Chapter 9 - Cyber Security
Chapter 9 - Cyber Security
Cybersecurity:
Organizational Implications
The possibilities for cyberattacks can emanate from sources that are local, remote, domestic or
foreign. They could be launched by an individual or a group. They could be casual probes from
hackers using personal computers (PCs) in their homes, hand-held devices or intense scans from
criminal groups (Fig. 1).
The internal costs typically involve people costs, overhead costs and productivity losses (Fig. 2):
Guidelines for Internet Usage, Safe Computing Guidelines and Computer Usage
Policy
Recognize the need for proactively protecting company’s identity when online. Anonymizer
effectively mitigates threats with their identity protection and information assurance solutions;
however, there are risks too associated with “Anonymizers”. In view of the cyberthreats, it
becomes cardinally important for organizations to develop Safe Computing Guideline. They are
sometimes referred to as Organizational Guidelines for the Internet Usage or Computer Usage
Policy. Policies are always important as they provide an objective and direction for
implementation.
Cyber Security by Nina Godbole/Sunit Belapure
Copyright 2011 Wiley India Pvt. Ltd. All rights reserved.
Developing an Organizational Policy for Computer Usage
A “computer usage policy” should address the following elements:
1. Mission Statement
2. Introduction
3. Internet Safety
4. Confidentiality
5. User Responsibilities
6. Disciplinary Action for Privacy Violation and Disclaimer
7. Miscellaneous
Incident Handling
Handling of any type of service disruption or interruption.
The act of violating an explicit or implied security policy.
An adverse event in an information system, and/or network, or the threat of the occurrence of
such an event.
Any adverse event which compromises some aspect of computer or network security.
An occurrence in a system that is relevant to the security of the system (event).
Cyber Security
Protecting information, equipment, devices, computer, computer resource, communication
device and information stored therein from unauthorized access, use, disclosure, disruption,
modification or destruction.
“Event” and “adverse events” are the two related terms to be noted. An event is an observable
occurrence in a system or network. All events may not call for a countermeasure unless they are
“adverse events” which sometimes are referred to as “risk events.” Adverse events are events that
result in negative consequence.