor physical premises to deter unauthorized access
and document incidents.
• Locks and Access Control Systems: Limit access to sensitive areas within a
facility to authorized personnel only.
• Environmental Controls: Systems such as fire suppression, HVAC, and power
supply management that protect physical assets from environmental hazards.
Importance:
Physical controls are critical for protecting the infrastructure that supports information
systems, ensuring both data security and operational continuity.
5. Administrative Controls
Definition: Administrative controls are policies, procedures, and regulations that
govern the overall security posture of an organization.
Key Examples:
• Security Policies: Formal documents that outline an organization’s approach to
information security, including acceptable use, incident reporting, and data
handling.
• Employee Training Programs: Ongoing training sessions that educate
employees about security practices, threats, and their responsibilities in
protecting organizational data.
• Incident Response Protocols: Specific procedures that guide the actions taken
during and after a security incident, ensuring a coordinated response.
Importance:
Administrative controls provide the framework within which other controls operate,
establishing expectations and procedures that help maintain a secure environment.
Importance of Security Controls
• Risk Mitigation: Security controls help identify and reduce vulnerabilities,
thereby decreasing the likelihood of data breaches and other incidents.
• Compliance: Many industries are subject to regulatory requirements that
mandate specific security controls. Implementing these measures ensures
compliance with laws and standards.
• Business Continuity: Effective security controls contribute to the resilience of
an organization, ensuring that critical functions can continue during and after a
security incident.
• Trust and Reputation: A strong security posture builds trust with customers
and stakeholders, enhancing the organization’s reputation.
Best Practices for Implementing Security Controls
1. Risk Assessment: Regularly conduct risk assessments to identify
vulnerabilities and prioritize the implementation of security controls based on
potential impact.
2. Layered Security: Employ a defense-in-depth approach by combining
multiple security controls at different layers of the organization’s infrastructure.
3. Regular Updates and Patching: Keep all systems and software up to date to
protect against known vulnerabilities.
4. User Training and Awareness: Educate employees about security best
practices and the importance of adhering to security policies.
5. Incident Response Plan: Develop and maintain a robust incident response
plan to ensure prompt action in the event of a security breach.
6. Monitoring and Auditing: Implement continuous monitoring and regular
audits to assess the effectiveness of security controls and make necessary
adjustments.
Conclusion
Security controls are a critical component of an organization's cybersecurity strategy.
By understanding the different types of security controls and their importance,
organizations can better protect their sensitive information and systems. Implementing
best practices and maintaining a proactive approach to security will not only mitigate
risks but also enhance overall resilience in the face of evolving cyber threats.
Types of E-Commerce
1. Business-to-Consumer (B2C): This is the most common form of e-commerce,
where businesses sell products or services directly to consumers. Examples
include online retailers like Amazon and e-commerce sites of traditional
retailers.
2. Business-to-Business (B2B): In this model, transactions occur between
businesses. Companies sell products or services to other businesses, often in
bulk. Examples include platforms like Alibaba and wholesalers.
3. Consumer-to-Consumer (C2C): This model allows consumers to sell directly
to other consumers, typically through online marketplaces. Platforms like eBay
and Craigslist facilitate these transactions.
4. Consumer-to-Business (C2B): In this model, individuals offer products or
services to businesses. Examples include freelance platforms like Upwork,
where freelancers sell their skills to companies.
5. Government-to-Business (G2B): In this model, government agencies provide
services or information to businesses. This includes procurement and
regulatory services conducted online.
6. Mobile Commerce (m-commerce): A subset of e-commerce that focuses on
shopping through mobile devices. This includes mobile apps and optimized
websites for smartphones and tablets.
Benefits of E-Commerce
1. Convenience: E-commerce allows consumers to shop 24/7 from the comfort of
their homes, making it more convenient than traditional retail.
2. Wider Reach: Businesses can reach a global audience, expanding their
customer base beyond local markets.
3. Cost-Effectiveness: E-commerce often involves lower operational costs
compared to physical stores, allowing for competitive pricing.
4. Personalization: E-commerce platforms can utilize data analytics to offer
personalized shopping experiences, improving customer satisfaction.
5. Scalability: Businesses can easily scale operations, adding new products and
services without the constraints of physical space.
Challenges of E-Commerce
1. Security Concerns: E-commerce transactions involve sensitive customer data,
making security a critical issue. Data breaches and fraud are significant risks.
2. Logistical Issues: Managing inventory, shipping, and returns can be complex,
particularly for small businesses without established logistics networks.
3. Competition: The e-commerce landscape is highly competitive, with many
players vying for consumer attention and loyalty.
4. Customer Trust: Building trust is essential for e-commerce success.
Consumers need assurance that their data is secure and that products will meet
their expectations.
5. Technological Dependence: E-commerce businesses rely heavily on
technology, and any disruptions (such as website outages) can impact sales.