Knight Talks Tech

Introduction to cyber security – Week 8, Managing security risks

Information as an asset

Information is valuable but can be lost or stolen.
Considering information as an asset allows creation of strategies for protecting info and minimising consequences of disaster.
Information assets vary by organisations/individuals:

Risk management

Imperatives & incentives

Your own information assets

Review of information assets list made earlier in course.

Risk analysis

Identification, analysis and management of risks.
Risk – chance of adverse consequences or loss occurring.
Main technique for qualitative risk analysis – likelihood-impact matrix
Basic form is two-by-two grid

Results in rank order for tackling risks:

Look at high-impact or high-likelihood risks & identify ways to mitigate.
Apply quantitative techniques, financial assessment of impact, to rank order with greatest at top.

Risk analysis in practise

Successful attack on email, banking details or passwords would have a high impact and due to their value, there is a high likelihood of them being attacked. Therefore they would be placed in High impact/High likelihood.
Study materials or personal photographs would have a high impact if they were attacked but the likelihood is low so would be High impact/Low likelihood.
Digital music and movies would have low impact if stolen as they could be obtained again but they may be of value to someone so could be Low impact/High likelihood.

Staying safe online

Stay up to date

Do the basics

  1. Set up personal firewall
  2. Install antivirus
  3. Make backups
  4. Require passwords to login and unlock screen
  5. Use hard disk encryption

Fix your email

Fix your browser

Cookies track use of the web.
Third-party cookies are of no use to the user.
Use “Fix Your Browser” PDF to improve security of web browser.

Risk management in practise

Having analysed the situation, decide what to do.
Identify cost-effective countermeasures to use:

Protecting your information assets

Review personal information asset list made earlier in course, consider following:

What should I do next?

Review again information asset list and determine what else can be done to protect information.
Create information security plan based on risk analysis of information assets.
Implement identified countermeasures.

Tracking a moving target

Old technologies retired leaving users exposed to bugs and security weaknesses.
New threats discovered every day, i.e. Heartbleed bug.
Heartbleed affected at least half a million websites.
Exposed bug in OpenSSL’s heartbeat function used to verify connection from remote machine is still established.
Bug allows for fake heartbeat to be returned with it taking potentially site certificate, unencrypted credentials or valuable information.
Introduced in version of OpenSSL released in 2012, present in all versions since until April 2014.
Present of sites including Yahoo and Flickr among others.
Discovered by two groups of researchers including people at Google. Worked together to resolve issue before public announcement. Possible they weren’t the first to find Heartbleed.
Response to Heartbleed

Your questions answered

Keeping data safe in cloud

Resources

How to Easily Encrypt Files on Windows, Linux, and Mac OS X
Open Learn resources relating to cyber security

Exit mobile version