1 INFORMATION SECURITY PRINCIPLES Flashcards

(139 cards)

1
Q

Information security

A

InfoSec, is the practice of protecting information and information systems from unauthorised access, use, disclosure, disruption, modification or destruction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

acts/policies for privacy

A

General Data Protection Regulation (GDPR), the Data Protection Act (DPA) and artificial intelligence (AI) privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PSNI Data Breach Aug 2023

impacts

Measures

A

NI Police service personal info 10,000+ officers & staff. Freedom of Information request- sensitive info spreadsheet mistakenly sent out names/ranks/locations of employees. RISK TO LIFE.

urgent measures: relocating officers, enhancing security protocols

Impacts: immediate increase in personal risk, safety concerns. Public trust & less confidence in PSNI’s ability to safeguard. INTERNAL REVIEW, improved training. Influenced policies and procedures data management/protection.

£750,000 fine

Highlighted: vulnerabilities in data handling, robust infosec practice, data protection inadequacies, need for SIMPLE and PRACTICAL-TO-IMPLEMENT policies/procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Security

A

protective & defensive

enabler of business objectives & ability to function

prevents loss

should never be considered as just technical – governance, physical, policy, procedure and people also

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Information

A

Information can be defined as ‘data endowed with meaning and purpose

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

UK cyber attack stats

A

In the past 12 months in the UK, 50 per cent of organisations and around 32 per cent of charities reported having experienced some form of cybersecurity breach or attack.

Over 91 per cent of these related to phishing attacks, with employees receiving fraudulent emails or landing on fraudulent websites.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

CIA triad

A

basic framework for developing security policies and controls

balanced/effective security posture ALONGSIDE people, processes and technology

Confidentiality, Availability, Integrity

Each principle supports the other/overlaps:
data integrity supports confidentiality and availability,
availability ensures integrity and confidentiality measures can be effectively applied

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CIA: Confidentiality

Maintained

loss of confidentiality

A

*trying to make sure data is kept private and secret
*access to information must be controlled
*people not authorised cannot access/see data
* Ensure by strict policies, logging/monitoring

EXAMPLE: only HR can access employee files/info (unless granted specifically, such as audit or senior management)

  • weak passwords=human error or inadequate security
  • passwords written/placed nearby
  • MAINTAIN: labelled & classified data, access control policies, encrypt rest/transit, MFA, training in data handling
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Confidentiality: Maintaining

A

Data should be labelled and classified.
Have access control policies.
Encrypt data both at rest and in transit.
Make use of multi-factor authentication (MFA) and
ensure employees have adequate training in data handling.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CIA: Integrity

Examples
compromised

A
  • making sure data can be trusted and cannot be tampered with
    *Integrity of data is maintained if data is authentic, accurate and reliable

EXAMPLE: third party order/payment notification errors/tampering can cause reputational damage

EXAMPLE: Police website defaced due to unpatched vulnerability impacts public perception

*Intentional: bypass detection systems, change configuration, access controls and logs to allow unauthorised access
*unintentional: carless mistakes, inputing incorrect personal data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Integrity: Maintaining

A

*use hashing, encryption, digital certificates or digital signatures.

  • file monitoring tools (Tripwire) alert people of any changes to files.

*Anti-tampering: hash value of the original compared to the hash value of the downloaded file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Integrity: verifying

A

A method for verifying integrity is called non-repudiation.

something cannot be repudiated or denied

EXAMPLE: employee uses a digital signature when sending emails

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

CIA: Availability

EXAMPLES

Compromised

A

Can have CI without A (if it cannot be accessed when it is required it is no longer available.)

Data must be available for access by those when required,.

Systems, networks and applications must function as and when they are required

EXAMPLE: power outage + no disaster recovery plan= financial loss
EXAMPLE: bank access 24/7 o/w switch banks!

Compromised by:
DoS attack, ransomware where inaccessible,
or
non-malicious availability issue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

non-malicious availability issue

A

non-malicious availability issue is a patch that has not been properly tested and causes a system to fall over and access to data to be lost.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Availability: Maintaining

A

ENSURED BY: redundant networks, servers and applications

cloud used when primary system disrupted/broken

ENHANCE: replacing systems before end-of-life/failure or testing patches

REGAIN: Backups & disaster recovery plans after incident

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Asset

A

An item of value to stakeholders

Tangible or intangible

value determined by stakeholders from loss concerns across entire system lifecycle. Such concerns include but are not limited to organisation or mission concerns. NIST 800-160

Important: have process to identify, classify and maintain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Tangible Asset

A

e.g. a physical item such as hardware, firmware, computing platform, network device or other technology component

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Intangible asset

A

e.g. humans, data, information, software, capability, function, service, trademark, copyright, patent, intellectual property, image or reputation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Issues with asset identification/classification/maintenance

A
  • diverse set of software/hardware from different vendors

*Lack of control: diverse subsidiares/branches/third-parties hard to regulate group & difficult to regulate & mandate single software/hardware baseline

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

asset hardware

A

Hardware can include servers, workstations and network devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

asset software

A

Software can include operating systems, applications, firmware and files.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

All assets once located should be…

A

valued and are best based on loss scenarios.

You can classify information and use a matrix to help visualise each loss scenario.

Scenarios can also consider the potential impact of a loss of confidentiality, integrity or availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Threat, vulnerability, risk and impact

A

critical to Information Assurance IA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Threat

A

Threat: A potential cause of an unwanted incident, which may result in harm to a system or organisation. ISO/IEC 27000

prevent or reduce

e.g crash car: harm linked to speed, higher speed =higher likelihood severe injury. Reduction of speed=reduction of harm

Cause harm if exploits a vulnerability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Vulnerability
A weakness of an asset or control that can be exploited by one or more threats. ISO/IEC 2700 Weakness IF exploited COULD cause unwanted effects E.g. Car: driving fast on icy roads- might hit patch of ice causing to skid. Driving too fast = threat over patch of ice (vulnerability). Exploited if purposely put water on.
26
Example matrix of loss scenarios
Ransomware attack – Organisation data; Regulatory loss and fines Data theft by employee – Customer data; Competitor gains advantage Data leaked to media – Financial data; Public/media exposure Column Headings: Size of loss Reputation loss Legal and compensation loss Fines Market loss Expected loss
27
Risk
The effect of uncertainty on objectives. ISO/IEC 27000 RISK= combo of threat & vulnerability and applies to asset e.g. threat driving too fast, vulnerability of ice, risk car might skid=likelihood of injury, risk being late for work, risk other cars hit REMOVING either threat or vulnerability REDUCES RISK
28
RISK REDUCTION
REMOVING either threat or vulnerability REDUCES RISK slower car= still risk of skid but impact likely lessened ice melts= risk of skid reduced, not eliminated as can still skid on dry road (worn tyres) risk acceptable
29
Risk gathering diagram showing link between threat, asset and vulnerabilities Venn diagram of them what goes inside intersections
Risk Venn Diagram: Threats, Assets, Vulnerabilities; Threats ∩ Assets = Inherent weakness; Threats ∩ Vulnerabilities = Likelihood & frequency; Assets ∩ Vulnerabilities = Exploitation potential; All 3 overlap = Risk
30
Impact
Impact: The result of an information security incident, caused by a threat, which affects assets. ISO/IEC 13335 impact of risk occurring= potential impact must be considered/managed in IA as impact creates harm that can result in loss small & insignificant impact =accept/no further action only monitoring o/w risk of higher impact on organisation= further actions
31
Information security policy concept
Any organisation should have a policy for its management of IA. short, punchy statement from the chief executive stating that they acknowledge the risks to the organisation resulting from poor information assurance and will take appropriate measures to deal with them. SHOULD include statements that make it clear that the organisation regards risk as a serious issue, with it being discussed at all appropriate meetings, with those with the correct authority and responsibility taking an active interest in it. COMMON for organisation to form an IA/security working group to lead the activities necessary to ensure appropriate levels of assurance within the organisation.
32
The purpose of controls
Controls in the IA sense are those activities that are taken to manage the risks identified. There are four main types of strategic control, although the actual implementation of each of these types can be very varied
33
Risk avoidance
IA control An informed decision not to be involved in, or to withdraw from, an activity in order not to be exposed to a particular risk. ISO Guide 73 Action/s that remove the threat of a certain risk occurring at all E.g. removing old and insecure software PREVENT AVOID TERMINATE
34
Risk reduction
Risk reduction: Action taken to lessen the probability, negative consequences, or both associated with risk. ISO 22300:2018 Action/s reduce the impact or the likelihood of a risk occurring (rarely both) Necessary to use several measures on partnership E.g. contingency measures mitigate effects if risk occurs, PLAN B TREAT MITIGATE
35
Risk transfer
Risk transfer: A form of risk treatment involving the agreed distribution of risk with other parties. ISO Guide 73 Move accountability to another organisation taking responsibility for future risk management although the original organisation still owns the risk. SHARE INDEMNITY INSURANCE Contracts stating financial impact of risk occurring borne by third party Liquidated damages insurance policy covers costs of rectifying results of a risk not take away the impact. E.g. REPUTATION damage still
36
Risk acceptance:
Risk acceptance: The decision to accept a risk. ISO Guide 73 Senior management accepts not practical/sensible for no further action other than MONITORING Reasons: the likely impact of a risk is too small; The likelihood of a risk occurring is too small; the cost of appropriate measures >> financial impact of the risk occurring; risk outside the organisation’s direct control Within RISK APPETITE TOLERATE Not doing nothing
37
Risk appetite
organisation’s risk appetite, which determines the level of risk the organisation is prepared to accept Risk acceptance relates to risk appetite
38
Identity
Identity: Information that unambiguously distinguishes one entity from another one in a given domain. ISO/IEC 24760-1 who access enables audit trails track specific changes assign confidence to changes identified assets uniquely
39
Authentication
Authentication: The provision of assurance of the claimed identity of an entity. ISO/IEC 15944-6 individual is who they say they are identity confirmed to level of confidence appropriate for the task DOB or tokens, biometrics, detailed data checks
40
Authorisation
Authorisation: The right or permission that is granted to a system entity to access a system resource. ISO/TR 22100-4 system of information retrieval needs method of authorisation= clear which asses access and type of access authorisation varies dep on org. requirements, individual, asset type etc. someone has authority to approve
41
Accountability
Accountability: The property that ensures that the actions of an entity can be traced uniquely to the entity. ISO/IEC 21827 action on infromation system/assurance management system holds individual ACCOUNTABLE for action may delegate work to others but retains accountability
42
Audit
Audit: The review of a party’s capacity to meet, or continue to meet, the initial and ongoing approval agreements as a service provider. ISO 15638-15 formal/informal checking of records ensure anticipated activities *identify gaps in functionality *note trends for problem resolution/identification *identify misuse of info *identify inappropriate use of authorisation and thus identify unauthorised activity
43
Compliance
Compliance: Meeting or exceeding all applicable requirements of a standard or other published set of requirements. ISO/TR 19591 system/process complies with defined/expected operating procedure SHOULD be independently audited to achieve certification against a standard, legal or regulatory framework whole org compliant with recognised standard for IA or individual users compliant
44
getting rid of risk
An organisation will always have to tolerate some level of risk, the only thing that we can achieve is the reduction through mitigation or avoidance to an acceptable level. Phil Larner, principal information assurance manager, Leidos (personal communication
45
Professional bodies CISMP
Professional bodies, such as the Chartered Institute of Information Security (CIISec) (previously the Institute of Information Security Professionals (IISP) that was set up in 2006 in the UK), have helped to raise the profile very significantly CISM then Information Systems Audit and Control Association (ISACA) Certified in Risk and Information Systems Control® (CRISC®), and for those wanting to move into management with five years’ experience, the ISACA Certified Information Security Manager® (CISM®) or ISC2 Certified Information Systems Security Professional (CISSP), which is a blend of technical and information security aimed more at those in senior technical or management roles. Certifications like these are expensive but often cited as requirements in the job description for cybersecurity management type roles.
46
INFORMATION SECURITY PROFESSIONALISM AND ETHICS
General awareness of the work done by information assurance professionals (as distinct from IT security professionals) is gradually growing as organisations become increasingly complex with more and more information being managed and processed. staff most important asset << the information the organisation holds and uses effectively that has become its most important asset.
47
career triad
EKE: enthusiasm, knowledge and experience. one alone not enough A certification should never be undertaken just for the ‘badge’. It should be taken to gain knowledge and support personal development and career aspirations.
48
Critical duties of a security professional
In the UK it may be that to view certain materials you need to gain security clearance, or Developed Vetting in the case of military or government positions.
49
disciplinary proceedings
Unauthorised Disclosure; Sharing info without owner’s consent; May lead to dismissal; NDAs now common across all sectors.
50
bottom line of all assurance is ____
TRUST without it impossible to operate Trust in Assurance; Trust enables operations; Level of trust shapes controls; Assurance pros must be fully trustworthy; No compromise allowed.
51
ISMS
Information security management system (ISMS): Part of the overall management system, based on an organisation risk approach, used to establish, implement, operate, monitor, review, maintain and improve information security. ISO 12812-2. one stop shop for all info for IA within organisation if need to go looking for docs/policies/practices in assurance LIKELY not BOTHER NO ONE STOP SHOP= REDUCTION in level of assurance! Policies, standards, procedures ,roles and responsibilities, technology and controls, PDCA cycle
52
Policy should be in one place and secure
organisations make info freely and easily available as possible, practical and necessary security rules controlling it? some policy more secure with need-to-know but in general everyone should be able to access easily and quickly
53
QUANTUM VIEW SCENARIO
new start-up supporting quantum computing & quantum-resistant cryptography. Reputation around security so can bid for work with gov agencies. Effective IA system needed.
54
OUTLINE WHY WE NEED IA 3 THREATS to business 3 VULNERABILITIES 3 RISKS IA system manages QUANTUM VIEW SCENARIO new start-up supporting quantum computing & quantum-resistant cryptography. Reputation around security so can bid for work with gov agencies. Effective IA system needed.
IA NEEDED FOR: 1)PROTECTION OF SENSITIVE INFO *Confidentiality (sensitive business data, customer info and intellectual property protected from unauthorised access) *Integrity (safeguards accuracy/consistency of data, unauthorised individuals do not alter info) *Availability (ensure info/systems accessible when needed, avoid disruptions to business operations) 2)COMPLIANCE LEGAL/REG. REQUIREMENTS laws/regulations/standards require stringent information security measures such as GDPR Data Protection Act 3)Manage risks proactively 4)Build trust with clients and partners 5)Respond effectively to incidents 6)Support business continuity 7)Gain competitive advantage ----------------- THREATS: Three Threats (from Chapter 1 themes) Malicious Insider – Employees with privileged access may misuse information. Advanced Persistent Threats (APTs) – Sophisticated, targeted cyber attacks from nation-states or competitors. Supply Chain Compromise – Third-party vendors may introduce vulnerabilities or leak sensitive data. VULNERABILITIES: ⚠️ Three Vulnerabilities Lack of Formal IA Policy – Without clear governance, controls may be inconsistent or weak. Inadequate Staff Awareness – Employees may mishandle sensitive data or fall for phishing. Unsecured Development Environments – R&D systems may lack proper access controls or encryption. 📉 Three Resulting Risks Loss of Government Trust – Breach or mishandling of data could disqualify the business from public sector contracts. Intellectual Property Theft – Competitors or attackers could steal quantum cryptography innovations. Reputational Damage – Any incident could undermine the company’s credibility in a security-critical market.
55
SECURITY IS
AN ENABLER OF BUSINESS
56
Information security:
Preservation of confidentiality, integrity and availability of information; in addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved. ISO 19092
57
Senior manager concerned about IA
IA not only IT manager or the security officer but for the whole organisation. All staff members of any organisation, regardless of its nature, its organisation, its location or any other factor, should be concerned about IA. personal or wider view of the effective, continued operation of the organisation
58
IA
Information assurance (IA): The confidence that information systems will protect the information they carry and will function as they need to, when they need to, under the control of legitimate users. UK Cabinet Office Accomplished by Physical, technical and administrative controls
59
What is encompassed by IA?
IA encompasses not only digital but also analogue or physical form These protections apply to data in transit, both physical and electronic forms, as well as data at rest in various types of physical and electronic storage facilities.
60
Information systems
Information systems include any means of storing, processing or disseminating information, including IT systems, media and paper-based systems.
61
adding in Assurance
Assurance should not be viewed as an ‘add-on’ to be included only if there is the time and the money to do it. It has to be built in to organisation processes at all stages if it is to be truly effective. While it might be possible in some areas to add in security measures at the last moment (an extra lock on a door or an additional staff security check, for example), they will usually cost more and be less effective than if they had been added at the appropriate time earlier in the design process.
62
Different organisation models and their impact on security REMOTE TRANSACTIONS
increased use of technology that has enabled organisation to be transacted remotely rather than in person enables direct access to suppliers (e.g. flights, cars, investments); Reduces need for intermediaries; Increases individual & organisational security risks.
63
Different organisation models and their impact on security UK SHIFT FROM MANUFACTURING
The UK has shifted from manufacturing to service and financial industries; Service industries rely heavily on technology and information; Security risks have increased due to higher data volumes and exposure factory issues with security of ICSs
64
Different organisation models and their impact on security SERVICE INDUSTRY
In the service industry, the availability of information has increased dramatically; This transformation is compared to the impact of the steam engine or electricity; It has liberated the industry but made securing information more difficult and more important
65
Different organisation models and their impact on security GLOBALISATION
Organisations now operate across multiple countries and move sensitive data globally; IA must ensure integrity, authorised access, and proof of delivery; Local legislation affects how data must be handled in each region.
66
Different organisation models and their impact on security INTERNET BASED THREATS
Online trading exposes organisations to ransomware, DoS attacks, and website tampering; These threats can damage reputation, finances, and public trust; Security controls must address both external and internal risks. trusting strangers
67
Different organisation models and their impact on security Insider Threats
Disillusioned employees or activists may steal, delete, or alter critical data; Such incidents are often kept quiet to avoid reputational damage; Client databases and financial records are common targets.
68
Different organisation models and their impact on security lost/stolen
ensitive data has been lost from laptops stolen from parked cars; Mobile devices like phones and tablets are easy targets for attackers; BYOD introduces risks when personal devices access organisational data
69
Different organisation models and their impact on security CLOUD STORAGE & DEFENCE
Cloud-based storage means data may reside anywhere globally; Defence in breadth considers all connected systems as potential attack vectors; Defence in depth uses layered security based on data sensitivity
70
Different organisation models and their impact on security DIRECT TRADE
Direct consumer-to-manufacturer trade increases exposure to unreliable services; Just-in-time operations depend on accurate and timely data flow; System outages can cause serious financial losses.
71
Defence in breadth
Defence in breadth means considering all connected systems when assessing security; Attackers may exploit weaker links like suppliers or advisors to access core systems; Security must extend beyond the organisation to include trusted third parties
72
Defence in Depth
Defence in depth uses multiple layers of security to protect sensitive systems; Security measures increase in complexity and strength as data becomes more critical; Attackers must overcome several barriers to reach high-value assets.
73
COSTS OF CYBER BREACHES
Cost of Cyber Breaches DCMS Cyber Security Breaches Survey 2024: Average direct cost of a cyber-attack on large organisations = £15,330; Indirect costs like reputational damage and productivity loss are not included.
74
Impact of Organisational Change
Organisations must adapt rapidly to survive in a climate of constant change; Practices acceptable last week may no longer be suitable today; Assurance systems must be flexible but not weakened; Greater flexibility should lead to stronger security and better risk management.
75
Balancing cost and impact of security with the reduction in risk
Never risk free effective management reduce to acceptable level can be excessively expensive BALANCE cost/impact of risk if it occurs and cost of measures to reduce likelihood or impact no extravagant measures if risk limited e.g. insurance policy costs may offset gain or be too expensive. Insurance transfers financial impact but not impact on reputation & public opinion
76
Maintaining currency
of risk countermeasures Defined + planned /= shelved waiting for risk may not be valid/change effectiveness over time RISK MANAGEMENT + MAINTENANCE of actions is continual and iterative process
77
risk management and maintenance
risk management, and the maintenance of the consequential actions taken, is a continual and iterative process that must not be allowed to wither through lack of action or misplaced belief that the situation will not change.
78
Information security as part of company policy
Assurance or security not add on include from start inclusion of assurance as part of the operational policy of the organisation is the only cost-effective way of covering the issues adequately.
79
similarities between IA and health and safety issues
IA is not just the info security manager’s job; Like health & safety, it must involve everyone; Top-down commitment is essential; Without senior management support, IA will fail.
80
Policy, standards, guidelines and procedures documentation
A policy alone is meaningless without supporting standards, guidelines, and procedures; Documentation must be clear, concise, and readable — not thousands of pages; Procedures should be accessible (e.g. desk cards, checklists for operators); Covers both digital and physical assets, including staff-held knowledge. e.g. filing cabinets cleared before disposal
81
Security as an enabler delivering value rather than cost
Effective IA reduces risks like data loss, corruption, or unauthorised access; reduce probability of risk occurring Helps justify investment through reduced impact and improved efficiency; Countermeasures and standards promote best practices and orderly operations; Security adds value- not just cost.
82
Security culture within an organisation
IA worthless without security conscious people aware of threats and dangers, how relevant they are to them and their data, and how to use the systems to make sure that the information assets are protected IMPORTANT to PROACTIVELY LEAD from the TOP by example for strategic direction assurance incidents mostly accidents> maliciously
83
information security policy document
signed by the chief executive or equivalent, which says words to the effect of: it must state that security is a high priority and everyone is responsible; Staff must follow policy when dealing with colleagues, suppliers, and customers; Uncertainty or suspicion must be reported to the information security manager.
84
Security Awareness
interesting and relatable SHOULD BE programme of training for all employees, and it should be included as part of their induction training programme too Security culture needs ongoing awareness programmes; Training must be relatable, engaging, and part of induction; Explain specific risks and legal consequences; Cover confidentiality, integrity, availability, and non-repudiation; Track training for refreshers and legal proof of due diligence.
85
Codes of conduct example
obligations placed upon employees regarding IA: confidentiality, integrity and availability
86
CODES OF CONDUCT e.g. CIA
means of expressing the ethics and standards of the organisation examples of the kind of behaviour expected of employees in their dealings with each other and other people, be they customers, suppliers or anyone else. guidance on accepting and declaring the receipt of gifts/not offering, no alcohol ‘Gifts should be accepted when it would cause offence to refuse, but they must be declared to the organisation at the first opportunity. prize in an annual raffle or prize-giving
87
recording training
record of assurance awareness training – who, when and what – as it has several uses. First, it allows the identification of when refresher training is required, for example, due to the passage of time or changes to risks or the law. Second, it could prove very useful in the event of legal action by helping to prove due diligence.
88
gifts in code of conduct
SOCIAL ENGINEERING LINKS- information access to assets or damage organisation using social behaviour of staff e.g. meme emails can contain malicious code Banning gifts reduced threat
89
Acceptable use policies
end-user code of practice document defines standard for the use of employee information and communications systems by employees adjunct to the contract of employment to protect both the organisation and the individual from the actions of others. vicarious liability document can also help to protect staff from harassment or malpractice by employers and other employees
90
vicarious liability
In law an organisation can be held accountable for the actions of employees defence: show due diligence in informing & educating employees not to break law or relevant regulations
91
document defines standard for the use of employee information and communications systems by employees REQUIRMENTS
ACCEPTABLE USE POLICIES management must make clear level of infringement (e.g. misconduct, gross misconduct) for each offence; Disciplinary steps must be clear and documented; Staff should be consulted on document to ensure fairness and understanding; Include policy briefing in induction training for full awareness.
92
Employment issues and employee rights
right to privacy and right to know what information is held about them by the enterprise (GDPR allows Subject Access Requests for individuals) (EU employees have right to know type and scale of monitoring carried out by enterprise and why- communicated about extent of monitoring in IA policies/employment privacy notice) May need to gain individual consent ASSESMENT OF MOMITORING STRATEGY SHOULD BE CARRIED OUT CARE with PERSONAL
93
ASSESMENT OF MOMITORING STRATEGY SHOULD BE CARRIED OUT
to demonstrate that the monitoring techniques that are being used are justified, are not excessive and meet legal requirements. employee rights
94
If monitoring tools detect information that is clearly personal, =
Then care must be taken not to violate the individual’s right to privacy. Employers must not access personal emails or accounts without consent; Operational needs (e.g. accessing info during leave) must respect privacy; Staff should remove personal data from IT systems before leaving; Balancing access and privacy is essential.
95
COVERT MONITORING
vs privacy rules covert monitoring is rarely justified, excepted if clear grounds for criminal activity/malpractice Internal investigations ->employment tribunal or court case information collected must meet legal requirements e.g UKs Freedom of Information Act
96
PRIVACY
barriers and boundaries to protect individuals from unwanted interference or monitoring FUNDAMENTAL RIGHT essential personal details processed and used appropriate manner following legal requirements within a country
97
Do you need individual permission for personal data?
Laws and regulation allow individuals to give permission or remove permission to those who require our personal data, with some exceptions around law enforcement and intelligence services, such as within the Regulation of Investigatory Powers Act (RIPA) 2000,
98
Transferring information between countries
Privacy Laws restrict between countries EU and UK GDPR states personal information must not be transferred to countries that do not have such similarly strict rules. Certain countries, such as Argentina, Canada, New Zealand and Switzerland, have already shown (at the time of writing) that they operate a data protection model which is comparable to the GDPR model, and there are no restrictions with these countries. More countries may follow suit over time. For other countries, safeguards need to be considered to enable trans-border data flows to take place legally. This includes any data sovereignty laws, which are common in Africa.
99
GDPR, MAY 2018
UK law information privacy regulation as part of the EU privacy and human rights laws. Large fines up to 4% revenue or 18 million against violators of privacy and security standards Google £42 million fine failed to make consumer data processing statements easily accessible to its users BA £20 million after hackers harvested the personal data of about 400,000 people
100
GDPR seven data processing principles
**Lawfulness** **fairness** & **transparency ** Data must be processed legally and openly. **Purpose limitation** – Data collected for specific, legitimate purposes only. **Data minimisation ** – Only data necessary for the purpose should be collected. **Accuracy** – Data must be kept accurate and up to date. **Storage limitation ** – Data kept no longer than necessary. **Integrity and confidentiality (security)** – Data must be secure against unauthorised access or loss. **Accountability** – The controller is responsible for and must demonstrate compliance.
101
GDPR seven data processing principles Lawfulness, fairness and transparency
LAWFULLNESS personal data processed lawfully, legitimate reason for collecting/processing, such as consent from data subject FAIRNESS data processing must be fair for those individuals, data subjects should not be misled about how their data is used TRANSPARENCY Data subjects informed about how data collected, used, stored and shared. Clear accessible info provided to individuals about data processing activities
102
GDPR seven data processing principles Purpose limitation
Personal data should be collected for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those purposes. Organisation clearly define why collecting data, ensure only used for that purpose
103
GDPR seven data processing principles Data minimisation
The data collected should be adequate, relevant and limited to what is necessary in relation to the purposes for which it is processed. Organisations should not collect more data than they need for their specific purpose.
104
GDPR seven data processing principles ACCURACY
Personal data must be accurate and, where necessary, kept up to date. Inaccurate data should be erased or rectified without delay. Organisations must take reasonable steps to ensure the accuracy of the data they hold and process.
105
GDPR seven data processing principles Storage limitations
Personal data should be kept in a form that permits identification of data subjects for no longer than is necessary for the purposes for which the data is processed. Organisations should establish retention periods and securely delete or anonymise data once it is no longer needed.
106
GDPR seven data processing principles INTEGRITY & CONFIDENTIALITY (SECURITY)
Personal data must be processed in a manner that ensures appropriate security of the data, including protection against unauthorised or unlawful processing, accidental loss, destruction or damage. This requires implementing suitable technical and organisational measures to safeguard the data.
107
GDPR seven data processing principles ACCOUNTABILITY
The data controller is responsible for, and must be able to demonstrate compliance with, the other GDPR principles. This means organisations need to take responsibility for the data they process and be able to show how they comply with data protection regulations. This involves maintaining records of processing activities, conducting data protection impact assessments and having data protection policies in place.
108
GDPR.eu outlines the most important elements as
PERSONAL DATA DATA PROCESSING DATA SUBJECT DATA CONTROLLER DATA PROCESSOR
109
DATA CONTROLLER
The person who decides why and how personal data will be processed. If you are an owner or employee in your organisation who handles data, this is you.
110
DATA PROCESSOR
A third party that processes personal data on behalf of a data controller. The GDPR has special rules for these individuals and organisations.
111
DATA SUBJECT
The person whose data is processed. These are your customers or site visitors.
112
DATA PROCESSING
Any action performed on data, whether automated or manual. The examples cited in the text include collecting, recording, organising, structuring, storing, using, erasing … so basically anything.
113
PERSONAL DATA
Personal data is any information that relates to an individual who can be directly or indirectly identified. Names and email addresses are obviously personal data. Location information, ethnicity, gender, biometric data, religious beliefs, web cookies and political opinions can also be personal data. Pseudonymous data can also fall under the definition if it is relatively easy to identify someone from it.
114
gdpr brexit
Following Brexit (when the UK left the European Union), GDPR is now GDPR EU and GDPR UK, which sits alongside an amended version of the Data Protection Act 2018
115
DPA 2018
The Data Protection Act 2018 came into force on 25 May 2018 and updates UK data protection law to align with the GDPR. comprehensive coverage to protect personal data and creates a specific data protection regime for the intelligence services, which is based on the standards in the modernised Convention 108 (the Council of Europe Convention for the Protection of Individuals Regarding Automatic Processing of Personal Data).
116
Scope of DPA 2018
The Act applies to all organisations processing personal data in the UK, including both automated and manual processing. The Act introduces four regimes: processing within GDPR scope, outside GDPR scope, by law enforcement, and by intelligence services
117
Purpose of DPA 2018
The Act aims to protect individuals’ personal data and give them rights over how their data is used. The previous Data Protection Act was outdated and did not account for modern technologies like social media and big data.
118
DPA
PRIMARY OBJECTIVE: ENSURE PROTECTION OF PERSONAL DATA OF INDIVIDUALS (DATA SUBJECTS) to provide them with certain rights concerning data. Applies to any entity that processes personal data within the UK, including both automated and manual data processing.
119
What does the DPA introduce into data protection?
4 distinct data protection regimes focusing on the regulation of personal data for specific type or category of data processing *within the scope of the GDPR; *outside the scope of the GDPR; *by competent authorities for law enforcement purposes; and *by the intelligence services.
120
DPA OVERVIEW
* certain organisations required to appoint DATA PROTECTION OFFICER *DPA 2018 places restrictions on personal data outside EEA *personal data processed lawfully, fairly and transparently *consent, contract performance, legal obligation, vital interests, public tasks and legitimate interests *
121
DPA MANDATES
Data protection principles mandate that data must be processed lawfully, fairly and transparently, collected for specified, explicit, and legitimate purposes, adequate, relevant, and limited to what is necessary, accurate and kept up to date, retained only for as long as necessary, and processed securely. An organisation must demonstrate compliance with these principles, implement appropriate technical and personnel measures and adopt data protection by design and by default. The Act includes additional provisions related to special categories of personal data, such as data on racial or ethnic origin, political opinions, religious beliefs, trade union membership, genetics, biometrics, health, sex life or sexual orientation, requiring higher protection. It also includes provisions related to the handling of criminal convictions and offence data.
122
Who enforces DPA 2018 compliance
The Information Commissioner’s Office (ICO) is the supervisory authority responsible for enforcing the DPA 2018. The ICO has the power to issue fines for non-compliance, which can be significant (up to £17.5 million or 4 per cent of the annual global turnover, whichever is higher).
123
AI ACT
May 2024 EU Council EU Artificial Intelligence Regulation aims to establish comprehensive legal framework for AI categorise AI systems based on risk levels impose stricter requirements for high risk AI applications emphasise TRANSPARENCY, ACCOUNTABILITY and robust data governance practices to protect individuals’ privacy and rights.
124
AI PRIVACY
considerations and practices involved in ensuring that AI systems respect and protect the privacy of individuals. This encompasses a range of issues, including data collection, data usage, data sharing and data protection HOW COLLECTED & HOW USED ANONYMISATION & DE-IDENTIFICATION removing PII from datasets transparency and explainability in AI security measures such as encryption, access controls and regular audits Compliance with GDPR mandatory AI ACT ensure AI systems don't perpetuate biases/discriminate - regular audits for bias and mitigation strategies user control over own data is ethical>legal compliance
125
PII
personally identifiable information Anonymisation and de-identification techniques can protect privacy by removing personally identifiable information (PII) from datasets, but these must be carefully applied to prevent re-identification.
126
AI discrimination
ensure AI systems don't perpetuate biases/discriminate - regular audits for bias and mitigation strategies
127
develop a business case for implementation of an ISMS justification QUANTUM VIEW SCENARIO new start-up supporting quantum computing & quantum-resistant cryptography. Reputation around security so can bid for work with gov agencies. Effective IA system needed.
1. Risk Management Assess current risks: Help the board identify internal risks (e.g. staff mishandling data) and external threats (e.g. cyber-attacks, data breaches). Analyse impact: Explain the potential consequences of these risks, including financial loss, operational disruption, and reputational damage. Mitigation through ISMS: Show how an ISMS provides a structured framework to reduce these risks by improving controls, monitoring, and response capabilities. 2. Cost–Benefit Analysis Implementation costs: Present the financial and resource costs of setting up and maintaining the ISMS, including training, technology, and staff time. Cost of inaction: Highlight the risks of not implementing an ISMS, such as fines, legal costs, and reputational harm from data breaches. Return on investment (ROI): Demonstrate how the ISMS can lead to long-term savings, improved efficiency, and increased trust from customers and partners. 3. Regulatory Compliance and Reputation Legal obligations: Clarify how an ISMS supports compliance with laws and standards like GDPR and ISO 27001, helping avoid penalties. Reputation management: Emphasise how proactive security measures build stakeholder confidence and protect the organisation’s public image. Certification benefits: Explain the strategic value of formal ISMS certification, which can enhance credibility and open access to regulated markets.
128
1. If the accuracy of information is a major concern, which of the following would reflect that this is covered effectively? a. Confidentiality. b. Integrity. c. Availability. d. None of these.
B
129
2. When a user logs onto a computer system and is asked for their mother’s maiden name, which of the following aspects is the system ensuring? a. Accountability. b. Authorisation. c. Authentication. d. Applicability.
C
130
3. ISO/IEC 27001 is an international standard for information security. Which organisation is responsible for its maintenance? a. The British Standards Institute. b. The government of the country in which it has been implemented. c. The European Union Standards Committee. d. The International Organization for Standardization.
D
131
4. How should the implementation of an information assurance system be seen within an organisation? a. As a problem for the IS department only to sort out. b. As a problem on which the senior managers should make a decision but then leave it to others to deal with. c. As a whole organisation issue. d. As an issue where outside expertise is the best solution.
C
132
5. How should the use of an international standard for information security be viewed by senior managers within an organisation? a. As a good idea if there was the right organisation environment in which to implement it. b. As implementing best practice. c. As overkill unless there are very serious problems with assurance. d. As the pet idea of the IT director who thinks it will look good to shareholders in the next annual report of the organisation.
B
133
THREAT VULNERABILITY examples
something that may happen that might cause unwanted consequence dark large clouds mean threat of rain but rain may not be a threat for every individual- may be opportunity without umbrella is a vulnerability risk is combo of threat of rain and vulnerability of not carrying umbrella e.g ruined hairstyle combo of circumstances lead to more serious risks Impact could be wet coat
134
GANT SCENARIO ENDANGERED FROG THREE THREATS
Three threats These are areas where there is a potential for some adverse consequences if this threat should arise. In this scenario three threats might be as follows. 1. Information about members might be accessed by unauthorised people. 2. Information about the habitats of the Natterjack toad might be used by those who are not inclined to support its ongoing existence. 3. The website might be compromised with unofficial messages added to it
135
GANT SCENARIO ENDANGERED FROG THREE VULNERABILITIES
These are weaknesses in the system that might allow a threat to materialise. In this scenario and building on the threats given above, the vulnerabilities might be as follows. 1. The records of the members are maintained in a variety of ways including paper and unreliable computer systems. 2. The information about the toads’ habitats is maintained on an old internet-based server with very limited assurance in place. 3. There is no firewall between the website server and the internet
136
GANT SCENARIO ENDANGERED FROG THREE RISKS
Three risks There is a large number of risks resulting from the threats and vulnerabilities listed above. Three of them might be as follows. 1. There is a risk that unscrupulous property developers might gain access to the personal details of members of GANT and take action against them or their property. 2. There is a risk that a habitat of the Natterjack toad might be destroyed by someone who is not interested in the existence of the animal. There is a risk that someone might gain access to the code of the GANT website and change the messages to information that is offensive to those interested in nature conservancy
137
GANT SCENARIO The cost-effectiveness or cost–benefit analysis for such an implementation would include many areas. Three of the most significant, following on from the suggestions given
1. Members of GANT could be injured, or their families and property adversely affected in some way. The cost of protecting the members and their families would be excessive and could not be found through the membership of GANT alone. 2. The cost of reintroducing Natterjack toads into the wild after their habitat has been destroyed would be very considerable. This could be the consequence (impact) of allowing unauthorised access to the details of the toads’ habitats. 3. GANT relies very heavily on the goodwill of other nature conservancy groups and donations from interested commercial companies. If they were embarrassed by the content of the website, they might reduce or withdraw their support for an organisation they saw as unprofessional and poorly organised. This could be devastating for the existence of GANT
138
threat vs vulnerability
A threat is something bad that could happen. It’s the potential danger—like a hacker, malware, or phishing email. A vulnerability is a weakness that makes it easier for a threat to succeed.
139
threat exploits a vulnerability??
threat exploits a vulnerability — not the other way around. 🔹 Simple Explanation: Threat = the danger (e.g. hacker, malware, phishing email) Vulnerability = the weakness (e.g. untrained staff, outdated software) The threat takes advantage of the vulnerability to cause harm.