Risk Management and Cyber Security
Risk Management and Cyber Security
Risk Management and Cyber Security
<Name>
Fall 2017
1
Abstract
The way in which an organization prepares for a data protection breach - and manages it if it
occurs - has a measurable effect on the impact of such an infringement. By effectively managing
such an incident, which can cost millions of dollars and ruin an organization's reputation, it can
be controlled and dramatically reduce the severity of its consequences. This paper discusses on
the cyber security attacks and the risk mitigation planning to save the millions lost due to
security breaches. The importance of cyber security is critical as the world is increasingly going
online. Virtually everything is being kept online on the local computers, network, and emails and
even on cloud servers. People are increasingly dependent on the systems and this entails that the
systems should be up and running at all times. The dependency has become almost 24 X 365, so
this means that the systems must be available all days. In the wake of this dependency, securing
the systems is of utmost importance. There is lot of threats due to which the security of the
systems is at risk. There are internal as well as external threats to the cyber security. Controlling
and managing the cyber security risks is the object of this research paper.
2
Risk Management and Cyber Security
Proliferation of data
Personal information is defined as data that can be used to identify a person, and their collection
creates privacy obligations (explaining the existence of privacy laws). With technological
advances, organizations are collecting, retaining and transferring more personal information
about consumers, professionals, patients and employees than ever before. The accumulation of
large amounts of personal information in huge databases increases the risk of unauthorized
access to information and the consequences that may result. A single attack on the protection of
personal data can affect millions of people today. The increasing adoption of biometric
identifiers (fingerprints or vocals, facial recognition, etc.) by companies now creates new risks,
namely the loss or misuse of these immutable identifiers (Johnston and Walker, 2004).
3
seasoned team is a great help in avoiding chaos because it keeps key stakeholders informed and
focuses their efforts on identified priorities. More importantly, this plan helps to organize
emergencies and can curb scattered reactions or the irrepressible need to "do something". In
addition, rigorously orchestrated intervention reduces costs and prevents external suppliers from
taking up too much space, helps preserve evidence that the organization has complied with
applicable standards of care, and minimizes the risk of reputation.
4
regulators.
A cyber security program consists of a cyber security framework and an action plan. A cyber
security framework is proactive and consists of a set of organizational resources, including
policies, personnel, processes, practices and technologies to assess and mitigate cyber-attacks.
An intervention plan must be reactive. It is a company-wide initiative that establishes a protocol
for the entire organization, assigns responsibilities, and defines follow-up actions to the
organizational efforts to resolve incidents. It must include specific elements and covers a wide
range of disciplines. Above all, it must be comprehensive and detailed, and not just simple
check-boxes or lists of things to do (Kondakci, 2010).
Governance
Cyber security is not just about addressing information technology risks. It also takes into
account risks at the company level. Therefore, it should be part of the overall risk management
mandate of the board of directors. The board of directors must address the issue of cyber
security. In June 2014, Securities and Exchange Commission (SEC) Commissioner Luis Aguilar
spoke to the NYSE about the cyber security risks for the Board, saying that the incidents have
frequency and complexity, and they have become more expensive for companies. He highlighted
the role of boards of directors, stressing their responsibility to ensure that the company's cyber
security measures are appropriate in their role of risk oversight (Yulia, 2015).
The IT defenses of the organization are a vital aspect of risk management - are they adequate,
up-to-date and adapted to known threats? It is important that the organization subscribe to a
comprehensive and legitimate threat assessment service, such as cyber security bulletins and best
practices documents. There are also industry and sector groups dedicated to information sharing.
An organization must therefore install standard software to protect against viruses and malware,
ensure that it is regularly updated and documented, protect its networks, including wireless
networks, from internal and external attacks using standardized methods , such as firewalls and
systems for the continuous detection of malicious software, conduct regular penetration tests
5
(ideally carried out by an independent third party) and implement technical solutions for
detecting and blocking suspicious activities or accesses (Lv, 2009).
Social engineering attacks must also be considered, and organizations should consider training
their employees on how to avoid being a victim of phishing, the dangers of "bad twins" (Wi-Fi
hotspots which appear to be legitimate access points on the spot but actually created by hackers
to intercept wireless communications, many users connect their laptop or mobile phone to the
hacker's fraudulent access point, which presents itself as a legitimate supplier and on USB sticks
that seem to have been mislaid, but which in fact were deliberately infected with malicious
software and left on the spot.
Bibliography
Johnston, D. and Walker, J. (2004). Overview of IEEE 802.16 security, Security and Privacy,
vol. 2, no. 3, pp. 4048.
Kondakci, S. (2010). A causal model for information security risk assessment, Proceedings of
the 6th International Conference on Information Assurance and Security (IAS) Conference, pp.
143148.
Lv, H. (2009). Research on network risk assessment based on attack probability, Proceedings of
the 2nd International Workshop on Computer Science and Engineering, WCSE 09, vol. 2, pp.
376381,
Yulia, C. (2015). A Review of Cyber Security Risk Assessment Methods. Available at the
British Library, reference UIN: ETOCvdc_100030733535.0x000001.