SlideShare a Scribd company logo
Information Security Risk Management
      IT operation outsourcing

  The Cloud and Data aggregation
   More data is collected, storage is ‘free’
   Data sets are connected and correlated for many
    reasons
   They are combined with open source data sets –
    credit referencing = identity exists
   Data sets are shared internationally
   There is a new focus on privacy people are
    sensitive to this issue
   Privacy sensitive information is valuable and can
    easily be sold if stolen
   Single records unclassified or low classification,
    or privacy sensitive only
   As set grows 10, 100, 1,000, 10,000, 1m,
    10m......100m something changes but traditional
    classification did not change
   Changes for two reasons damage caused by large
    data loss is clearly greater – resign, resign,
    resign......
   Acquisition of large data sets opens up
    opportunities for new insights with dangerous
    consequences
Duncan hine input3_irm_and_outsourcing
   Forgery and alteration does not work
   Better to apply for a real one in a false
    identity
   All identities checked on application for
    ‘social footprint’ so must take from a real
    person
   May already be holder or past holder or
    known to agency - fraud will be detected
   Need to know in advance use two methods
   With target cooperation and without
   Access to large data sets reduces risks
 On line genealogy and credit referencing
 Electoral rolls
 Travel data sets (if you travel you already have a
  passport)
 Vulnerable adult data sets addicts, long term
  carers
 Lists of professionals with issues
All increase the chance of success and reduce the
  number of simultaneous applications that need
  to be made
   Standard method was to adopt the identity of
    a dead child born about the same time as the
    applicant who would not have a passport
   Duplicate birth certificate obtained (a legal
    right in UK)
   Application will not work now as deaths
    checked, but for various reasons records not
    complete
   Monitor open source deaths in online local
    newspapers
   Find a soldier who served abroad, 20-40 yrs
    older than target
   Use on line regimental histories to establish
    when served overseas and what countries
   Aim to identify a country where soldier was
    around the time the applicant was born with
    weak record system
   Forge a birth certificate for that country
   Apply as the illegitimate child of the dead soldier
    – it was always kept a secret
   Using a cloud makes aggregation happen
    inherently
   Cloud needs to be set up so penetration is
    limited in containers to manage risk
   Encryption at rest looks like the answer but it
    introduces many other problems
   These include key management, escrow, and
    penetration of key provider
   RSA issue a good example
   It’s not just about accessing the data but also the
    ability to combine big data sets
   WP is a good example
   Many controls will be traditional
   Passport special control process was to cost
    Eu 10m
   By taking two highly vetted people from a
    pool of 24 at random and using a four eyes
    process same/better protection was delivered
    at a fraction of cost
   To break this have to corrupt all 24 people
   Basic training and awareness more important
    than ever
   Traditional approach to risk management is
    still valid for the cloud but the threats and
    risks are different
   Controls and mitigations are similar but
    applied differently
   There is a good opportunity, the risks are
    greater if they are not well engineered but
    they can be !
   Risk management must be done properly by
    specialists and asset owners together
Duncan hine input3_irm_and_outsourcing

More Related Content

PDF
Threat Indicators and Cyber Intelligence Sharing in Financial Sector
PDF
Turning Weaknesses into Opportunities Case of the Civil Registry Agency
PDF
Moldova Open Government Data by Mrs. Irina Tisacova
PDF
Model for an integrated and implementation-oriented urban revitalisation process
PPTX
Els tres porquets
PDF
Concert a càrrec de Damaris Gelabert
PDF
Assessing cybersecurity_Anto Veldre
Threat Indicators and Cyber Intelligence Sharing in Financial Sector
Turning Weaknesses into Opportunities Case of the Civil Registry Agency
Moldova Open Government Data by Mrs. Irina Tisacova
Model for an integrated and implementation-oriented urban revitalisation process
Els tres porquets
Concert a càrrec de Damaris Gelabert
Assessing cybersecurity_Anto Veldre

Similar to Duncan hine input3_irm_and_outsourcing (20)

PDF
Chapter 12 - Computer Forensics
PDF
ZoomLens - Loveland, Subramanian -Tackling Info Risk
PDF
Information security
PPT
Naccu Card Fraud And Identity Theft
DOC
Steven Leahy_IT 543_Unit 1 Assignment
PDF
Duncan hine input2_ irm_and_outsourcing
PDF
Modeling and Detection of Data Leakage Fraud
PDF
White Paper - Nuix Cybersecurity - US Localized
PDF
The Science Of Quantitative Information Flow Mário S. Alvim
PDF
Data Loss Threats and Mitigations
PPTX
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
PDF
[AIIM18] GDPR: whose job is it now? - Paul Lanois
PPTX
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
PPTX
Data Privacy and Security in Clinical Data Management
PDF
What To Do if You Were Scammed
PPTX
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
PDF
Graphs in Government
PDF
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
PDF
Keep Student information protected while improving services
PDF
9 Trends in Identity Verification (2023) by Regula
Chapter 12 - Computer Forensics
ZoomLens - Loveland, Subramanian -Tackling Info Risk
Information security
Naccu Card Fraud And Identity Theft
Steven Leahy_IT 543_Unit 1 Assignment
Duncan hine input2_ irm_and_outsourcing
Modeling and Detection of Data Leakage Fraud
White Paper - Nuix Cybersecurity - US Localized
The Science Of Quantitative Information Flow Mário S. Alvim
Data Loss Threats and Mitigations
Save yourself with the CSDF - ISACA Auckland - 16 June 2021
[AIIM18] GDPR: whose job is it now? - Paul Lanois
Cyber security for the regulator and regulated - Ontario Regulatory Authorit...
Data Privacy and Security in Clinical Data Management
What To Do if You Were Scammed
2014 NCSAM - Data Security and Compliance—What You Need to Know.pptx
Graphs in Government
Big Data Meets Privacy:De-identification Maturity Model for Benchmarking and ...
Keep Student information protected while improving services
9 Trends in Identity Verification (2023) by Regula
Ad

More from E-Government Center Moldova (20)

PDF
The new era of smart
PDF
The nexus of Social, Mobile, Cloud and Big Data Analytics
PDF
Digital Transformation by Richard Baird
PPT
Presentation cert gov-md 05.03.2013
PDF
Hannes astok data protection agency
PDF
Prezentare compartiment securitatea 05 03 2013 p sincariuc
PDF
Hannes astok policy development
PDF
Digital security hannes astok
PPTX
MCloud operational framework
PPTX
Arhitectura de securitate_MCloud
PDF
Ibm smart cloud solutions m-cloud
PDF
Ibm security virtual server protection
PDF
Can e government work in the cloud reichstaedter
PDF
Driving government efficiency and innovation through cloud computing k...
PDF
Star storage m cloud week
PPT
Unleashing the potential of cloud computing in europe francisco garcia moran
PPTX
Government innovation through cloud computing arthur riel
PPT
4 francisco garcia_moran_moldova_2013
PPTX
3 platforma tehnologica_m-cloud
The new era of smart
The nexus of Social, Mobile, Cloud and Big Data Analytics
Digital Transformation by Richard Baird
Presentation cert gov-md 05.03.2013
Hannes astok data protection agency
Prezentare compartiment securitatea 05 03 2013 p sincariuc
Hannes astok policy development
Digital security hannes astok
MCloud operational framework
Arhitectura de securitate_MCloud
Ibm smart cloud solutions m-cloud
Ibm security virtual server protection
Can e government work in the cloud reichstaedter
Driving government efficiency and innovation through cloud computing k...
Star storage m cloud week
Unleashing the potential of cloud computing in europe francisco garcia moran
Government innovation through cloud computing arthur riel
4 francisco garcia_moran_moldova_2013
3 platforma tehnologica_m-cloud
Ad

Duncan hine input3_irm_and_outsourcing

  • 1. Information Security Risk Management IT operation outsourcing The Cloud and Data aggregation
  • 2. More data is collected, storage is ‘free’  Data sets are connected and correlated for many reasons  They are combined with open source data sets – credit referencing = identity exists  Data sets are shared internationally  There is a new focus on privacy people are sensitive to this issue  Privacy sensitive information is valuable and can easily be sold if stolen
  • 3. Single records unclassified or low classification, or privacy sensitive only  As set grows 10, 100, 1,000, 10,000, 1m, 10m......100m something changes but traditional classification did not change  Changes for two reasons damage caused by large data loss is clearly greater – resign, resign, resign......  Acquisition of large data sets opens up opportunities for new insights with dangerous consequences
  • 5. Forgery and alteration does not work  Better to apply for a real one in a false identity  All identities checked on application for ‘social footprint’ so must take from a real person  May already be holder or past holder or known to agency - fraud will be detected  Need to know in advance use two methods  With target cooperation and without  Access to large data sets reduces risks
  • 6.  On line genealogy and credit referencing  Electoral rolls  Travel data sets (if you travel you already have a passport)  Vulnerable adult data sets addicts, long term carers  Lists of professionals with issues All increase the chance of success and reduce the number of simultaneous applications that need to be made
  • 7. Standard method was to adopt the identity of a dead child born about the same time as the applicant who would not have a passport  Duplicate birth certificate obtained (a legal right in UK)  Application will not work now as deaths checked, but for various reasons records not complete
  • 8. Monitor open source deaths in online local newspapers  Find a soldier who served abroad, 20-40 yrs older than target  Use on line regimental histories to establish when served overseas and what countries  Aim to identify a country where soldier was around the time the applicant was born with weak record system  Forge a birth certificate for that country  Apply as the illegitimate child of the dead soldier – it was always kept a secret
  • 9. Using a cloud makes aggregation happen inherently  Cloud needs to be set up so penetration is limited in containers to manage risk  Encryption at rest looks like the answer but it introduces many other problems  These include key management, escrow, and penetration of key provider  RSA issue a good example  It’s not just about accessing the data but also the ability to combine big data sets  WP is a good example
  • 10. Many controls will be traditional  Passport special control process was to cost Eu 10m  By taking two highly vetted people from a pool of 24 at random and using a four eyes process same/better protection was delivered at a fraction of cost  To break this have to corrupt all 24 people  Basic training and awareness more important than ever
  • 11. Traditional approach to risk management is still valid for the cloud but the threats and risks are different  Controls and mitigations are similar but applied differently  There is a good opportunity, the risks are greater if they are not well engineered but they can be !  Risk management must be done properly by specialists and asset owners together