SlideShare a Scribd company logo
Cyber Crimes and  IT Risk Management   Nandakumar Shamanna
 
What makes it  different form terrestrial Crime They are easy to learn how to commit They are  often not clearly illegal When done leaves no or less trace They require few resources relative to the  potential damage caused They can be committed in a jurisdiction without being physically present in it
Cyber Terrorism Cyber Squatting Web Jacking Internet Time Thefts Email Bombing Cyber Stalking Salami Attacks Hacking Viruses/Worms/Trojans Data Diddling Cyber Blackmailing Cyber Luring Intellectual Property crimes False Websites Phishing Auction Frauds e-mail Spoofing Cyber Terrorism Pornography Data Interference/Forgery/Interception Credit Card Fraud Network Sabotage DOS Identity Fraud/Theft Source code stealing to name a few
Cyber Crimes – Exploding Problem List of Top 20 Countries with the highest rate of Cybercrime (source: BusinessWeek/Symantec) Each country lists 6 contributing factors, share of malicious computer activity, malicious code rank, spam zombies rank, phishing web site hosts rank, bot rank and attack origin, to substantiate its cybercrime ranking. 11. India Share of malicious computer activity: 3% Malicious code rank: 3 Spam zombies rank: 11 Phishing web site hosts rank: 22 Bot rank: 20 Attack origin rank: 19
Extent of the Problem Source: National Crime Records Bureau, Statistics of Cyber Crimes, 2007
Extent of the Problem 2009 FBI-IC3 Internet Crime Report Friday, April 2nd, 2010
Extent of the Problem Ponemon Institute Research Report Publication Date: July 2010
Why Is Cyber Attack Possible? Software Has Bugs/Networks Not Designed For Security : Engineering practices and technology used by system providers do not produce systems that are immune to attack Implementation Is Poor : Network and System operators do not have the people and practices to defend against attacks and minimize damage Law And Policy Lag Behind Dependence:  Policy and law in cyber-space are immature and lag the pace of change
Information Technology – Risk Management
Today we are operating in an increasingly more global, complex and demanding risk environment with “zero tolerance” for failure  Increased demands for transparency and business sustainability Stricter regulatory requirements Increasing IT vulnerability New risk reality
Definition of risk Risk is an event that occurs with a certain frequency/ probability and that has consequences towards one or more goals/objectives Risk Level =  Frequency/ Probability  combined with  Consequence x = DAMAGE ASSET PROBABILITY CONSEQUENCE RISK THREAT EXPLOIT VULNERABILITY
Approach - Work process and method Initiation  & focusing Uncertainty Identification Risk  Analysis Actions Planning Documentation Communication Implementation & follow-up The Risk Management Approach ensures that mapping of risk exposure, treatment of risks and follow-up are carried out in a structured manner
Alter the risk Preventive measures reduce the probability of the event Corrective measures reduce the consequence of the event Plan for that event happen Avoid escalation Recovery plan Transfer the risk  Disclaim responsibility; write a contract, take out insurance etc. Avoid the risk Eliminate by stopping the activity Accept the risk Continue as before; the activity remains unchanged Actions planning – handling strategy   2 Risk Avoidance Risk Reduction Risk Transfer Risk Acceptance
to combat Cyber Crimes Implement Security Systems
the solutions…. - Technology Firewalls, Intrusion Prevention System Public Key Infrastructure High Grade Encryption Technologies Optical Fiber Links Vulnerability/Risk Assessment Cyber Forensics Honey Pots VPN Biometrics, Access Control Backups (System Redundancy) Incident  Response Actions
the solutions…. - Processes Reduction in the Operation flexibility (Segregation of Duties) Effective Organization Procedures and Policies Security/System Auditing Training to the employees Government-to-Government coordination Recognizing Shortage of skilled cyber security workers Creation of Cyber Army  Cooperation & Information Sharing Investment in information assurance systems Increased R&D funding Development of cyber ethics Mutual cooperation with law enforcement
Security Models and Frameworks
ISO 27000 Series - Published standards ISO/IEC 27000  — Information security management systems — Overview and vocabulary ISO/IEC 27001  — Information security management systems — Requirements  ISO/IEC 27002  — Code of practice for information security management  ISO/IEC 27003  — Information security management system implementation guidance  ISO/IEC 27004  — Information security management — Measurement  ISO/IEC 27005  — Information security risk management  ISO/IEC 27006  — Requirements for bodies providing audit and certification of information security management systems  ISO/IEC 27011  — Information security management guidelines for telecommunications organizations based on ISO/IEC 27002  ISO/IEC 27033-1  - Network security overview and concepts  ISO 27799  - Information security management in health using ISO/IEC 27002 [standard produced by the Health Infomatics group within ISO, independently of ISO/IEC JTC1/SC27]
ISO 27000 Series - In preparation ISO/IEC 27007  - Guidelines for information security management systems auditing (focused on the management system)  ISO/IEC 27008  - Guidance for auditors on ISMS controls (focused on the information security controls)  ISO/IEC 27013  - Guideline on the integrated implementation of ISO/IEC 20000-1 and ISO/IEC 27001  ISO/IEC 27014  - Information security governance framework  ISO/IEC 27015  - Information security management guidelines for the finance and insurance sectors  ISO/IEC 27031  - Guideline for ICT readiness for business continuity (essentially the ICT continuity component within business continuity management)  ISO/IEC 27032  - Guideline for cybersecurity (essentially, 'being a good neighbor' on the Internet)  ISO/IEC 27033  - IT network security, a multi-part standard based on ISO/IEC 18028:2006 (part 1 is published already)  ISO/IEC 27034  - Guideline for application security  ISO/IEC 27035  - Security incident management  ISO/IEC 27036  - Guidelines for security of outsourcing  ISO/IEC 27037  - Guidelines for identification, collection and/or acquisition and preservation of digital evidence
C OBI T ISACA (Information Systems Audit and Control Association) ‏ Four phases/domains: Planning and Organization Acquisition and Implementation Delivery and Support Monitoring Common Criteria (CC) ‏ Common Criteria for Information Technology Security Evaluation ISO 15408 not a security framework not even evaluation standard Framework for specification of evaluation Protection Profile (PP) ‏ Evaluation Assurance Level (EAL 1-7) ‏ FISMA Federal Information Systems Management Act – US National Information Assurance Certification and Accreditation Process (NIACAP) ‏ National Institute of Standards and Technology outline, Defense Information Technology Systems Certification and Accreditation Process  (DITSCAP) ‏ Director of Central Intelligence Directive 6/3
ITIL Information Technology Infrastructure Library management guidelines Incident response Problem management Change management Release management Configuration management Service desk management Service level management Availability Capacity management Service continuity IT financials IT workforce/HR management Information Security Forum (ISF) ‏ Standard of Good Practice for Information Security 5 "aspects" Security Management Critical Business Applications Computer Installations Networks Systems Development broken out into 30 "areas," and 135 "sections"
NIST library of freely available resources http://csrc.nist.gov Information Security Handbook: A Guide for Managers 800-100 Recommended Security Controls for Federal Info Systems 800-53 Guide to Information Technology Security Services 800-35 Risk Management Guide for Information Technology Systems 800-30 Engineering Principles for Information Technology Security 800-27 Guide for Developing Security Plans for Federal Info Systems 800-18 Generally Accepted Principles and Practices for Securing Information Technology Systems 800-14 An Introduction to Computer Security: The NIST Handbook 800-12 Security Self-Assessment Guide for Information Technology Systems 800-26 PCI Payment Card Industry Data Security Standards 6 Control Objectives 12 Requirements
Securities and Financial Basel II bank solvency “ operational risk” COSO Committee of Sponsoring Organizations of the Treadway Commission, Enterprise Risk Management Integrated Framework internal controls SOX RFC 2196 is memorandum published by Internet Engineering Task Force for developing security policies and procedures for information systems connected on the Internet.  RFC 2196 Statement on Auditing Standards No. 70: Service Organizations  SAS 70 provides guidance to service auditors when assessing the internal controls of a service organization and issuing a service auditor’s report. SAS 70 also provides guidance to auditors of financial statements of an entity that uses one or more service organizations.
The CALDER-MOIR IT Governance Framework There are many IT-related management frameworks, standards and methodologies in use today. None of them, on their own, are complete IT governance frameworks, but they all have a useful role to play in assisting organizations manage and govern their IT operations more effectively. The CALDER-MOIR IT Governance Framework is designed to help you get maximum benefit from all these overlapping and competing frameworks and standards, and also to deploy the best practice guidance contained in the international standard for IT governance, ISO/IEC 38500. 
Governance & Cyber Crime -  Cost Comparison Ponemon Institute Research Report Publication Date: July 2010
Cyber Crimes and Law Electronic Signature Laws U.S. - Electronic Signatures in Global and National Commerce Act  U.S. - Uniform Electronic Transactions Act - adopted by 46 states  U.S. - Digital Signature And Electronic Authentication Law  U.S. - Government Paperwork Elimination Act (GPEA)  U.S. - The Uniform Commercial Code (UCC)  UK - s.7 Electronic Communications Act 2000  European Union - Electronic Signature Directive (1999/93/EC)  Mexico - E-Commerce Act [2000]  Costa Rica - Digital Signature Law 8454 (2005)  Australia -  Electronic Transactions Act 1999  (Cth) (also note that there is State and Territory mirror legislation)  Information Technology Law Computer Misuse Act 1990   Florida Electronic Security Act  Illinois Electronic Commerce Security Act  Texas Penal Code - Computer Crimes Statute  Maine Criminal Code - Computer Crimes  Singapore Electronic Transactions Act  Malaysia Computer Crimes Act  Malaysia Digital Signature Act  UNCITRAL Model Law on Electronic Commerce  Information Technology Act 2000 of India
Cybercrime provisions under IT Act,2000   Offences & Relevant Sections under IT  Act Tampering with Computer source documents  Sec.65 Hacking with Computer systems, Data alteration Sec.66 Publishing obscene information Sec.67 Un-authorized access to protected system Sec.70  Breach of Confidentiality and Privacy Sec.72 Publishing false digital signature certificates Sec.73
Implications Failure to comply with the above may result in damages payable for which there is no specified upper limit, besides possible imprisonment of upto 7 years. It is also necessary for Companies to understand that even if any of their employees contravene the provisions of the Act including committing of such personal offences such as searching for child pornography using the corporate network, then there could be vicarious liabilities on the organization and its Directors and Executives. Prevention of these liabilities requires a Cyber Law Compliance Programme with special focus on IT Act 2008. Even if the organization is ISO 27001 certified, it is recommended that the organization should review its security and examine IT Act 2008 compliance.
Conclusion Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the cyber space. However it is quite possible to check them. The only possible steps to counter Cyber crimes are to to make people aware of their rights and duties (to report crime as a collective duty towards the society) making the application of the laws more stringent to check crime to implement good systems and governance models to reduce the possibilities of cyber crimes to bring about increased awareness  amongst the law keepers of the state on Cyber crimes
Safeguarding life, property  and the environment www.dnv.com

More Related Content

PDF
Information Security Management 101
PPT
Developing an Information Security Program
PPTX
Sarwono sutikno nisd2013 - transforming cybersecurity
PPTX
Information Security : Is it an Art or a Science
PPTX
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
PPTX
Importance Of A Security Policy
PDF
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
PPTX
20100224 Presentation at RGIT Mumbai - Information Security Awareness
Information Security Management 101
Developing an Information Security Program
Sarwono sutikno nisd2013 - transforming cybersecurity
Information Security : Is it an Art or a Science
Dubai Cyber Security 02 Ics Scada Cyber Security Standards, Solution Tips...
Importance Of A Security Policy
NIST releases SP 800-160 Multi-discplinary approach to cybersecurity
20100224 Presentation at RGIT Mumbai - Information Security Awareness

What's hot (16)

PPTX
PDF
System of security controls
PDF
A Case Study of the Capital One Data Breach
PDF
The importance of information security
PDF
Fadi Mutlak - Information security governance
PPTX
Information security: importance of having defined policy & process
PPT
Maloney Slides
PPTX
Information security governance
PPTX
information security technology
PPT
Contractor Responsibilities under the Federal Information Security Management...
PPTX
Top 20 Security Controls for a More Secure Infrastructure
PPTX
SIEM in NIST Cyber Security Framework
PPTX
INFORMATION SECURITY
PPTX
A guide to Sustainable Cyber Security
PPT
Information security.pptx
System of security controls
A Case Study of the Capital One Data Breach
The importance of information security
Fadi Mutlak - Information security governance
Information security: importance of having defined policy & process
Maloney Slides
Information security governance
information security technology
Contractor Responsibilities under the Federal Information Security Management...
Top 20 Security Controls for a More Secure Infrastructure
SIEM in NIST Cyber Security Framework
INFORMATION SECURITY
A guide to Sustainable Cyber Security
Information security.pptx
Ad

Viewers also liked (15)

PDF
Iso 27001 i̇ç denetçi eğitimi
PPTX
Novità della norma ISO/IEC 27001:2013
PDF
Action Plan for the Central Delaware: 2008-2018
PDF
Iso 27001 E Iso 27004
PPTX
ISO 27001 Certification: An All-Access Pass
PPT
Old Presentation on Security Metrics 2005
PDF
Effective Security Metrics
PPTX
Role of compliance in security audits
PPTX
Slum Improvement Action Plan (SIAP) NUSP2 Kota Semarang
PPTX
Presentation on iso 27001-2013, Internal Auditing and BCM
PPTX
Forming deep relationships with your clients
PPTX
ISO 27001:2013 IS audit plan - by software outsourcing company in india
PDF
ISO 27001:2013 - Changes
PPTX
100% cloud: Your action plan for success
PPT
Slum Improvement Action Plan (SIAP) NUSP2 Kota Batam
Iso 27001 i̇ç denetçi eğitimi
Novità della norma ISO/IEC 27001:2013
Action Plan for the Central Delaware: 2008-2018
Iso 27001 E Iso 27004
ISO 27001 Certification: An All-Access Pass
Old Presentation on Security Metrics 2005
Effective Security Metrics
Role of compliance in security audits
Slum Improvement Action Plan (SIAP) NUSP2 Kota Semarang
Presentation on iso 27001-2013, Internal Auditing and BCM
Forming deep relationships with your clients
ISO 27001:2013 IS audit plan - by software outsourcing company in india
ISO 27001:2013 - Changes
100% cloud: Your action plan for success
Slum Improvement Action Plan (SIAP) NUSP2 Kota Batam
Ad

Similar to S nandakumar_banglore (20)

PPT
2008: Web Application Security Tutorial
PDF
Standards & Framework.pdf
PPT
Standards & Framework.ppt
PPTX
Arvind Mehrotra
PDF
A Major Revision of the CISRCP Program
PPTX
Cybersecurity Standards & laws and Penalties
PPT
5 Standards And Recommendations For Information Security On Internet
PPTX
102 Information security standards and specifications
PDF
Causes And Consequences Of Data Leakage
PPTX
ISACA ISSA Presentation
PPTX
Professional designations in it governance
PPTX
Professional Designations in IT Governance
PPT
Smart security solutions for SMBs
PDF
Aujas incident management webinar deck 08162016
PPT
Pci Europe 2009 Underside Of The Compliance Ecosystem
PPT
PCI DSS Compliance and Security: Harmony or Discord?
PPT
It Audit And Forensics
PPT
Information security management v2010
PPTX
Automatski - The Internet of Things - Security Standards
PPTX
Information Security Management System ISO/IEC 27001:2005
2008: Web Application Security Tutorial
Standards & Framework.pdf
Standards & Framework.ppt
Arvind Mehrotra
A Major Revision of the CISRCP Program
Cybersecurity Standards & laws and Penalties
5 Standards And Recommendations For Information Security On Internet
102 Information security standards and specifications
Causes And Consequences Of Data Leakage
ISACA ISSA Presentation
Professional designations in it governance
Professional Designations in IT Governance
Smart security solutions for SMBs
Aujas incident management webinar deck 08162016
Pci Europe 2009 Underside Of The Compliance Ecosystem
PCI DSS Compliance and Security: Harmony or Discord?
It Audit And Forensics
Information security management v2010
Automatski - The Internet of Things - Security Standards
Information Security Management System ISO/IEC 27001:2005

More from IPPAI (20)

PPTX
The Move Towards Sustainable Transport in London - Mr. Steve Kearns
PPTX
Standards – building blocks of the Smart City - Michael Mulquin
PPTX
21st Century Grids and India’s journey towards smarter grids - Reji Kumar Pillai
PPTX
Smart City Principles - Rogier van den Berg
POT
TImportance of certification and standardization for Smart Cities - Mr. Raymo...
PPTX
Smart, Secure and Sustainable Cities India – Mr. Trevor Gibson
PPTX
Industry Qualifications India - Cdr(Retd.) Kartik Vig
PPTX
Future cities catapult - Dr. Cathy Mulligan
PPTX
Can the dream of 100% renewable energy be a reality? - Mr. Ken Dragoon
PPTX
Smart Cities, Smart Consequences? - Mr. Devdutt Pattanaik
PDF
From Islands to Cities – Applications for Smart Energy Storage - Dr. Wolfram ...
PPTX
The Road to Smart Cities - Jeet Mistry
PPTX
From Smart Grid to Smart Cities - Richard Schomberg
PPTX
INAUGURAL ADDRESS - Mr. Harry Dhaul
PPT
Future Cities: Innovation, Investment and Transformation - Professor Sir Dav...
PPTX
Smart Water and Waste Management for Smart Cities - Mr. James Dunning
PPTX
SMART SEWAGE TREATMENT PLANTS FOR SMART CITIES IN INDIA, NY USA - Mr. Asim C ...
PPTX
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
PPT
Importance of Innovation for Water and Water Management for Smart Cities - As...
PPTX
Smart Water and Wastewater Management For Smart Cities - Mr. Anjum Parwez
The Move Towards Sustainable Transport in London - Mr. Steve Kearns
Standards – building blocks of the Smart City - Michael Mulquin
21st Century Grids and India’s journey towards smarter grids - Reji Kumar Pillai
Smart City Principles - Rogier van den Berg
TImportance of certification and standardization for Smart Cities - Mr. Raymo...
Smart, Secure and Sustainable Cities India – Mr. Trevor Gibson
Industry Qualifications India - Cdr(Retd.) Kartik Vig
Future cities catapult - Dr. Cathy Mulligan
Can the dream of 100% renewable energy be a reality? - Mr. Ken Dragoon
Smart Cities, Smart Consequences? - Mr. Devdutt Pattanaik
From Islands to Cities – Applications for Smart Energy Storage - Dr. Wolfram ...
The Road to Smart Cities - Jeet Mistry
From Smart Grid to Smart Cities - Richard Schomberg
INAUGURAL ADDRESS - Mr. Harry Dhaul
Future Cities: Innovation, Investment and Transformation - Professor Sir Dav...
Smart Water and Waste Management for Smart Cities - Mr. James Dunning
SMART SEWAGE TREATMENT PLANTS FOR SMART CITIES IN INDIA, NY USA - Mr. Asim C ...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Importance of Innovation for Water and Water Management for Smart Cities - As...
Smart Water and Wastewater Management For Smart Cities - Mr. Anjum Parwez

Recently uploaded (20)

PPTX
A Presentation on Artificial Intelligence
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Modernizing your data center with Dell and AMD
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Encapsulation theory and applications.pdf
PDF
Chapter 3 Spatial Domain Image Processing.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Cloud computing and distributed systems.
PPTX
Big Data Technologies - Introduction.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
A Presentation on Artificial Intelligence
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Modernizing your data center with Dell and AMD
Building Integrated photovoltaic BIPV_UPV.pdf
Encapsulation theory and applications.pdf
Chapter 3 Spatial Domain Image Processing.pdf
The AUB Centre for AI in Media Proposal.docx
Understanding_Digital_Forensics_Presentation.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Network Security Unit 5.pdf for BCA BBA.
Cloud computing and distributed systems.
Big Data Technologies - Introduction.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Advanced methodologies resolving dimensionality complications for autism neur...

S nandakumar_banglore

  • 1. Cyber Crimes and IT Risk Management Nandakumar Shamanna
  • 2.  
  • 3. What makes it different form terrestrial Crime They are easy to learn how to commit They are often not clearly illegal When done leaves no or less trace They require few resources relative to the potential damage caused They can be committed in a jurisdiction without being physically present in it
  • 4. Cyber Terrorism Cyber Squatting Web Jacking Internet Time Thefts Email Bombing Cyber Stalking Salami Attacks Hacking Viruses/Worms/Trojans Data Diddling Cyber Blackmailing Cyber Luring Intellectual Property crimes False Websites Phishing Auction Frauds e-mail Spoofing Cyber Terrorism Pornography Data Interference/Forgery/Interception Credit Card Fraud Network Sabotage DOS Identity Fraud/Theft Source code stealing to name a few
  • 5. Cyber Crimes – Exploding Problem List of Top 20 Countries with the highest rate of Cybercrime (source: BusinessWeek/Symantec) Each country lists 6 contributing factors, share of malicious computer activity, malicious code rank, spam zombies rank, phishing web site hosts rank, bot rank and attack origin, to substantiate its cybercrime ranking. 11. India Share of malicious computer activity: 3% Malicious code rank: 3 Spam zombies rank: 11 Phishing web site hosts rank: 22 Bot rank: 20 Attack origin rank: 19
  • 6. Extent of the Problem Source: National Crime Records Bureau, Statistics of Cyber Crimes, 2007
  • 7. Extent of the Problem 2009 FBI-IC3 Internet Crime Report Friday, April 2nd, 2010
  • 8. Extent of the Problem Ponemon Institute Research Report Publication Date: July 2010
  • 9. Why Is Cyber Attack Possible? Software Has Bugs/Networks Not Designed For Security : Engineering practices and technology used by system providers do not produce systems that are immune to attack Implementation Is Poor : Network and System operators do not have the people and practices to defend against attacks and minimize damage Law And Policy Lag Behind Dependence: Policy and law in cyber-space are immature and lag the pace of change
  • 10. Information Technology – Risk Management
  • 11. Today we are operating in an increasingly more global, complex and demanding risk environment with “zero tolerance” for failure Increased demands for transparency and business sustainability Stricter regulatory requirements Increasing IT vulnerability New risk reality
  • 12. Definition of risk Risk is an event that occurs with a certain frequency/ probability and that has consequences towards one or more goals/objectives Risk Level = Frequency/ Probability combined with Consequence x = DAMAGE ASSET PROBABILITY CONSEQUENCE RISK THREAT EXPLOIT VULNERABILITY
  • 13. Approach - Work process and method Initiation & focusing Uncertainty Identification Risk Analysis Actions Planning Documentation Communication Implementation & follow-up The Risk Management Approach ensures that mapping of risk exposure, treatment of risks and follow-up are carried out in a structured manner
  • 14. Alter the risk Preventive measures reduce the probability of the event Corrective measures reduce the consequence of the event Plan for that event happen Avoid escalation Recovery plan Transfer the risk Disclaim responsibility; write a contract, take out insurance etc. Avoid the risk Eliminate by stopping the activity Accept the risk Continue as before; the activity remains unchanged Actions planning – handling strategy 2 Risk Avoidance Risk Reduction Risk Transfer Risk Acceptance
  • 15. to combat Cyber Crimes Implement Security Systems
  • 16. the solutions…. - Technology Firewalls, Intrusion Prevention System Public Key Infrastructure High Grade Encryption Technologies Optical Fiber Links Vulnerability/Risk Assessment Cyber Forensics Honey Pots VPN Biometrics, Access Control Backups (System Redundancy) Incident Response Actions
  • 17. the solutions…. - Processes Reduction in the Operation flexibility (Segregation of Duties) Effective Organization Procedures and Policies Security/System Auditing Training to the employees Government-to-Government coordination Recognizing Shortage of skilled cyber security workers Creation of Cyber Army Cooperation & Information Sharing Investment in information assurance systems Increased R&D funding Development of cyber ethics Mutual cooperation with law enforcement
  • 18. Security Models and Frameworks
  • 19. ISO 27000 Series - Published standards ISO/IEC 27000 — Information security management systems — Overview and vocabulary ISO/IEC 27001 — Information security management systems — Requirements ISO/IEC 27002 — Code of practice for information security management ISO/IEC 27003 — Information security management system implementation guidance ISO/IEC 27004 — Information security management — Measurement ISO/IEC 27005 — Information security risk management ISO/IEC 27006 — Requirements for bodies providing audit and certification of information security management systems ISO/IEC 27011 — Information security management guidelines for telecommunications organizations based on ISO/IEC 27002 ISO/IEC 27033-1 - Network security overview and concepts ISO 27799 - Information security management in health using ISO/IEC 27002 [standard produced by the Health Infomatics group within ISO, independently of ISO/IEC JTC1/SC27]
  • 20. ISO 27000 Series - In preparation ISO/IEC 27007 - Guidelines for information security management systems auditing (focused on the management system) ISO/IEC 27008 - Guidance for auditors on ISMS controls (focused on the information security controls) ISO/IEC 27013 - Guideline on the integrated implementation of ISO/IEC 20000-1 and ISO/IEC 27001 ISO/IEC 27014 - Information security governance framework ISO/IEC 27015 - Information security management guidelines for the finance and insurance sectors ISO/IEC 27031 - Guideline for ICT readiness for business continuity (essentially the ICT continuity component within business continuity management) ISO/IEC 27032 - Guideline for cybersecurity (essentially, 'being a good neighbor' on the Internet) ISO/IEC 27033 - IT network security, a multi-part standard based on ISO/IEC 18028:2006 (part 1 is published already) ISO/IEC 27034 - Guideline for application security ISO/IEC 27035 - Security incident management ISO/IEC 27036 - Guidelines for security of outsourcing ISO/IEC 27037 - Guidelines for identification, collection and/or acquisition and preservation of digital evidence
  • 21. C OBI T ISACA (Information Systems Audit and Control Association) ‏ Four phases/domains: Planning and Organization Acquisition and Implementation Delivery and Support Monitoring Common Criteria (CC) ‏ Common Criteria for Information Technology Security Evaluation ISO 15408 not a security framework not even evaluation standard Framework for specification of evaluation Protection Profile (PP) ‏ Evaluation Assurance Level (EAL 1-7) ‏ FISMA Federal Information Systems Management Act – US National Information Assurance Certification and Accreditation Process (NIACAP) ‏ National Institute of Standards and Technology outline, Defense Information Technology Systems Certification and Accreditation Process (DITSCAP) ‏ Director of Central Intelligence Directive 6/3
  • 22. ITIL Information Technology Infrastructure Library management guidelines Incident response Problem management Change management Release management Configuration management Service desk management Service level management Availability Capacity management Service continuity IT financials IT workforce/HR management Information Security Forum (ISF) ‏ Standard of Good Practice for Information Security 5 "aspects" Security Management Critical Business Applications Computer Installations Networks Systems Development broken out into 30 "areas," and 135 "sections"
  • 23. NIST library of freely available resources http://csrc.nist.gov Information Security Handbook: A Guide for Managers 800-100 Recommended Security Controls for Federal Info Systems 800-53 Guide to Information Technology Security Services 800-35 Risk Management Guide for Information Technology Systems 800-30 Engineering Principles for Information Technology Security 800-27 Guide for Developing Security Plans for Federal Info Systems 800-18 Generally Accepted Principles and Practices for Securing Information Technology Systems 800-14 An Introduction to Computer Security: The NIST Handbook 800-12 Security Self-Assessment Guide for Information Technology Systems 800-26 PCI Payment Card Industry Data Security Standards 6 Control Objectives 12 Requirements
  • 24. Securities and Financial Basel II bank solvency “ operational risk” COSO Committee of Sponsoring Organizations of the Treadway Commission, Enterprise Risk Management Integrated Framework internal controls SOX RFC 2196 is memorandum published by Internet Engineering Task Force for developing security policies and procedures for information systems connected on the Internet. RFC 2196 Statement on Auditing Standards No. 70: Service Organizations SAS 70 provides guidance to service auditors when assessing the internal controls of a service organization and issuing a service auditor’s report. SAS 70 also provides guidance to auditors of financial statements of an entity that uses one or more service organizations.
  • 25. The CALDER-MOIR IT Governance Framework There are many IT-related management frameworks, standards and methodologies in use today. None of them, on their own, are complete IT governance frameworks, but they all have a useful role to play in assisting organizations manage and govern their IT operations more effectively. The CALDER-MOIR IT Governance Framework is designed to help you get maximum benefit from all these overlapping and competing frameworks and standards, and also to deploy the best practice guidance contained in the international standard for IT governance, ISO/IEC 38500. 
  • 26. Governance & Cyber Crime - Cost Comparison Ponemon Institute Research Report Publication Date: July 2010
  • 27. Cyber Crimes and Law Electronic Signature Laws U.S. - Electronic Signatures in Global and National Commerce Act U.S. - Uniform Electronic Transactions Act - adopted by 46 states U.S. - Digital Signature And Electronic Authentication Law U.S. - Government Paperwork Elimination Act (GPEA) U.S. - The Uniform Commercial Code (UCC) UK - s.7 Electronic Communications Act 2000 European Union - Electronic Signature Directive (1999/93/EC) Mexico - E-Commerce Act [2000] Costa Rica - Digital Signature Law 8454 (2005) Australia - Electronic Transactions Act 1999 (Cth) (also note that there is State and Territory mirror legislation) Information Technology Law Computer Misuse Act 1990 Florida Electronic Security Act Illinois Electronic Commerce Security Act Texas Penal Code - Computer Crimes Statute Maine Criminal Code - Computer Crimes Singapore Electronic Transactions Act Malaysia Computer Crimes Act Malaysia Digital Signature Act UNCITRAL Model Law on Electronic Commerce Information Technology Act 2000 of India
  • 28. Cybercrime provisions under IT Act,2000 Offences & Relevant Sections under IT Act Tampering with Computer source documents Sec.65 Hacking with Computer systems, Data alteration Sec.66 Publishing obscene information Sec.67 Un-authorized access to protected system Sec.70 Breach of Confidentiality and Privacy Sec.72 Publishing false digital signature certificates Sec.73
  • 29. Implications Failure to comply with the above may result in damages payable for which there is no specified upper limit, besides possible imprisonment of upto 7 years. It is also necessary for Companies to understand that even if any of their employees contravene the provisions of the Act including committing of such personal offences such as searching for child pornography using the corporate network, then there could be vicarious liabilities on the organization and its Directors and Executives. Prevention of these liabilities requires a Cyber Law Compliance Programme with special focus on IT Act 2008. Even if the organization is ISO 27001 certified, it is recommended that the organization should review its security and examine IT Act 2008 compliance.
  • 30. Conclusion Capacity of human mind is unfathomable. It is not possible to eliminate cyber crime from the cyber space. However it is quite possible to check them. The only possible steps to counter Cyber crimes are to to make people aware of their rights and duties (to report crime as a collective duty towards the society) making the application of the laws more stringent to check crime to implement good systems and governance models to reduce the possibilities of cyber crimes to bring about increased awareness amongst the law keepers of the state on Cyber crimes
  • 31. Safeguarding life, property and the environment www.dnv.com

Editor's Notes

  • #12: 22 December 2010 The new risk reality is a statement that illustrates the increased complexity of society. Picture 1: (Prestige sinking) Extreme environmental focus. Compliance, or lack of compliance? A symbol of a shipping accident. Picture 2: (Enron USA) Expectations on ethical standards in business. Demonstrates consequences of poor ethics. A symbol of corporate failure. Picture 3: (microphones) Requirements on transparency from media and non-governmental organisations (NGO) on the rise. Picture 4: (air pollution) Climate change is a consequence of human activity and pollution. Changes in weather patterns and more frequent natural catastrophes are risks business must take into account.
  • #13: 22 December 2010 Different definitions exists for Risk, let’s not go too deep into that now But the scales for probability and Consequence/Impact needs to be agree
  • #14: 22 December 2010 These are the core activities in regular Risk Management Often this exists and relevant risks may be found there, in addition findings from the BC Risk Assessment should be included in this risk picture
  • #15: 22 December 2010
  • #22: 22 December 2010 Widely used and, until the rise of BS 7799-1, probably the most recognized of the security frameworks, COBIT (Control OBjectives for Information and related Technology) is directed at information security. However, it should be noted that COBIT was created by a specific group and intended for a specific purpose. COBIT was created by ISACA (which used to be known as the Information Systems Audit and Control Association). Auditability is key to the COBIT, and the accounting and management background definitely shows in the choice of items in the COBIT list. Much of the activity suggested relates to measurement, performance, and reporting. Thus, in a sense, most of COBIT concentrates on what can be counted and demonstrated, sometimes disregarding what might actually be effective.
  • #23: 22 December 2010 The United States' Federal Information Systems Management Act mandates certain standards of information security and controls for US federal agencies. The legislation states that standards must be applied, but the standards are different for different agencies and applications. Detailed instructions can be found in directives for the military (Defense Information Technology Systems Certification and Accreditation Process or DITSCAP), the intelligence community (Director of Central Intelligence Directive 6/3 or DCID 6/3), and more generally the National Information Assurance Certification and Accreditation Process (NIACAP). The National Institute of Standards and Technology also has outlines.
  • #24: 22 December 2010 It really isn't fair to compare the Computer Security Resource Center (CSRC) of the United States' National Institute of Standards and Technology, with the security frameworks we have been discussing. The centre (which, even though it is only one office of the institute, is generally known simply as NIST in the security community) provides a wealth of security information and resources, which are freely available at the Website at http://csrc.nist.gov. The publications section is particularly useful, with a constantly updated stream of guidelines and aids, particularly the 800 series documents.
  • #25: 22 December 2010 As should be clear to everyone in both fields, the financial securities industry has very little to do with computer or information security, despite a heavy reliance on the technology. However, recent concerns in that community have concentrated on the area of internal controls, which have application in reviewing controls and safeguards, particularly in regard to insider attacks. This reference is shorthand for the second report from the Basel Committee on Banking Supervision, Risk Management Principles for Electronic Banking. Basel II Accord also looks at operational risk, which is more in line with the risk management that infosec people know and love. Shorthand for the Committee of Sponsoring Organizations of the Treadway Commission, Enterprise Risk Management Integrated Framework. Shorthand for the Committee of Sponsoring Organizations of the Treadway Commission, Enterprise Risk Management Integrated Framework. COSO outlines a three dimensional framework for examining controls. The United States' Sarbanes-Oxley law (frequently referred to as Sarbox or SOX) emphasizes that corporate management is responsible for the reliability of financial reports about publicly traded companies. Section 404 (and also 302, in a marvelous confusion with Web result codes) notes that the integrity of information systems supporting these financial reports must also be managed.