Cyber Security

World

“…A computer system is no more secure than the persons responsible for its operation…”

Cybersecurity, is much more than information security applied to IT assets.

Serious financial damage has been caused by security breaches, but because there is no standard model for estimating the cost of an incident, the only data available is that which is made public by the organizations involved.

There are a big number of different vulnerabilities in relation of the type of assets:
a) Denial-of-service attack
b) Backdoors
c) Exploits
d) Direct access attacks
e) Eavesdropping
f) Indirect attacks

There are different type of countermeasures:

1) Security and systems design
2) Security measures
3) Difficulty with response
4) Reducing vulnerabilities
5) Security by design
6) Security architecture
7) Hardware protection mechanisms
8) Secure operating systems
9) Secure coding
10) Capabilities and access control lists
11) Hacking back

To expand the details about these topics and others in relation of Cyber Security,
see here: http://www.slideshare.net/RamiroCid/cyber-security-41376829

Cyber Security Awareness

Hacking BrainstormingCybersecurity, also known as “IT security” or “Computer security” is information security applied to computing devices such as servers, computers and mobile devices (as smartphones, tablets), etc., as well as computer networks such as private and public networks, including the whole Internet.

Network outages, data compromised by hackers, social attacks, computer viruses and other security incidents could affect our lives in ways that range from inconvenient to life-threatening. As the number of mobile users and devices, web applications and data networks increase, so do the opportunities for exploitation.

The 3 principles of Information, confidentiality, integrity and disponibility are protected by Cybersecurity.

People is often the weak link in the chain in IT Security. The best technical security efforts will fail if their company has a weak security culture. Companies which want to have a correct IT Security Awareness need to develop a plan to do the rollout of trainning about this awareness.

More data about the Cyber Security Awareness here: http://www.slideshare.net/RamiroCid/cyber-security-awareness-41375715

 

ISO 22301 Business Continuity Management

The ISO 22301 Societal security – Business continuity management systems – RequirementsISO22301
is the standard created by leading experts on this area to provide the best framework for business continuity management in an organization.

ISO 22301 is not that different from BS 25999-2 in most business continuity areas like business impact analysis, strategy or planning; the biggest changes are in the management part of the standard.

Object:
ISO 22301:2012 specifies requirements to plan, establish, implement, operate, monitor, review, maintain and continually improve a documented management system to protect against, reduce the likelihood of occurrence, prepare for, respond to, and recover from disruptive incidents when they arise.

Scope:
The requirements specified in ISO 22301:2012 are generic and intended to be applicable to all organizations, or parts thereof, regardless of type, size and nature of the organization. The extent of application of these requirements depends on the organization’s operating environment and complexity.

If an organization wants to implement this standard, the following documentation is mandatory:

  • List of applicable legal, regulatory and other requirements
  • Scope of the BCMS
  • Business Continuity Policy
  • Business continuity objectives
  • Evidence of personnel competences
  • Records of communication with interested parties
  • Business impact analysis
  • Risk assessment, including risk appetite
  • Incident response structure
  • Business continuity plans
  • Recovery procedures
  • Results of preventive actions
  • Results of monitoring and measurement
  • Results of internal audit
  • Results of management review
  • Results of corrective actions

More data about the ISO 22301 in: http://www.slideshare.net/RamiroCid/iso-22301-business-continuity-management

Comparison between ISO/IEC 27001:2013 and ISO/IEC 27001:2005

ISO_IEC_27001_2013

There are some important changes introduced on version ISO/IEC 27001:2013

Regarding the structure of this new version:

More Domains:

14 domains in version 2013 instead of 11 in version 2005.
The 3 new domains are:

  • A.10: Cryptographic technology
  • A.12: Operational security
  • A.15: Security for suppliers and third parties

Less Controls:

114 controls in version 2013 instead 133 in version 2005
The new controls are:

  • A.6.1.5 Information security in project management
  • A.12.6.2 Restrictions on software installation
  • A.14.2.1 Secure development policy
  • A.14.2.5 Secure system engineering principles
  • A.14.2.6 Secure development environment
  • A.14.2.8 System security testing
  • A.15.1.1 Information security policy for supplier relationships
  • A.15.1.3 Information and communication technology supply chain
  • A.16.1.4 Assessment of and decision on information security events
  • A.16.1.5 Response to information security incidents
  • A.17.2.1 Availability of information processing facilities

More data about the comparison of these 2 versions in: http://www.slideshare.net/RamiroCid/iso-270012013

ISO 31000:2009, Risk management

ISO31000The ISO 31000:2009 is a standard published on the 13th of November 2009, and provides a standard on the implementation of risk management which provides principles, framework and a process for managing risk. It can be used by any organization regardless of its size, activity or sector.

Using ISO 31000 can help organizations increase the likelihood of achieving objectives, improve the identification of opportunities and threats and effectively allocate and use resources for risk treatment.

ISO 31000 family is expected to include:

* ISO 31000:2009 – Principles and Guidelines on Implementation
* ISO/IEC 31010:2009 – Risk Management – Risk  Assessment Techniques
* ISO Guide 73:2009 – Risk Management – Vocabulary

For more details, read this article published on Slideshare:
http://www.slideshare.net/RamiroCid/iso-31000-risk-management-30985355