Vaguely Related to ETC

Cyber Security

Organizational Implications

Insider Attack : Heartland Payment System Fraud : Keystroke logger was used. They have used company’s payment processing system and 100 million credit cards compromised from the best 650 financial services companies

Insider Attack : Blue Shield Blue Cross : Data Breach, 57 hard drives from facility and 500, 000 customers at risk.

Cybercrime may emerge from local, remote, domestic or foreign sources.

A cybercrime perspective

Security Breach

A security breach is defined as leakage of information, digital data that’s supposed to be private to a person. Whenever this data is compromised, due to malicious or accidental attack the integrity of the data is compromised.

Types of insiders
Cybercrime the flow and connections

Privacy Key Dimensions

  • Informational privacy
  • Personal privacy
  • Communication privacy
  • Territorial privacy

Cost of cybercrime and IPR issues

Conficker Virus : It was a fast spreading virus that targeted MS08-067 in windows operating system. Using pirated software is illegal and breaks IPR’s Copyright Act, but other than that it leaves you open to exploitation in the weaker system as it is not updated.

There was a benchmark study done by Ponemon University where they collected data from 45 organisation which belonged to more than 10 sectors. It was found that the detection and recovery constitutes of the largest amount of internal costs.

Cost to organisation and IPR

Thus there should be protection at endpoints as they can result in lot of cost to the company. Secure Coding is also necessary as to protect the organisation from “Malicious Code”. HR checks can also be really helpful to avoid induction of malicious intruder. Access controls should be given after careful consideration. And Security governance is very very very important.

Cookies

There are two types of cookies, the session cookie and the persistent one

4.2. iPP does not govern the publication of third-party cookies. Please visit the relevant third parties’ website if you want to understand more about these cookies.
4.3. If you do not want to use cookies, you can set your browser so that the storage of cookies is not accepted.
4.4. If you only want to accept our own cookies but not the cookies of our service providers and partners, select the “block third-party cookies” (or similar setting in your browser).

Social media marketing : Security risks and perils for organizations

Best Practices

  • Organisation Wise information systems security policy
  • Configuration/Change control and management
  • Risk assessment and management
  • Standardised software configurations
  • Security awareness and training
  • Contingency and planning
  • Certification and accreditation

Leave a Reply