Unit-5 Cybersecurity: Organizational Implications: IV-II SEM CSE, Cyber Security Unit - V
Unit-5 Cybersecurity: Organizational Implications: IV-II SEM CSE, Cyber Security Unit - V
Unit-5
In the global environment with continuous network connectivity, the possibilities for
cyberattacks can emanate from sources that are local, remote, domestic or foreign. They could be
launched by an individual or a group. They could be casual probes from hackers using personal
computers (PCs) in their homes, hand-held devices or intense scans from criminal groups.
Most information the organization collects about an individual is likely to come under “PI”
category if it can be attributed to an individual. For an example, PI is an individual’s first name or
first initial and last name in combination with any of the following data:
3. Bank account number, credit or debit card number with personal identification number such
as an access code, security codes or password that would permit access to an individual’s
financial account.
4. Home address or E-Mail address.
Page 1 of 12
CREC
IV- II SEM CSE, Cyber Security Unit - V
private company data by people who are not truthful about their identity or purpose
via “pretexting” (known as social engineering).
A case in point is the infamous “Heartland Payment System Fraud” that was uncovered
in January 2010. This incident brings out the glaring point about seriousness of “insider
attacks. In this case, the concerned organization suffered a serious blow through nearly 100
million credit cards compromised from at least 650 financial services companies. When a card
is used to make a purchase, the card information is trans- mitted through a payment network.
Yet another incidence is the Blue Cross Blue Shield (BCBS) Data Breach in October
2009 the theft of 57 hard drives from a BlueCross BlueShield of Tennessee training facility
puts the private information of approximately 500,000 customers at risk in at least 32 states.
The two lessons to be learnt from this are:
1. Physical security is very important.
A key message from this discussion is that cybercrimes do not happen on their own or
in isolation. Cybercrimes take place due to weakness of cybersecurity practices and “privacy”
which may get impacted when cybercrimes happen.
determine how, when and to what extent information about them is communicated to
other parties.
2. Personal privacy: It is about content filtering and other mechanisms to ensure that the
transmitted is important.
4. Territorial privacy: It is about protecting users’ property for example, the user devices
from being invaded by undesired content such as SMS or E-Mail/Spam messages. The
paradigm shift in computing brings many challenges for organizations; some such key
challenges are described here.
Page 3 of 12
CREC
IV- II SEM CSE, Cyber Security Unit - V
The key challenges from emerging new information threats to organizations are as follows:
1. Industrial espionage: There are several tools available for web administrators to
monitor and track the various pages and objects that are accessed on their website. 2.
IP-based blocking: This process is often used for blocking the access of specific IP
addresses and/or domain names.
3. IP-based “cloaking”: Businesses are global in nature and economies are
interconnected. 4. Cyberterrorism: “Cyberterrorism” refers to the direct intervention of a
threat source toward your organization’s website.
5. Confidential information leakage: “Insider attacks” are the worst ones. Typically, an
organization is protected from external threats by your firewall and antivirussolutions.
Page 4 of 12
CREC
IV- II SEM CSE, Cyber Security Unit - V
When a cybercrime incidence occurs, there are a number of internal costs associated
with it for organizations and there are organizational impacts as well.
Detection and recovery constitute a very large percentage of internal costs. This is
supported by a benchmark study conducted by Ponemon Institute USA carried out with the
sample of 45 organizations representing more than 10 sectors and each with a head count of at
least 500 employees.
The internal coststypically involve people costs, overhead costs and productivity losses.
The internal costs, in order from largest to the lowest and that has been supported by the
benchmark study mentioned:
1. Detection costs.
2. Recovery costs.
3. Post response costs.
4. Investigation costs.
5. Costs of escalation and incident management.
6. Cost of containment.
∙ The consequences of cybercrimes and their associated costs, mentioned 1.
Information loss/data theft.
2. Business disruption.
Page 5 of 12
CREC
IV- II SEM CSE, Cyber Security Unit - V
5. Other costs.
∙ There are many new endpoints in today’s complex networks; they include hand-held
devices.
Again, there are lessons to learn:
1. Endpoint protection: It is an often-ignored area but it is IP-based printers, although they
Access controls: These are always important, for example, shared IDs and shared laptops are
dangerous.
The most often quoted reasons by employees, for use of pirated software, are as follows:
Page 6 of 12
CREC
IV- II SEM CSE, Cyber Security Unit - V
Page 7 of 12
CREC
IV- II SEM CSE, Cyber Security Unit - V
There are tools to protect organization’s bandwidth by stopping unwanted traffic before
it even reaches your Internet connection.
Use of mobile handset devices in cybercrimes. Most mobile communication devices for
example, the personal digital assistant
Page 8 of 12
CREC
IV- II SEM CSE, Cyber Security Unit - V Although the use of social media marketing site is rampant,
there is a problem related to “social computing” or “social media marketing” – the problem of
privacy threats.
Exposures to sensitive PI and confidential business information are possible if due care
is not taken by organizations while using the mode of “social media marketing.”
and social and business-networking. Companies believe that this, in turn, may increase their
“page rank” resulting in increased traffic from leading search engines.
3. To reap other potential revenue benefits and to minimize advertising costs because social
media complements other marketing strategies such as a paid advertising campaign. 4. To build
credibility by participating in relevant product promotion forums and responding to potential
customers’ questions immediately.
Page 9 of 12
CREC
IV- II SEM CSE, Cyber Security Unit - V 5. To collect potential customer profiles. Social media sites
have information such as user profile data, which can be used to target a specific set of users for
advertising
There are other tools too that organizations use; industry practices indicate the following:
1. Twitter is used with higher priority to reach out to maximum marketers in the technology
space and monitor the space.
2. Professional networking tool LinkedIn is used to connect with and create a community of
top executives from the Fortune 500.
3. Facebook as the social group or social community tool is used to drive more traffic to
Websense website and increase awareness about Websense.
4. YouTube (the video capability tool to run demonstrations of products/services, etc.) is used
to increase the brand awareness and create a presence for corporate videos.
5. Wikipedia is also used for brand building and driving traffic.
There are three kinds of spheres and their characteristics are as follows:
1. User sphere: Here data is stored on users’ desktops, PCs, laptops, mobile phones, Radio
Frequency Identification (RFID) chips, etc. Organization’s responsibility is to provide access to
users and monitor that access to ensure misuse does not happen.
2. Recipient sphere: Here, data lies with recipients: servers and databases of network providers,
service providers or other parties with whom data recipient shares data.
3. Joint sphere: Here data lies with web service provider’s servers and databases. This is the in
between sphere where it is not clear to whom does the data belong.
🡺 Protecting People’s Privacy in the Organization
The costs associated with cybercrimes. A key point in that discussion is that people
perceive their PI/SPI to be very sensitive. From privacy perspective, people would hate to be
monitored in terms of what they are doing, where they are moving.
In the US, Social Security Number is a well-established system/mechanism for uniquely
identifying all American citizens; however, similar thoughts are now emerging in India. The UID
Project was started by Government of India and is running through an agency called Unique
Identification Authority of India (UIDAI) based on the similar concept.
Page 10 of 12
CREC
IV- II SEM CSE, Cyber Security Unit - V
of 12
CREC
IV- II SEM CSE, Cyber Security Unit - V The categories of guiding procedures and activities that
3. Training;
In the context of forensic readiness discussion, the key activities are presented. These
are the activities that an organization should consider if they wish to be forensically ready.
∙ Benefits of Being a Forensically Ready Organization
lawsuit.
2. Comprehensive evidence gathering can be developed as a deterrent to the insider threat 3. In
case of a major incident, a rapid and efficient investigation can be conducted and actions can be
taken with a view to minimal disruption to the business.
4. Reduction in cost and time of an internal investigation through a systematic approach to
evidence storage.
5. A structured approach to evidence storage can reduce the costs of any court-ordered
assets.
8. It can improve and facilitate the interface to law enforcement, if involved. 9.
Page 12 of 12
CREC