Cyber Security Unit 4
Cyber Security Unit 4
Information security is the practice of protecting information by mitigating information risks. It involves
the protection of information systems and the information processed, stored and transmitted by these
systems from unauthorized access, use, disclosure, disruption, modification or destruction. This
includes the protection of personal information, financial information, and sensitive or confidential
information stored in both digital and physical forms. Effective information security requires a
comprehensive and multi-disciplinary approach, involving people, processes, and technology.
Information Security is not only about securing information from unauthorized access. Information
Security is basically the practice of preventing unauthorized access, use, disclosure, disruption,
modification, inspection, recording or destruction of information. Information can be a physical or
electronic one. Information can be anything like Your details or we can say your profile on social media,
your data on mobile phone, your biometrics etc. Thus Information Security spans so many research
areas like Cryptography, Mobile Computing, Cyber Forensics, Online Social Media, etc.
Effective information security requires a comprehensive approach that considers all aspects of the
information environment, including technology, policies and procedures, and people. It also requires
ongoing monitoring, assessment, and adaptation to address emerging threats and vulnerabilities.
Why we use Information Security?
We use information security to protect valuable information assets from a wide range of threats,
including theft, espionage, and cybercrime. Information security is necessary to ensure the
confidentiality, integrity, and availability of information, whether it is stored digitally or in other forms
such as paper documents. Here are some key reasons why information security is important:
1. Protecting sensitive information: Information security helps protect sensitive information from
being accessed, disclosed, or modified by unauthorized individuals. This includes personal
information, financial data, and trade secrets, as well as confidential government and military
information.
2. Mitigating risk: By implementing information security measures, organizations can mitigate the
risks associated with cyber threats and other security incidents. This includes minimizing the risk
of data breaches, denial-of-service attacks, and other malicious activities.
3. Compliance with regulations: Many industries and jurisdictions have specific regulations
governing the protection of sensitive information. Information security measures help ensure
compliance with these regulations, reducing the risk of fines and legal liability.
4. Protecting reputation: Security breaches can damage an organization’s reputation and lead to lost
business. Effective information security can help protect an organization’s reputation by
minimizing the risk of security incidents.
5. Ensuring business continuity: Information security helps ensure that critical business functions
can continue even in the event of a security incident. This includes maintaining access to key
systems and data, and minimizing the impact of any disruptions.
Information Security programs are build around 3 objectives, commonly known as CIA –
Confidentiality, Integrity, Availability.
1. Confidentiality – means information is not disclosed to unauthorized individuals, entities and
process. For example if we say I have a password for my Gmail account but someone saw while I
was doing a login into Gmail account. In that case my password has been compromised and
Confidentiality has been breached.
2. Integrity – means maintaining accuracy and completeness of data. This means data cannot be
edited in an unauthorized way. For example if an employee leaves an organisation then in that case
data for that employee in all departments like accounts, should be updated to reflect status to JOB
LEFT so that data is complete and accurate and in addition to this only authorized person should be
allowed to edit employee data.
1
3. Availability – means information must be available when needed. For example if one needs to
access information of a particular employee to check whether employee has outstanded the number
of leaves, in that case it requires collaboration from different organizational teams like network
operations, development operations, incident response and policy/change management.
Denial of service attack is one of the factor that can hamper the availability of information.
Apart from this there is one more principle that governs information security programs. This is Non
repudiation.
Non repudiation – means one party cannot deny receiving a message or a transaction nor can the
other party deny sending a message or a transaction. For example in cryptography it is sufficient to
show that message matches the digital signature signed with sender’s private key and that sender
could have a sent a message and nobody else could have altered it in transit. Data Integrity and
Authenticity are pre-requisites for Non repudiation.
Authenticity – means verifying that users are who they say they are and that each input arriving at
destination is from a trusted source. This principle if followed guarantees the valid and genuine
message received from a trusted source through a valid transmission. For example if take above
example sender sends the message along with digital signature which was generated using the hash
value of message and private key. Now at the receiver side this digital signature is decrypted using
the public key generating a hash value and message is again hashed to generate the hash value. If
the 2 value matches then it is known as valid transmission with the authentic or we say genuine
message received at the recipient side
Accountability – means that it should be possible to trace actions of an entity uniquely to that
entity. For example as we discussed in Integrity section Not every employee should be allowed to
do changes in other employees data. For this there is a separate department in an organization that
is responsible for making such changes and when they receive request for a change then that letter
must be signed by higher authority for example Director of college and person that is allotted that
change will be able to do change after verifying his bio metrics, thus timestamp with the user(doing
changes) details get recorded. Thus we can say if a change goes like this then it will be possible to
trace the actions uniquely to an entity.
2
There are some potential disadvantages to implementing an information classification system in
an organization’s information security program:
1. Complexity: Developing and maintaining an information classification system can be complex and
time-consuming, especially for large organizations with a diverse range of data types.
2. Cost: Implementing and maintaining an information classification system can be costly, especially
if it requires new hardware or software.
3. Resistance to change: Some employees may resist the implementation of an information
classification system, especially if it requires them to change their usual work habits.
4. Inaccurate classification: Information classification is often done by human, so it is possible that
some information may be misclassified, which can lead to inadequate protection or unnecessary
restrictions on access.
5. Lack of flexibility: Information classification systems can be rigid and inflexible, making it
difficult to adapt to changing business needs or new types of data.
6. False sense of security: Implementing an information classification system may give organizations
a false sense of security, leading them to overlook other important security controls and best
practices.
7. Maintenance: Information classification should be reviewed and updated frequently, if not it can
become outdated and ineffective.
3
1. Cyber threats: The increasing sophistication of cyber attacks, including malware, phishing, and
ransomware, makes it difficult to protect information systems and the information they store.
2. Human error: People can inadvertently put information at risk through actions such as losing
laptops or smartphones, clicking on malicious links, or using weak passwords.
3. Insider threats: Employees with access to sensitive information can pose a risk if they
intentionally or unintentionally cause harm to the organization.
4. Legacy systems: Older information systems may not have the security features of newer systems,
making them more vulnerable to attack.
5. Complexity: The increasing complexity of information systems and the information they store
makes it difficult to secure them effectively.
6. Mobile and IoT devices: The growing number of mobile devices and internet of things (IoT)
devices creates new security challenges as they can be easily lost or stolen, and may have weak
security controls.
7. Integration with third-party systems: Integrating information systems with third-party systems
can introduce new security risks, as the third-party systems may have security vulnerabilities.
8. Data privacy: Protecting personal and sensitive information from unauthorized access, use, or
disclosure is becoming increasingly important as data privacy regulations become more strict.
9. Globalization: The increasing globalization of business makes it more difficult to secure
information, as data may be stored, processed, and transmitted across multiple countries with
different security requirements.
4
Cyber Warfare
Cyber warfare is usually defined as a cyber attack or series of attacks that target a country. It
has the potential to wreak havoc on government and civilian infrastructure and disrupt critical
systems, resulting in damage to the state and even loss of life.
There is, however, a debate among cyber security experts as to what kind of activity constitutes
cyber warfare. The US Department of Defense (DoD) recognizes the threat to national security
posed by the malicious use of the Internet but doesn’t provide a clearer definition of cyber
warfare. Some consider cyber warfare to be a cyber attack that can result in death.
Cyber warfare typically involves a nation-state perpetrating cyber attacks on another, but in
some cases, the attacks are carried out by terrorist organizations or non-state actors seeking to
further the goal of a hostile nation. There are several examples of alleged cyber warfare in
recent history, but there is no universal, formal, definition for how a cyber attack may constitute
an act of war.
7 Types of Cyber Warfare Attacks
Here are some of the main types of cyber warfare attacks.
Espionage
Refers to monitoring other countries to steal secrets. In cyber warfare, this can involve
using botnets or spear phishing attacks to compromise sensitive computer systems before
exfiltrating sensitive information.
Sabotage
Government organizations must determine sensitive information and the risks if it is
compromised. Hostile governments or terrorists may steal information, destroy it, or
leverage insider threats such as dissatisfied or careless employees, or government employees
with affiliation to the attacking country.
Denial-of-service (DoS) Attacks
DoS attacks prevent legitimate users from accessing a website by flooding it with fake requests
and forcing the website to handle these requests. This type of attack can be used to disrupt
critical operations and systems and block access to sensitive websites by civilians, military and
security personnel, or research bodies.
Electrical Power Grid
Attacking the power grid allows attackers to disable critical systems, disrupt infrastructure, and
potentially result in bodily harm. Attacks on the power grid can also disrupt communications
and render services such as text messages and communications unusable.
Propaganda Attacks
Attempts to control the minds and thoughts of people living in or fighting for a target country.
Propaganda can be used to expose embarrassing truths, spread lies to make people lose trust in
their country, or side with their enemies.
Economic Disruption
Most modern economic systems operate using computers. Attackers can target computer
networks of economic establishments such as stock markets, payment systems, and banks to
steal money or block people from accessing the funds they need.
5
Surprise Attacks
These are the cyber equivalent of attacks like Pearl Harbor and 9/11. The point is to carry out
a massive attack that the enemy isn’t expecting, enabling the attacker to weaken their defenses.
This can be done to prepare the ground for a physical attack in the context of hybrid warfare.
Examples of Cyber Warfare Operations
Here are several well-publicized examples of cyber warfare in recent times.
Stuxnet Virus
Stuxnet was a worm that attacked the Iranian nuclear program. It is among the most
sophisticated cyber attacks in history. The malware-detection-and-removal/">malware spread
via infected Universal Serial Bus devices and targeted data acquisition and supervisory control
systems. According to most reports, the attack seriously damaged Iran’s ability to manufacture
nuclear weapons.
Sony Pictures Hack
An attack on Sony Pictures followed the release of the film “The Interview”, which presented
a negative portrayal of Kim Jong Un. The attack is attributed to North Korean government
hackers. The FBI found similarities to previous malware attacks by North Koreans, including
code, encryption algorithms, and data deletion mechanisms.
Bronze Soldier
In 2007, Estonia relocated a statue associated with the Soviet Union, the Bronze Soldier, from
the center of its capital Tallinn to a military cemetery near the city. Estonia suffered a number
of significant cyber attacks in the following months. Estonian government websites, media
outlets, and banks were overloaded with traffic in massive denial of service (DoS) attacks and
consequently were taken offline.
Fancy Bear
CrowdStrike claims that the Russian organized cybercrime group Fancy Bear targeted
Ukrainian rocket forces and artillery between 2014 and 2016. The malware was spread via an
infected Android application used by the D-30 Howitzer artillery unit to manage targeting data.
Ukrainian officers made wide use of the app, which contained the X-Agent spyware. This is
considered to be a highly successful attack, resulting in the destruction of over 80% of
Ukraine’s D-30 Howitzers.
Enemies of Qatar
Elliott Broidy, an American Republican fundraiser, sued the government of Qatar in 2018,
accusing it of stealing and leaking his emails in an attempt to discredit him. The Qataris
allegedly saw him as an obstacle to improving their standing in Washington.
According to the lawsuit, the brother of the Qatari Emir was alleged to have orchestrated a
cyber warfare campaign, along with others in Qatari leadership. 1,200 people were targeted by
the same attackers, with many of these being known “enemies of Qatar”, including senior
officials from Egypt, Saudi Arabia, the United Arab Emirates, and Bahrain.
6
Information Warfare Levels
3 min read
Information warfare refers to the conflict between two Information or more groups in the
information environment. The main purpose of the information warfare is deletion of critical
information. It is performed by insiders, terrorists, hackers, criminals, etc. Target of
information warfare is to gain information superiority.
Information warfare refers to creating chaos by damaging the computer system and resources
that are used to manage the various sector of critical infrastructure. It targets the information
systems that are used to manage the power grids, air traffic control systems,
telecommunications, research and development activities, defence systems, stock exchanges
etc.
Information warfare involves the use and management of information and communication
technology in pursuit of a competitive advantage over an opponent. It results in the loss of data,
illegal exploitation of the communication systems, data manipulation, manipulation of
information system etc. The main motives of information warfare are gaining competitive edge,
revenge, political advantage, military advantage etc.
Information warfare includes the use and abuse of computer system and resources to undermine
the information infrastructure of an adversary. The main objectives of information warfare are
obtaining information of an adversary, causing severe destruction information infrastructure of
a nation and spreading propaganda.
7
DNS attacks
Hacking
2. Information Warfare at Corporate Level
The corporate level information warfare occurs between companies or corporation. It aims at
the information stored or it may target the image or reputation of the company which can be
affected in numerous ways. It attacks on the financial and operational interests of corporations,
government departments, universities and so on. Such attacks include industrial espionage,
theft of services or money and sabotage.
A company can also destroy the database of competitors. Competitor’s corporate computers
are hacked by the industries and all the sensitive and valuable information is stolen.
The methods used for corporate Information Warfare are:
Website defacement attacks
Malware attacks
Removable
DoS (Denial of Service) attacks
DNS attacks
Hacking into competitor’s computer
Semantic attacks
3. Information Warfare at Global Level
Information warfare at the global level occurs between states or countries. It aims at stealing a
national security secret. The main concern in this warfare is terrorism sometimes termed as
Information terrorism.
Global information warfare includes acquiring national security secrets of country and
misusing these secrets. The results of global information warfare are catastrophic.
Common methods which are used for global information warfare are:
1. Website Defacement:
Website defacement refers to unauthorized modification of the content of a website.
2. Semantic Attacks:
Semantic attacks aim at modifying the meaning of the information. This misinformation can
have a great impact.
3. DNS Attacks:
A terrorist group can replace the legitimate IP address associated with a domain name by the
malicious IP address.
Other methods or tools used for global information warfare are:
Removable media
Malware attacks
Hacking
Logic bombs
Keyloggers
8
Cyberattack Recovery Plan
9
comfortable collaborating with people across the organization, and able to add creation, review, and
maintenance of the plan as a core responsibility of their job. Business leaders and managers must also
support this person’s work in order for it to get the attention it needs from the rest of the organization.
2. Identify representatives from each area of the business
Creating a plan that impacts the entire business will require input from every area of the business. Here’s
how to put this step into action:
As a group, identify which tools and data are most critical for each team to do their work, and then
document who has access to those tools and data.
These documents will need to be updated as employees come and go, or move within the organization.
This will require clear and crucial communication between team leads.
These people will also participate in table-top exercises that will allow your business to practice “what
if” scenarios and will test your plan before you actually need it. Make sure to include off-hour contact
information for everyone on the team in case an incident occurs outside of normal working hours.
3. Document your risks
Small business risks could include a multitude of events: natural disasters, a vendor or business partner
shutting down, a ransomware attack, or simply an unfortunate user error.
This is where the full team can help brainstorm the possibilities:
What if a supplier goes out of business?
What if a disgruntled employee deletes a bunch of data before walking out the door?
What if our office closed down after a hurricane?
Talking through what steps you would need to take to recover from each of these will quickly identify
actions to mitigate those risks and what the priority should be.
4. Specify which data, technologies, and tools are most critical
Each department has data and systems they need to function. Accounting needs access to payroll data,
developers need their code repository, sales needs their customer lists, fulfillment needs order
information, etc.
While all of these systems and technologies are important, in the event of a disaster, you can’t fix
everything at once. The disaster recovery team should determine the amount of time the business can
reasonably survive without that system or technology, who “owns” that system, and who will be
responsible for restoring it. All of this information should be added to your disaster recovery document
in step 3.
5. Maintain an inventory of physical assets
Ensure that you keep an updated list of all of the equipment your business uses on a day-to-day basis.
This includes not only computers, servers, printers, phones, and network hardware, but other equipment
such as office furniture, product inventory, shipping supplies, etc.
As you are creating this list, ask yourself: What would I need to go buy if I had to rapidly set up a new
office location somewhere else? And don’t forget to contact your insurance company as you are
developing your list. They will help you understand what specifically you need to track and how they
can help you get up and running post-disaster.
6. Determine where and how critical business information will be backed up
Around 60 percent of all small business data lives on desktops and laptops. If you want to ensure every
important file is covered, then you need a cloud backup solution that includes the following features:
Protection for every computer – Around 60 percent of all small business data lives on desktops and
laptops. If you want to ensure critical data is covered, then you need a solution that automatically
protects data on every laptop and desktop.
10
Taps the benefits of cloud backup – The cloud enables leading data backup providers to offer unlimited
protection. It also provides fast and simple user-driven recovery of important information.
Runs automatically – Your data backup solution should run silently and automatically in the
background without requiring any action by users or impeding their productivity.
Prioritizes easy recovery – You should be able to specify a point-in-time for your restore and recover
your files to any device, without needing a VPN connection.
7. Create a communication plan
When disaster strikes during off-hours, how will you notify employees? Should they report to the office
that day? Should they work remotely or an alternate office location? How will customers and vendor
partners be notified? Who should handle questions from the media? Where will you store/update contact
information for each of these groups?
Not every disaster will merit communication with every constituency, but you should make a plan for
identifying how and when these communications will occur as well as who owns that work.
8. Practice! Practice! Practice!
Have you heard the term “table top exercise” before? It simply refers to your disaster recovery team
sitting around a table and discussing, in detail, how the company will respond to various given scenarios
from your list of possible risks.
11
Business Impact Analysis
Cyber security is a constantly evolving discipline that focuses on protecting sensitive data and critical
infrastructure from malicious or unauthorised access. It encompasses a wide range of defensive
technologies, processes, security solutions and best practices. These are designed to protect networks,
systems, and applications from cyber attacks and ransomware attacks.
However, it is equally important for organisations to conduct Business Impact Analysis to understand
the business disruptions or financial, operational, and legal implications of a potential breach.
BIA is a process that assesses the security risks associated with potential system breakdowns and
identifies resiliency strategies that ensure business continuity during an incident or natural disaster.
By combining cybersecurity measures with comprehensive BIA processes, organisations can aim to
fortify their data against intruders while minimising the effects of any disruption.
It is also important to have an effective Business Continuity Plan to ensure that the organisation bounces
back from a cyber incident with least possible disruption. This continuity plan should also contain
details of resource requirements during a cyber crisis as well as well-defined recovery time objectives.
Several organisations feel that conducting Business Impact Analysis or having a Business Continuity
Plan is complicated and requires heavy investment. This is not always true. By enlisting the help of
expert cybersecurity practitioners like Virtual Cyber Assistants, you can understand how to go about a
BIA and create a fit-for-purpose Business Continuity Plan quite cost effectively.
Why is Cybersecurity Important for Businesses?
Cybersecurity is vital for businesses of all sizes to protect their websites, data, and other digital assets
from malicious threat actors. Cyberattacks on businesses can result in devastating consequences,
including:
The loss of confidential information
Financial losses
Reputational damage
Legal implications
Implementing robust cybersecurity protocols and measures can help businesses safeguard their systems
from such threats by providing strong access control, monitoring system vulnerabilities, and actively
responding to security incidents. Taking proactive steps towards developing a secure cyber environment
is essential for a successful business, as it allows organisations to operate with confidence in the digital
world.
The Benefits of Business Impact Analysis (BIA)
Business impact analysis can be an invaluable tool for businesses of all sizes. By properly assessing the
risks and opportunities associated with a new business venture, companies can weigh the projected
outcomes and determine the best path for their organisation.
Furthermore, business impact analysis is not just helpful for new ventures, but also for existing ones
that require strategic adjustment.
With this practice, businesses can strategically adjust to external demands caused by changes in market
or industry conditions and internal drivers such as budget constraints or changes in staff structure.
Ultimately, engaging in regular business impact analysis enables organisations to stay agile and
competitive over time, regardless of the environment they are operating in.
How to Conduct a Business Impact Analysis?
Conducting a business impact analysis is an important step in uncovering the areas of a company that
can suffer the most from unexpected events. This process should consider aspects such as:
The organisation's structure
12
IT systems
Communication infrastructure
By evaluating each element of the business and understanding its functionality, it becomes easier to
create a contingency plan. Having a successful recovery strategy is key to minimising disruptions. That
is why businesses need to invest in conducting comprehensive business impact analyses regularly and
the flexible services of Virtual Cyber Consultants can be extremely helpful here.
Lastly, create measures to mitigate disruptive events with strategies such as backup plans,
contingencies, and recovery protocols. A well-executed business impact analysis provides invaluable
insight into an organisation’s potential vulnerabilities to external changes or disruptions.
Tips for Improving Your Cybersecurity Posture
Cybersecurity is a growing concern for any business. Improving your cybersecurity posture can be both
cost- and time-effective if you focus on the right steps. Here are some tips to consider:
Know your data: Understand what type of data your organisation holds and where it is stored. It is
especially important to safeguard the contact information of the services and databases you use to
outperform competitors, ranging from lead contact and personal data to writing services,
including Best Essays Education, that you use to generate content for your business.
Have a robust authentication system in place to protect access to sensitive information.
Create strong passwords and use multi-factor authentication processes.
Educate your team on cybersecurity best practices.
Regularly assess the security of third-party systems and software.
Create a robust, effective and fit-for-purpose cyber incident response plan.
Have a ransomware response workflow ready for your team to reference in case of an attack.
Invest in security tools such as firewalls, antivirus, and malware protection.
Monitor the network for suspicious activity or unauthorised access attempts.
Install patches and updates whenever possible to reduce the risk of vulnerabilities.
Develop a backup and disaster recovery plan to ensure data and system.
By following these tips, businesses can improve their overall cybersecurity posture, making them better
equipped to handle any potential threats. Taking the time to analyse the organisation’s processes and
address the vulnerabilities is essential to staying secure in today’s digital environment.
13