logo

Cybersecurity

Cybersecurity

What does it do?

   Cybersecurity is the term used for reducing the risk of access to digital systems over the internet*. It involves encrypting the signals sent over the internet (Dan Craigen, Nadia Diakun-Thibault & Randy Purse 2014), creating systems that are harder to access for unauthorised individuals, as well as more difficult to automate attempts to access (cryptography). In this way, it secures data at three points - the end user's machine, the server sending the data, and the infrastructure that transmits it. 

Cybersecurity is vital for modern infrastructure, as it prevents foreseeable attempts at compromising secure data, such as customer records, proprietary technology, trade secrets, and other vulnerable or personal information. 

Cybersecurity often covers the following key areas:


NIST (National Institute of Standards and Technology) is an American organisation which advises its members of frameworks that can be used to increase cybersecurity (‘National Institute of Standards and Technology’ n.d.). These can be helpful for completing an assessment of an organisation for identification^ of gaps in security and risks apparent. The next phase is then to protect that information systems and assets through examples like user access management (above) or encryption of data. Then the organisation would have a provider such as Akamai or RSA who help organisations to manage their digital risk (‘Security, Cloud Delivery, Performance | Akamai’ n.d.; ‘RSA Cybersecurity and Digital Risk Management Solutions’ n.d.)^; as an example, RSA have Action360 as a tool *. It looks for phishing sites, it scans social media for references to the organisation, and it searches for any other kind of malicious sites.  

They would, in the detect stage, be looking at their current software, operating systems, all internal systems and determining whether there are patches that need to be put in place, or whether there are any zero-day vulnerabilities(Singh, Joshi &Kanellopoulos 2019). Following detect in the NIST framework is to respond, generally organisations will have a response plan, communications, forensics and mitigation activities, then recover the systems to normal operations using recovery plans, implementation of patches and restoring affected systems.  

What is the likely impact?

Cybersecurity image2

There are many examples of what happens when organisations have poor computer assets security (Desjardins 2019). 
The main methods identified for data loss are due to hacking, poor security, accidental publishing, and "inside jobs", or an internal agent with malicious purposes.  
The key impacts and outcomes for organisations are:  
Significant reputational damage, due mainly to the fact that customer records are often exposed. This can be significantly more problematic depending on the industry.
Financial impacts, such as regulatory fines, customer remediation and costs related to restoring the systems, assets and implementing the effective controls. 
Operational impacts, e.g. systems could be down and therefore the company may not be able to operate (Binfarè2020). Resources must be diverted in order to solve the problem, or are required to invoke manual processes.  

Loss of IP - significant intellectual property loss may have an adverse effect on a company as this can be used in very competitive markets to undercut the company's own use of their IP through illegal imitation.  

Legal action by customers - class actions are commonplace today where data breaches have occurred (Richie 2015) due to the potential damage to the customers' own lives.  

Sony 2014: The Sony 2014 Hacker group Guardians of Peace released confidential data from Sony (Clare Sullivan 2016). It was believed to be a state-sponsored attack by North Korea. The public release of a yet-to-be-released film were among the threats, as well as exposure of employee personal information and salaries. 

Marriott Starwood 2018 Breach: Marriot initially advised the public that up to 5.2 million guest records were exposed, however later revised this to up to 500 million (‘Marriott Announces Starwood Guest Reservation Database Security Incident’ n.d.).

How will this affect you?

As mentioned above, the key effect of poor cyber security practices can have a detrimental effect on individuals. Whether one is working for an organisation like Sony and one's employee information is leaked, or one is just a customer of the Marriot and one's personal data, such as loyal card details, address, date of birth are released, the results can be far reaching, up to and including impacting mental health. It was reported that the Ashley Maddison breach resulted in at least one user taking his own life as a result(Segall 2015), breaking up seemingly happy families and costing individuals in many other ways. 

Identity theft is another significant issue for individuals, potentially taking years to deal with the resultant fall out. Initially this may be just getting one's money back into bank accounts, having to replace personal documents such as passports, or years later having to fix credit ratings due to loans being taken out under the individual's name.   
If one is informed of a data breach affecting them, good cybersecurity practices (Dan Craigen, Nadia Diakun-Thibault & Randy Purse 2014) suggest that one should get as much information about the lost data.
Those practices include the following steps: 

The website “haveibeenpwned.com” (‘Have I Been Pwned: Check if your email has been compromised in a data breach’ n.d.) has a moderate database of emails that have been compromised in cybersecurity breaches.

References

- Anand, S 2008, ‘The Sarbanes-Oxley Body of Knowledge (SOXBoK) An Introduction’, Sarbanes-Oxley Body of Knowledge SOXBoK. 
- Binfarè, M 2020, ‘The Real Effects of Operational Risk: Evidence from Data Breaches’,. 
- Bright, P 2014, ‘US government fingers North Korea as the Sony hackers’, Ars Technica, viewed 17 October 2020, . 
- Clare Sullivan 2016, ‘THE 2014 SONY HACK AND THE ROLE OF INTERNATIONAL LAW’, Journal of National Security Law & Policy, vol. 8, no. 3, p. 1. 
- Dan Craigen, Nadia Diakun-Thibault & Randy Purse 2014, ‘Defining Cybersecurity’, Technology Innovation Management Review, vol. 4, no. 10. 
- Desjardins, J 2019, ‘The 15 Biggest Data Breaches in the Last 15 Years’, Visual Capitalist, .
- ‘Have I Been Pwned: Check if your email has been compromised in a data breach’, viewed 17 October 2020, . 
- Marriott Announces Starwood Guest Reservation Database Security Incident’ Marriott International Newscenter (US), viewed 17 October 2020, .
- ‘National Institute of Standards and Technology’ NIST, viewed 17 October 2020, . 
- Richie, JT 2015, ‘DATA BREACH CLASS ACTIONS’, The Brief, vol. 44, no. 3, pp. 12–19. 
- ‘RSA Cybersecurity and Digital Risk Management Solutions’ RSA.com, viewed 17 October 2020, . 
- ‘Security, Cloud Delivery, Performance | Akamai’, viewed 17 October 2020, . 
- Segall, L 2015, ‘Pastor outed on Ashley Madison commits suicide’, CNNMoney, viewed 17 October 2020, .
- Singh, UK, Joshi, C & Kanellopoulos, D 2019, ‘A framework for zero-day vulnerabilities detection and prioritization’, Journal of information security and applications, vol. 46, pp. 164–172.