ACCT5919 - Lecture 9 T3 2024
ACCT5919 - Lecture 9 T3 2024
ACCT5919 - Lecture 9 T3 2024
Business Risk
Management
The level of exposure and the nature in which it manifests itself has changed due to
increased:
• Levels of use and complexity of technology as a core channel for an organisation to
operate its value chain especially with customers
• Levels of direct connection of IT systems with external parties and reliance in part on
external parties for managing security
• Use of outsource partners to provide IT systems management life-cycle services to the
organisation eg system development, provision of hardware, system administration and
user support services
• External threats from organised criminal syndicates and sovereign state actors.
The direct impacts can include disruption to business operations and consequent increased
costs and loss of revenue, fraud losses, and potential legal liabilities and reputational
damage for breaches of data privacy requirements.
What is Data Privacy
Data privacy, sometimes referred to as information privacy, encompasses the protection
and responsible handling of any data, whether in digital or non-digital form. It involves
maintaining the confidentiality, integrity, and availability of data throughout its lifecycle. Data
privacy extends beyond personal information and includes sensitive corporate data,
intellectual property, financial records, and any other data that requires protection.
Data privacy is part of the broader concept of data protection which involves ensuring data
is:
• held securely during its life-cycle so that it is available as and when required to only
those who are authorised to access the data and for only authorised purposes,
• maintained and processed accurately,
• destroyed at the end of its life-cycle,
• maintained so that the organisation meets any specific regulatory requirements (eg
domicile of storage of information).
Sources of security threats extend beyond external hacker activities and include all the
internal activities that comprise the information security management life-cycle.
External cyber security incidents are increasingly prevalent due to increased use by
organisations of technology for core activities, social and geo-political tensions, as well as
increased regulatory requirements being imposed.
Common Players and Threats
External (or internal) malicious actors can take advantage of physical and logical
vulnerabilities (vectors):
• Physical hardware vulnerabilities
• Internal and external negligent / uneducated users
• Poor internal security design or control failures – negligent or inadvertent or malicious
THREAT THREAT
ACTORS VECTORS
SUPPLY CHAIN
FOREIGN INTELLIGENCE
VULNERABILITY
& CORPORATE
ESPIONAGE
NEGLIGENT
USERS
HACKTIVISTS
WIRELESS
ACCESS POINTS
CRIMINAL
ELEMENTS
REMOVABLE MEDIA
INSIDER
TERRORIST ACTS THREATS
Common Techniques and Weaknesses
Criminals exploiting negligent or uneducated users
The messages can appear to be sent by an organisation (being used as a vector) even
though it is in practice totally unrelated to the organisation. External expectations may
include the organisation needing to provide clarifying information and education of users.
2. Credential Stuffing: This technique involves cybercriminals using automated tools to try
stolen login credentials or easily guessable passwords (username and password
combinations) across multiple online platforms, exploiting users who reuse passwords on
multiple sites or systems/applications. Stolen personal information from other
organisations may be used to access the user’s account with your organisation with a
view to conduct fraudulent and unauthorised transactions.
If the user is an internal staff member the information may be used to try to access the
organisation’s systems beyond an external user account functionality or other internal
systems.
Common Techniques and
Weaknesses (Cont.)
Criminals exploiting negligent or uneducated users
3. Hacking – Hacking personal devices and public unsecure networks to obtain personal
information or system log-in/registration details including passwords – hacking less
secure devices and networks to achieve similar outcomes to phishing.
Increased use of remote working and working from home environments has increased
the level of vulnerability to this type of attack as the level of protection from using
organisation devices with firewalls/monitoring on an internal network is not present.
Threat management heavily relies on internal and external users behaving in accordance
with required procedures – education and monitoring required to continually reinforce and
enforce requirements. More difficult to achieve with external users.
Common Techniques and
Weaknesses (Cont.)
Internal Staff – malicious and inadvertent acts/errors
1. Access privileges - Internal staff with highly privileged accounts providing access to
databases and systems (IT administrators) provide a high exposure to manipulation,
corruption, copying and leaking of data or systems. The individual may act maliciously or
inadvertent make errors in using their functionality. They may act for personal gain, be
coerced by external criminals or wish to disrupt the organisation.
Inadvertent errors may occur in setting access privileges (eg misconfigured systems,
insecure file sharing) to inappropriate internal staff which allows leaking/copying of data that
is inappropriate.
4. Emailing sensitive data to home email – to support working from home in an unsecure
environment
Common Techniques and
Weaknesses (Cont.)
Poor Asset Security Practices or Settings
1. Access privileges – inappropriately wide and open granting of access - internal or Cloud
2. Password rules – strength, reuse, and frequency of change
3. Unencrypted file sharing
4. Emailing files to external address
5. Use of insecure networks (WiFi)
6. Working in public places
7. Use of personal device
8. Use of removable media
9. Use of webcam on personal devices/insecure meeting apps
10. Poor security design for user access to systems and apps eg no 2FA
11. No monitoring for brute force/Distributed Denial of Service attacks
The Impact
According to the Australian Federal Government Department of Home Affairs and Stay Smart Online
Australia, a new cyber crime is reported every 10 minutes, and the annual cost is increasing.
All sizes of
organisations
under threat.
Malicious
insiders can do
most damage –
recover period.
The damage cost estimation is based on historical cybercrime figures, including recent
year-over-year growth, a dramatic increase in hostile nation-state-sponsored and
organised crime gang hacking activities.
Examples
Regulation in the European Union includes:
• The General Data Protection Regulation (GDPR), which updates and replaces the
existing regulatory framework around the protection and use of personal data; and
• The Network Information Security (NIS) directive, which specifies obligations
regarding cyber security in certain industry sectors, is largely associated with
critical national infrastructure and major information processing activities.
Increasing Regulation (Cont.)
Regulation in the USA includes:
• Gramm-Leach-Bliley Act (1999) makes it mandatory for financial institutions, meaning
companies that provide consumers products or services like loans, financial or
investment advice, or insurance, to explain their information-sharing practices to their
customers and to safeguard their sensitive data.
• Homeland Security Act (2002) attempts to recognise the importance of information
security to the economic and national security interests of the United States
Recent high profile data privacy breaches and more active regulators are driving a focus on
data security within the cyber risk universe. The cyber risk universe would also include fraud
and financial crime related exposures.
For the same reasons we manage all risks actively it is important to manage cyber risk in this
context of heightened exposure and consequences.
Many frameworks are available most of which focus on security which covers most
operational threat treatments. Cyber risk applies at three levels:
Strategic:
• Appropriate use of digital technology to achieve strategic objectives
• Capability to manage cyber risks for intended use of digital technology
• Use of third-party digital systems – develop or buy
Cyber and Data Privacy Risk Levels
(Cont.)
Tactical (implementation of strategic digital initiatives):
• Project management and governance
• Technical development of digital assets – secure and reliable
• Software functional design and development/testing – achieve purpose of application securely
Operational:
• Governance, policies and information risk management framework
• Planning and Resourcing/Responsibilities
• Risk/threat assessment and treatments/controls– criticality of assets (use and sensitivity)
• Hardware/networks
• Software – own and third party
• Data
• Security threat assessment and controls – physical and logical access - data at rest / being processed
• Incident management – security breach or operational related
• Continuity and recovery of digital assets
• Managing outsource providers
• Control testing/audits
Frameworks
Managing cyber and data privacy requires a comprehensive and well-structured
approach. Several frameworks have been developed to guide organisations in effectively
addressing and mitigating cyber and privacy risks, mostly focused on security aspects.
When implementing these frameworks, organisations need to tailor their approach to their
specific business requirements, industry, and regulatory environment. Compliance with
relevant data protection laws and regulations, such as GDPR and the Privacy Act, needs
to be an integral part of any privacy management framework.
4. CIS Controls (Center for Internet Security): The CIS Controls provide a prioritised
set of actions designed to protect organisations from cyber threats. While the focus is
on cybersecurity, the controls include measures related to data privacy, such as
securing data storage, data retention policies, and access controls. The controls are
organised into three implementation groups based on an organisation's size,
resources, and cybersecurity maturity.
1. Identify Assets and Data: Identifying all the assets within the organisation that are
critical to its operations, including hardware, software, networks, and data. Understand
what data is collected, processed, stored, and transmitted, as well as its sensitivity and
value.
2. Threat Identification: Identify potential threats that could exploit vulnerabilities in the
organisation's assets. These threats may include external threats like hackers and
malware, as well as internal threats like insider attacks or accidental data leaks.
Cyber and Data Privacy Risk
Management (Cont.)
3. Vulnerability Assessment: Evaluate the vulnerabilities present in the organisation's
assets. Vulnerabilities are weaknesses or gaps in security that could be exploited by
cyber threats. This may involve conducting security scans, penetration testing, and
code reviews.
6. Determine Risk Rating: Calculate the level of risk associated with each identified
threat-vulnerability pair. The focus should be on addressing the high-risk areas first to
ensure the most critical vulnerabilities are addressed promptly.
Cyber and Data Privacy Risk
Management (Cont.)
7. Mitigation and Controls: Develop a risk management strategy that outlines specific
measures and controls to reduce the identified risks. This could involve implementing
technical controls, enhancing security policies and procedures, and conducting
employee training on cybersecurity best practices.
Cyber and Data Privacy Risk Management is an ongoing process, and an organisation
should regularly review and update its assessments to address new threats, vulnerabilities,
and changes in the business environment. By understanding and managing the risks and
threats proactively, organisations can better protect their assets, data, and reputation.
Controls
For the tactical and operational level risk management controls are often broken into two
categories:
General Controls – relate to the overall digital environment – not germane to a single
application
• Administration of IT assets
• Logical access and monitoring
• System life-cycle – development, testing and release
• Physical access and monitoring
• Data protection and recovery
3. Physical Security
4. Logical security
7. Business Resilience