Cybersecurity and Risk Management
Cybersecurity and Risk Management
Cybersecurity and Risk Management
AND RISK
MANAGEMENT
Group 6
GROUP MEMBER
acha
NUMBER OF REPORTED DATA RECORDS
BREACHED WORLDWIDE, 2009–2013.
THE FACE AND FUTURE OF
CYBERTHREATS
CYBERTHREATS
BYOD DANGEROUS PRANKS
RE
TY
ATS
5. THEFT OF TRADE 6. DONT CARRY
SECRETS AND OTHER RULES
CONFIDENTIAL
INFORMATION
1. SOCIAL ENGINEERING AND
BYOD
U.S. companies,
government agencies,
and organizations are
now imposing donot-
carry rules.
5.2 CYBER RISK
MANAGEMENT
IT SECURITY FIELD
Assets Threat
Things of value that need to be
protected
Something/someone that can
Strategy —> protect the most valuable damage, disrupt, or destroy
assets that the company have rather an asset
than to protect all assets equally.
IT SECURITY FIELD
VULNERABILITY
EXPLOIT RISK
COBIT
ERM
Control Objectives for Information and
Enterprise Risk Management Related Technology
STEPS IN IT SECURITY
DEFENSE-IN-DEPTH
MODEL
Step 3 - IT security Step 4 - Hardware
procedures and and software
enforcement Technology defense mechanisms need to
be:
Define enforcement procedures ·Able to provide strong authentication and
Designate and empower an internal access control
incident response team ·Industrial-grade
Define notification procedures, 4) ·Appropriate for the types of networks
Define a breach response and operating systems
communications plan ·Installed and configured correctly
Monitor Information and social ·Tasted rigorously
media source ·Maintained regularly.
UNINTENTIONAL & INTENTIONAL THREATS
Intentional Threats
The Examples:
Unintentional Threats Theft
Deliberate manipulation in handling,
Human Error
entering, processing, transferring, or
Environmental Hazards
programming data
Computer System Failures
Labor strikes, riots, or sabotage
Malicious damage to computer resource
Destruction from viruses
MALWARE A computer program or code that can infect
anything attached to the Internet and is
able to process the code
EXAMPLE
1 2 3
ANTIVIRUS INTRUSION INTRUSION
SOFTWARE DETECTION PREVENTION
SYSTEMS SYSTEMS (IPSS)
5.3 MOBILE, APP, AND
CLOUD SECURITY
VULNERABILITY
Vulnerabilities found in the system
must be fixed within a certain period
of time before the attacker can take
advantage of these vulnerabilities.
PERSONAL FILE
privacy
BUSINESS FILE
Secret
THREAT
MINIMUM
MALICIOUS
SECURITY FOR
MOBILE APSS
MOBILE
REAL TIME PROTECTION
RESIDENT
SHIELD
ON ACSESS
SCANNING
REALTIME PROTECTION - ACTIVE
5.4 DEFENDING
AGAINST FRAUD
More details
FRAUD
Occupational fraud refers to
the deliberate misuse of the
assets of one’s employer for
personal gain.
FRAUD TYPES
FRAUD TYPES
SOLUTION
The single most effective fraud prevention tactic
is making employees know that fraud will be
detected by IT monitoring systems and punished,
with the fraudster possibly turned over to the
police or FBI. The fear of being caught and
prosecuted is a strong deterrent. IT must play a
visible and major role in detecting fraud.
5.5 COMPLIANCE &
INTERNAL CONTROL
More details
COMPLIANCE
Compliance with regulations
always requires internal controls
to ensure that sensitive data are
protected and accurate.
INTERNAL CONTROL FUNCTION
OPERATIONAL EFFICIENCY
RELIABILITY OF FINANCIAL REPORTING, TO
PROTECT INVESTORS