CHAPTER 1: INFORMATION SECURITY AND CYBER SECURITY
The terms âinformation securityâ and âcyber securityâ are often used interchangeably, when in fact they refer to different (albeit related) things.
Information security is concerned with ensuring the confidentiality, integrity and availability (C, I and A) of all information held by an organisation, irrespective of whether the information is electronic or in hard-copy format. As a result, information security generally involves considering physical and environmental controls alongside technological ones (lockable filing cabinets, key-code doors, etc.).
Cyber security is a subset of information security and is concerned with the same things, but where information security takes a generalist approach, cyber security focuses specifically on electronic information (including the physical aspects of defending that information). New cyber risks emerge almost daily, and the successful organisation must do all it can to stay ahead of the curve.
Laws, regulations and contracts
The days of cyber security as an afterthought are long past. Todayâs organisations collect, use and store more information than ever before, and the global regulatory system is beginning to catch up.
The introduction of the EU General Data Protection Regulation (GDPR) in 2018 marked a major milestone for data protection and privacy laws across the globe. Most of us remember the flood of âwe need your consentâ emails that arrived in our inboxes in the days leading up to (and after) the GDPR took effect, but those emails were only the tip of the iceberg.
The GDPR places a wide range of security and privacy obligations on organisations that process EU residentsâ data and is supported by a regime of significant financial penalties (up to 4% of annual turnover or âŹ20 million, whichever is greater). The Regulation also requires organisations based outside of the EU that process data on EU residents to appoint an EU representative, extending the reach of those obligations and penalties far beyond the EUâs physical borders.
Another law that may be relevant is the Directive on security of network and information systems (NIS Directive). This places specific cyber security and business continuity obligations on digital service providers and operators of essential services such as power and water, with a view to mitigating the disruption that could occur as the result of a major cyber security incident.
While many organisations still grapple with the GDPR and NIS Directive, new laws such as the California Consumer Privacy Act (CCPA) or the Brazilian General Data Privacy Law (Lei Geral de Proteção de Dados Pessoais) are being introduced around the world, and further legislation is expected in the coming years. The increasing regulatory focus on data protection, privacy and continuity of key services inevitably leads to a greater focus on cyber security, as so much of the information held by organisations is in electronic formats, and the majority of essential services rely on electronic infrastructure.
Itâs not just laws that mandate effective cyber security. Cyber security obligations in contracts are increasingly common, as organisations begin to recognise the risks posed by information sharing between suppliers and partners. If your organisation takes card payments, for example, banks will expect you to adhere to the requirements of the Payment Card Industry Data Security Standard (PCI DSS), while many government contracts mandate a minimum level of cyber security to enter the tendering process.
CHAPTER 2: THREATS AND VULNERABILITIES
Risk is an inevitable part of life. Every time you do something in which the outcome is uncertain, you take a risk, whether itâs something simple like crossing the road, or something complex like undergoing surgery. Risk is a function of uncertainty â without uncertainty, there is no risk.
Different business fields approach risk in different ways, but the general principles remain the same: the likelihood of an adverse event is mapped against the effect that event would have were it to occur. If the outcome is severe and the likelihood high enough, then it is sensible to take steps to protect against it â usually by reducing the damage caused by the outcome, or by reducing the likelihood that it will occur in the first place.
Cyber security risk derives from a combination of threats and vulnerabilities: vulnerabilities are exploited by threats to achieve certain goals, such as accessing a secure network or installing malware. This does not mean that cyber security risk is limited to deliberate actions by malicious actors â a leaky roof of a server room (vulnerability) can be âexploitedâ by a rainstorm (threat), with potentially catastrophic results.
Threats and vulnerabilities can take many forms. A database that fails to properly sanitise user inputs, for instance, might be exploited by an attacker using an SQL injection to gain access to sensitive data, while unpatched software might allow an attacker to install malware, with any number of nasty results â wiping files or holding them to ransom, to name just two.
Software and hardware are always evolving, and the same is true for vulnerabilities â each advance brings new security challenges. Even longstanding, trusted software or hardware is not immune. In 2018, major computer chip manufacturers were stunned to discover that their processors had major security flaws (named âMeltdownâ and âSpectreâ) at the hardware level since 1995 â processors that are believed to be in almost every modern computer across the globe.1
Cyber threat actors come in all shapes and sizes too. While our first thought may be of the ânerdâ locked in a bedroom writing code for a prank, the reality is very different. Organised crime gangs, âhacktivistsâ pushing a political agenda, and even state-supported actors all represent potential threats, irrespective of the size of your organisation.
Perhaps the most pervasive threat actor is something you canât live without â your employees. Even discounting âinsider threatsâ (the term used to describe employees who are actively looking to harm their organisation in some way, often because they are unhappy), many cyber security incidents are caused inadvertently by employees who lack awareness of the risks. According to a report by Verizon, 34% of data breaches in 2019 involved internal actors.2
Technical threats
When we think about cyber security, technical threats are usually the first thing that comes to mind. The news abounds with stories of vast data breaches that are eventually traced to some obscure vulnerability in hardware or software, and phishing emails carrying malware drop into millions of inboxes every day, all over the world. Every inch of progress towards security is a hard-fought battle, and to fight effectively, you need to understand the enemyâs weapons.
Malware
Malware has existed in one form or another since computers became commonplace. Self-replicating software was conceived in the 1940s, and one of the first viruses, known as Creeper, was created in the early 1970s, infecting US government computers and displaying âIâm the Creeper, catch me if you canâ on the screen.
Since then, there has been an explosion of malware. Sites on the dark web offer a vast array of malware programs for sale, and new malware appears daily, taking advantage of the latest vulnerabilities in a never-ending arms race between the malicious actors who craft it and the cyber security professionals who defend against it. âMalwareâ as a category encompasses a range of malicious programs, each of which operates differently.
Virus
Viruses are self-replicating programs designed to spread from computer to computer and deliver a payload. Viruses are not standalone programs â they are bits of code that need to be hidden in other programs to function and replicate. When the user runs the âhostâ program, the virus infects the system and does its work.
Once it has infected a system, the virus has two goals: replicate itself as much as possible and deliver the payload â ideally without being spotted. Some of the earliest viruses were called âboot sectorâ viruses, because they infected sections of a drive that are read when a computer is booted up, making them hard to detect, and were often spread through the sharing of floppy discs (which were still in common use at the time).
Some of the most common viruses of the Internet era are macro viruses â viruses written in the scripting language found in MicrosoftÂŽ Office and embedded in Office files, such as Excel spreadsheets or Word documents. Opening the document allows the virus to infect the system, with potentially catastrophic results. Emails featuring infected Office documents have been a common attack vector since the early 1990s, so much so that âdonât open suspicious attachmentsâ has become a cyber security maxim.
Worms
If the principal characteristic of a virus is that it is a self-replicating program that must be embedded in another program to function, then a worm is a virus with that limitation removed. Worms do not need to be embedded in other programs and can replicate without user interaction, making them especially dangerous.
One of the best-known worms in recent years is Stuxnet. Discovered in 2010, this highly complex worm targeted industrial control systems in an Iranian nuclear facility, changing the speed of uranium enrichment centrifuges until a large number broke from the strain. Commonly believed to have been developed by US and Israel intelligence agencies, Stuxnet is considered by some the worldâs first âcyber-weapon of geopolitical significanceâ.3
Ransomware
Ransomware exploded into the public consciousness with the WannaCry attack on the NHS in 2017, which affected up to 70,000 devices including hospital equipment.4 Other major organisations such as FedEx and Renault were also affected, along with a number of universities and government institutions across the globe.
Ransomware is a payload, usually transmitted by self-replicating worms or Trojans, that encrypts or otherwise prevents access to the userâs files until a ransom is paid (usually in Bitcoin). Some ransomware will take a copy of the userâs files and threaten to publish them, but the effect is the same â pay up or lose out.
Before the 2017 WannaCry attacks (which occurred worldwide, not just in the UK), ransomware primarily targeted individual consumers. The 2017 attacks marked the beginning of a shift in focus, with 81% of ransomware attacks in 2018 targeting organisations, not consumers.5
Trojan horses
Trojan horses, or just âTrojansâ, are a type of malware that pretend to be something else. The name comes from the ancient Greek story about the fall of Troy.
Trojans generally masquerade as legitimate programs to trick you into activating them, though some can spread on their own without user interaction. One of the most common attack vectors is email, as Trojans can be embedded in seemingly innocuous attachments such as spreadsheets or Word files. Once activated, the Trojan sends spoof emails to everyone in the address book, further spreading the infection.
Trojans can carry almost any kind of payload, but keyloggers and âbackdoorsâ that allow access to sensitive ...