CS Unit-V
CS Unit-V
UNIT-V
Cyber security: Organizational Implications
Introduction, Cost of Cybercrimes and IPR issues, Web Threats for organizations, Social media marketing,
Social Computing and the associated challenges for organizations, Protecting People’s privacy in the
organization, Organizational guidelines for internet usage, Safe Computing guidelines and Computer usage
policy
Organizational Implications-Introduction
In the global environment with continuous network connectivity, the possibilities for cyberattacks can
emanate from sources that are local, remote, domestic or foreign. They could be launched by an individual
or a group. They could be casual probes from hackers using personal computers (PCs) in their homes, hand-
held devices or intense scans from criminal groups.
Fig: A cyber security perspective. EU is the European Union. PI is information that is, or can be, about or
related to an identifiable individual. It includes any information that can be linked to an individual or used to
directly or indirectly identify an individual. Most information the organization collects about an individual is
likely to come under “PI” category if it can be attributed to an individual. For an example, PI is an
individual’s first name or
First initial and last name in combination with any of the following data:
1. Social security number (SSN)/social insurance number.
2. Driver’s license number or identification card number.
3. Bank account number, credit or debit card number with personal identification number such as an
access code, security codes or password that would permit access to an individual’s financial
account.
4. Home address or E-Mail address.
5. Medical or health information.
An insider threat is defined as “the misuse or destruction of sensitive or confidential information, as well as
IT equipment that houses this data by employees, contractors and other ‘trusted’ individuals.”
What makes matters worse is that the groups/agencies/entities connected with cybercrimes are all linked.
There is certainly a paradigm shift in computing and work practices; with workforce mobility, virtual teams,
social computing media, cloud computing services being offered, sharp rise is noticed in business process
outsourcing (BPO) services, etc. to name a few.
Confidential information leakage: “Insider attacks” are the worst ones. Typically, an organization is protected
from external threats by your firewall and antivirus solutions
Among the other reasons for the growth in the cost of cybercrime:
Cybercriminals are embracing new attack technologies.
Many new Internet users come from countries with weak cybersecurity.
Online crime is becoming easier through cybercrime-as-a-service and other business schemes.
Cybercriminals are becoming more financially sophisticated, making it easier to monetize their exploits.
There are many new endpoints in today’s complex networks; they include hand-held devices.
Again, there are lessons to learn:
1. Endpoint protection: It is an often-ignored area but it is IP-based printers, although they are passive
devices, are also one of the endpoints.
2. Secure coding: These practices are important because they are a good mitigation control to protect
organizations from “Malicious Code” inside business applications.
3. HR checks: These are important prior to employment as well as after employment.
4. Access controls: These are always important, for example, shared IDs and shared laptops are dangerous.
5. Importance of security governance: It cannot be ignored policies, procedures and their effective
implementation cannot be over-emphasized.
Finally, social media marketing can be used to monitor and measure the success of digital marketing
campaigns. Companies can use analytics tools to track the performance of their campaigns and determine
which ones are most effective. This can help companies to fine-tune their digital marketing efforts and
make sure that they are using the most effective strategies for reaching their target audience.
Social media marketing is an essential part of any digital marketing strategy. It can help companies to
build relationships with their customers, increase brand awareness and engagement, and measure the
success of their digital marketing campaigns. Companies should use social media to their advantage in
order to maximize their reach and visibility.
How to Start Social Media Marketing
To get started with social media marketing, you first need to understand the basics of social media
marketing and how to use it to your advantage.
1. Establish Social Media Presence
First & foremost, you need to establish a social media presence in the following ways: