Information security
InfoSec, is the practice of protecting information and information systems from unauthorised access, use, disclosure, disruption, modification or destruction.
acts/policies for privacy
General Data Protection Regulation (GDPR), the Data Protection Act (DPA) and artificial intelligence (AI) privacy
PSNI Data Breach Aug 2023
impacts
Measures
NI Police service personal info 10,000+ officers & staff. Freedom of Information request- sensitive info spreadsheet mistakenly sent out names/ranks/locations of employees. RISK TO LIFE.
urgent measures: relocating officers, enhancing security protocols
Impacts: immediate increase in personal risk, safety concerns. Public trust & less confidence in PSNI’s ability to safeguard. INTERNAL REVIEW, improved training. Influenced policies and procedures data management/protection.
£750,000 fine
Highlighted: vulnerabilities in data handling, robust infosec practice, data protection inadequacies, need for SIMPLE and PRACTICAL-TO-IMPLEMENT policies/procedures
Security
protective & defensive
enabler of business objectives & ability to function
prevents loss
should never be considered as just technical – governance, physical, policy, procedure and people also
Information
Information can be defined as ‘data endowed with meaning and purpose
UK cyber attack stats
In the past 12 months in the UK, 50 per cent of organisations and around 32 per cent of charities reported having experienced some form of cybersecurity breach or attack.
Over 91 per cent of these related to phishing attacks, with employees receiving fraudulent emails or landing on fraudulent websites.
CIA triad
basic framework for developing security policies and controls
balanced/effective security posture ALONGSIDE people, processes and technology
Confidentiality, Availability, Integrity
Each principle supports the other/overlaps:
data integrity supports confidentiality and availability,
availability ensures integrity and confidentiality measures can be effectively applied
CIA: Confidentiality
Maintained
loss of confidentiality
*trying to make sure data is kept private and secret
*access to information must be controlled
*people not authorised cannot access/see data
* Ensure by strict policies, logging/monitoring
EXAMPLE: only HR can access employee files/info (unless granted specifically, such as audit or senior management)
Confidentiality: Maintaining
Data should be labelled and classified.
Have access control policies.
Encrypt data both at rest and in transit.
Make use of multi-factor authentication (MFA) and
ensure employees have adequate training in data handling.
CIA: Integrity
Examples
compromised
EXAMPLE: third party order/payment notification errors/tampering can cause reputational damage
EXAMPLE: Police website defaced due to unpatched vulnerability impacts public perception
*Intentional: bypass detection systems, change configuration, access controls and logs to allow unauthorised access
*unintentional: carless mistakes, inputing incorrect personal data
Integrity: Maintaining
*use hashing, encryption, digital certificates or digital signatures.
*Anti-tampering: hash value of the original compared to the hash value of the downloaded file
Integrity: verifying
A method for verifying integrity is called non-repudiation.
something cannot be repudiated or denied
EXAMPLE: employee uses a digital signature when sending emails
CIA: Availability
EXAMPLES
Compromised
Can have CI without A (if it cannot be accessed when it is required it is no longer available.)
Data must be available for access by those when required,.
Systems, networks and applications must function as and when they are required
EXAMPLE: power outage + no disaster recovery plan= financial loss
EXAMPLE: bank access 24/7 o/w switch banks!
Compromised by:
DoS attack, ransomware where inaccessible,
or
non-malicious availability issue
non-malicious availability issue
non-malicious availability issue is a patch that has not been properly tested and causes a system to fall over and access to data to be lost.
Availability: Maintaining
ENSURED BY: redundant networks, servers and applications
cloud used when primary system disrupted/broken
ENHANCE: replacing systems before end-of-life/failure or testing patches
REGAIN: Backups & disaster recovery plans after incident
Asset
An item of value to stakeholders
Tangible or intangible
value determined by stakeholders from loss concerns across entire system lifecycle. Such concerns include but are not limited to organisation or mission concerns. NIST 800-160
Important: have process to identify, classify and maintain
Tangible Asset
e.g. a physical item such as hardware, firmware, computing platform, network device or other technology component
Intangible asset
e.g. humans, data, information, software, capability, function, service, trademark, copyright, patent, intellectual property, image or reputation
Issues with asset identification/classification/maintenance
*Lack of control: diverse subsidiares/branches/third-parties hard to regulate group & difficult to regulate & mandate single software/hardware baseline
asset hardware
Hardware can include servers, workstations and network devices
asset software
Software can include operating systems, applications, firmware and files.
All assets once located should be…
valued and are best based on loss scenarios.
You can classify information and use a matrix to help visualise each loss scenario.
Scenarios can also consider the potential impact of a loss of confidentiality, integrity or availability.
Threat, vulnerability, risk and impact
critical to Information Assurance IA
Threat
Threat: A potential cause of an unwanted incident, which may result in harm to a system or organisation. ISO/IEC 27000
prevent or reduce
e.g crash car: harm linked to speed, higher speed =higher likelihood severe injury. Reduction of speed=reduction of harm
Cause harm if exploits a vulnerability