SlideShare une entreprise Scribd logo
1  sur  15
Addressing Cyber Security
Presented by: Femi Ashaye
 What is Cyber Security?
 Cyber Security Cases
 Cyber Security Strategy
 A Risk Based Approach
 Managing Cyber Attacks.. CHECK and ACT
 The Bigger Picture!!
Agenda
What is Cyber Security??
 Protection of ICT system, network and data in Cyber Space (i.e. any communications
environment, particularly the Internet).
 Protection through prevention, detection and response to attacks from wide Cyber
Threats such as Cyber Crime, Cyber Terror, Cyber Espionage,  Cyber War etc..
 Impact Governments, Financial Organisations, Critical National Infrastructures,
Individuals etc.. at significantly different levels of technical sophistication.
 Exploits varied Cyber Space offerings (e.g. Cloud, Mobile, Social Networking, Shopping,
Online Games etc..) not previously dealt with in traditional Information Security World.
Cyber Security Cases
 Student, After Delay, Is Charged In Crippling of Computer Network "After more than
eight months, the Justice Department said yesterday that a Federal grand jury in Syracuse
had indicted the 24-year-old Cornell University graduate student who has been blamed for
crippling a nationwide computer network with a rogue software program... The student,
Robert Tappan Morris, was charged with a single felony count under a 1986 computer
crimes law, the Computer Fraud and Abuse Act ..." The New York Times (27 July 1989)
 Youth Sentenced in Government Hacking Case "A 16-year-old from Miami who
repeatedly penetrated computer systems of the Defense  Department and the space agency
has been sentenced to six months in juvenile  detention. The Justice Department said he is
the first juvenile hacker to be sentenced to serve time..." The New York Times (23 Sept
2000)
Cyber Security Cases (cont’d..)
 Downloaded music by Jay-Z ... all I got was snooped, dog "Fans of rapper Jay-Z
who thought they'd grabbed hold of an app granting them access to an early release of his
new album Magna Carta Holy Grail have found themselves on the receiving end of an anti-
PRISM Android Trojan designed to slurp all their data..." The Register (05 July 2013)
Cyber Security Strategy
 United Kingdom - Cyber Security Strategy
 Improving knowledge, capabilities and decision-making
 Reducing risk from the UK’s use of cyber space
 Exploiting opportunities in cyber space
 United States - Comprehensive National Cyber Security Initiative
 Establish a front line of defence against today’s immediate threats
 Defend against the full spectrum of threats
 Strengthen the future cyber space environment
 Similar goals - Understand Cyber Space offerings to exploit the opportunities it delivers
and address its risks.
However Governments are breaking their own privacy laws on wire snooping to understand
and combat Cyber Threats!!!
A Risk Based Approach
 Risk based approach with emphasis on likelihood of most dangerous attacks on assets
with most impact to the organisation needs to be applied.
 Objective feedback from existing controls to assess exposure to, and deal
instantly with Cyber Threats. 
 Interrelated international standards already exist to support this approach:
 ISO27001 (Design and develop Information Security Controls, Processes and Awareness)
 ISO27005 (Manage Information Security Risks) 
 ISO27035 (Manage Information Security Incidents)
 ISO27001 and ISO 27005 uses Deming Cycle for development, maintenance and
improvement of Information Security:
Plan->Do->Check->Act->Plan->Do->Check->Act->Plan->.... (Anticlockwise 0)
 Deming Cycle is more linear to address Cyber Security concentrating on maintenance
and improvement exercises to deal with growing Cyber Threats at a faster pace:
   Plan->Do->Check->Act->Check->Act->Check->Act->Check->.... (Anticlockwise 6)
A Risk Based Approach.. (continue)
 ISO standards cover following processes and activities to aid Cyber Security:
 Understanding of actual business context information and security related context information
(PLAN)
 Risk Assessments conducted to understand likelihood of threats and vulnerabilities
and impact to the organisation (PLAN and CHECK)
 Awareness for the need, and responsibility, for security by all parties (DO)
 Security design and implementation of controls commensurate to assessed risk (PLAN and
DO)
 Prevent, detect and respond to security incidents including review of existing state of
security (CHECK and ACT).
 Measurement of control effectiveness and maturity of overall security to enable when,
where and how to improve overall security posture (CHECK and ACT).
A Risk Based Approach.. (continue)
Acceptable Risk =
Monitor To Ensure
stability
Significant Risk =
Appropriate Actions
Required
Critical Risk =
Immediate Actions
Required
Acceptable Risk =
Monitor To Ensure
stability
Significant Risk =
Appropriate Actions
Required
Significant Risk =
Appropriate Actions
Required
Negligible Risk =
No Action Required
Acceptable Risk =
Monitor To Ensure
stability
Acceptable Risk =
Monitor To Ensure
stability
LOW MEDIUM HIGH
HIGHMEDIUMLOW
<<<<<<<<< Impact (Assets) >>>>>>>>>
<<<Likelihood(ThreatsxVulnerabilities)>>>
<<<<<<RiskRelatedInformation>>>>>>
<<<<<<<< Risk Related Information >>>>>>>>
Managing Cyber Attacks.. CHECK and ACT
 Identify Cyber Space assets, threats, vulnerabilities and appropriate controls (i.e. risk
related information) to address:
 IF we are to be attacked what should we have in place to PREVENT an attack?
 WHEN we are attacked what should we have in place, and how, to DETECT the attack? And
can we RESPOND to it and PREVENT it from happening again?
 To address WHEN situation, Preventative and Detective controls need to be
implemented to discover, and protect important assets from, attacks. These controls are
prime sources for providing risk related information as events in real time.
 Event monitoring provides recording of risk related information such as:
 Malicious traffic to specific systems
 Suspicious activity across domain boundaries
 User session activity.. and more...
Managing Cyber Attacks.. (..continue)
Threat
Firewall
Identity and Access Manager
DLP
Vulnerability
Vulnerability Scanner
Asset
Preventative and Detective Controls
IDS/IPS
Suspicious Login or
Access Event
Malicious Port
Scanning
Event
Malware
Event
Data Theft
Event
Mitigates or stop
attack against...
Discovers attack
against..
Suspicious Network
Access Event
Application; DB and OS
etc.. information
Asset
Inventory and
compliance
Information
Un-patched
OS/Application
Denial of
Service
Event
Mounts attack
on..
Can be
exploited
on,,
Discovers
and protects
against
Discovers
and
protects
against.
 Threat Correlation/Aggregation
 Vulnerability Correlation/Aggregation
 Asset Correlation/Aggregation
 Event Logging and Reporting
Risk Information
SIEM & Logger
AV Gateway
ALARM Security Incidents 
Managing Cyber Attacks.. (..continue)
 SIEM (Security and Information Event Management) requires understanding of
business and security related context information to enable:
 Correlation and aggregation of event data (i.e. risk related information) for risk
assessment
 Capability to generate alarms against security incidents
 Not all tools can help in instantaneously managing, preventing or detecting all threats
and attacks. Computer Forensics provides a methodology to address:
 Unknown threats and attacks not picked up as part of security monitoring
 How, where and when such threats were realised
 Real time assessment of threats and vulnerabilities provides understanding of the
effectiveness of controls and risks to assets.
 Measurement of control effectiveness can be obtained through a combination of
output of incidents; events and information acquired through forensics investigation.
Managing Cyber Attacks.. (..continue)
Acceptable Event
= Monitor To Ensure
stability (e.g. Admin
is logged on to
Catalogue Server
for > 8 hours)
Significant Event =
Appropriate Actions
Required (e.g.
Malicious script on
company’s Intranet
portal)
Critical Event =
Immediate Actions
Required (e.g.
Worm discovered
on air traffic
control system)
Acceptable Event =
Monitor To Ensure
stability
Significant Event =
Appropriate Actions
Required
Significant Event =
Appropriate Actions
Required
Negligible Event =
No Action Required
(e.g. Legitimate
user carries out a
wrong search on
Catalogue server.)
Acceptable Event =
Monitor To Ensure
stability
Acceptable Event =
Monitor To Ensure
stability
LOW MEDIUM HIGH
HIGHMEDIUMLOW
<<<<<<<<< Impact (Assets) >>>>>>>>>
<<<Likelihood(ThreatsxVulnerabilities)>>>
<<<<Correlated/AggregatedEvents>>>>
<<<<<<< Correlated/Aggregated Events >>>>>>>>
The Bigger Picture!!
 Addressing Cyber Security is not so fundamentally different to Information Security.
 Main difference is keeping up with growing opportunities and challenges (i.e. risks) in
Cyber Space. These differences are created by:
 Expanding technology and new, but converging, service offerings (e.g. cloud, social
networking and mobile) landscape in the past twenty or so years.
 The business and user interaction with new services like social networking and it's impact on
personal data privacy, politics, etc..
 Risk based approach required to fully understand the scale and impact of Cyber Threats.
 Indicators for risk exposure and control effectiveness identifies key risks over time.
 Data and system centric processes and key controls already exists for dealing with Cyber
Threats.
 Might require help from other disciplines such as criminologists, sociologists, psychologists.
lawyers etc.. leading to people and behaviour centric controls.
 Additional control types required but continuous maintenance and improvement activities
to deal with risk at real time is important.
The Bigger Picture!!.. (continue)
 Approach covers risk identified across people and process activities not just technical.
 Existing Information Security related standards, regulations and guidelines important to
risk based approach for addressing Cyber Security.
 Changes to old legislation, and new legislations, on computer misuse, fraud and abuse
aim to further tighten the noose on individuals involved in Cyber Security breaches.
Thank You!!Thank You!!

Contenu connexe

Tendances

Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...Shah Sheikh
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016Shannon G., MBA
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-EraJK Tech
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and ComplianceAnton Chuvakin
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016Sarah Bark
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecturePriyanka Aash
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Lancope, Inc.
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterSpanning Cloud Apps
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Asia Pte Ltd
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber securityInderjeet Singh
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...Aladdin Dandis
 

Tendances (20)

Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessAddressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to Success
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Cyber Security for Digital-Era
Cyber Security for Digital-EraCyber Security for Digital-Era
Cyber Security for Digital-Era
 
A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges A Strategy for Addressing Cyber Security Challenges
A Strategy for Addressing Cyber Security Challenges
 
Audit logs for Security and Compliance
Audit logs for Security and ComplianceAudit logs for Security and Compliance
Audit logs for Security and Compliance
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016SOC 3.0: strategic threat intelligence May 2016
SOC 3.0: strategic threat intelligence May 2016
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
 
How to Recover from a Ransomware Disaster
How to Recover from a Ransomware DisasterHow to Recover from a Ransomware Disaster
How to Recover from a Ransomware Disaster
 
Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service Netpluz Managed SOC - MSS Service
Netpluz Managed SOC - MSS Service
 
Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...The role of big data, artificial intelligence and machine learning in cyber i...
The role of big data, artificial intelligence and machine learning in cyber i...
 

En vedette

E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachFemi Ashaye
 
Pratik Desai Ph.D dissertation defense
Pratik Desai Ph.D dissertation defensePratik Desai Ph.D dissertation defense
Pratik Desai Ph.D dissertation defensePratik Desai, PhD
 
Implementing ASP.NET Role Based Security
Implementing ASP.NET Role Based SecurityImplementing ASP.NET Role Based Security
Implementing ASP.NET Role Based SecurityDean Willson
 
MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)Soetam Rizky
 
ITIL v3 Foundation Overview
ITIL v3 Foundation OverviewITIL v3 Foundation Overview
ITIL v3 Foundation Overviewadabbas
 
It infrastructure hardware and software
It infrastructure hardware and softwareIt infrastructure hardware and software
It infrastructure hardware and softwareProf. Othman Alsalloum
 
History of Business Intelligence
History of Business IntelligenceHistory of Business Intelligence
History of Business IntelligenceNic Smith
 
Big Data & Hadoop Tutorial
Big Data & Hadoop TutorialBig Data & Hadoop Tutorial
Big Data & Hadoop TutorialEdureka!
 
Hadoop introduction , Why and What is Hadoop ?
Hadoop introduction , Why and What is  Hadoop ?Hadoop introduction , Why and What is  Hadoop ?
Hadoop introduction , Why and What is Hadoop ?sudhakara st
 

En vedette (16)

E-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture ApproachE-RBAC Development - A Risk Based Security Architecture Approach
E-RBAC Development - A Risk Based Security Architecture Approach
 
Pratik Desai Ph.D dissertation defense
Pratik Desai Ph.D dissertation defensePratik Desai Ph.D dissertation defense
Pratik Desai Ph.D dissertation defense
 
Implementing ASP.NET Role Based Security
Implementing ASP.NET Role Based SecurityImplementing ASP.NET Role Based Security
Implementing ASP.NET Role Based Security
 
Role Based Access Control - Overview
Role Based Access Control - OverviewRole Based Access Control - Overview
Role Based Access Control - Overview
 
IT Infrastructure and Platforms
IT Infrastructure and PlatformsIT Infrastructure and Platforms
IT Infrastructure and Platforms
 
MIS - IT Infrastructure (Part I)
MIS  - IT Infrastructure (Part I)MIS  - IT Infrastructure (Part I)
MIS - IT Infrastructure (Part I)
 
ITIL v3 Foundation Overview
ITIL v3 Foundation OverviewITIL v3 Foundation Overview
ITIL v3 Foundation Overview
 
Intro To Hadoop
Intro To HadoopIntro To Hadoop
Intro To Hadoop
 
It infrastructure hardware and software
It infrastructure hardware and softwareIt infrastructure hardware and software
It infrastructure hardware and software
 
History of Business Intelligence
History of Business IntelligenceHistory of Business Intelligence
History of Business Intelligence
 
Big Data & Hadoop Tutorial
Big Data & Hadoop TutorialBig Data & Hadoop Tutorial
Big Data & Hadoop Tutorial
 
Hadoop introduction , Why and What is Hadoop ?
Hadoop introduction , Why and What is  Hadoop ?Hadoop introduction , Why and What is  Hadoop ?
Hadoop introduction , Why and What is Hadoop ?
 
Big data ppt
Big data pptBig data ppt
Big data ppt
 
Big data and Hadoop
Big data and HadoopBig data and Hadoop
Big data and Hadoop
 
What is Big Data?
What is Big Data?What is Big Data?
What is Big Data?
 
Big data ppt
Big  data pptBig  data ppt
Big data ppt
 

Similaire à Addressing cyber security

Improving cyber security using biosecurity experience
Improving cyber security using biosecurity experienceImproving cyber security using biosecurity experience
Improving cyber security using biosecurity experienceNorman Johnson
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewdr_edw777
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbersEoin Keary
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...James Anderson
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationApril Dillard
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthyRussell Publishing
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilienceSymantec
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptxDolchandra
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...North Texas Chapter of the ISSA
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptxSharmilaMore5
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkJack Shaffer
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Morakinyo Animasaun
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityIRJET Journal
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...Netpluz Asia Pte Ltd
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress NycBob Maley
 

Similaire à Addressing cyber security (20)

Improving cyber security using biosecurity experience
Improving cyber security using biosecurity experienceImproving cyber security using biosecurity experience
Improving cyber security using biosecurity experience
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
C018131821
C018131821C018131821
C018131821
 
Cybersecurity by the numbers
Cybersecurity by the numbersCybersecurity by the numbers
Cybersecurity by the numbers
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
Database Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every OrganizationDatabase Security Is Vital For Any And Every Organization
Database Security Is Vital For Any And Every Organization
 
Airport security 2013 john mc carthy
Airport security 2013   john mc carthyAirport security 2013   john mc carthy
Airport security 2013 john mc carthy
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
Abhishek kurre.pptx
Abhishek kurre.pptxAbhishek kurre.pptx
Abhishek kurre.pptx
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptxChap 1 Fundamentals of Cyber Security _ Intr to Cyber  types.pptx
Chap 1 Fundamentals of Cyber Security _ Intr to Cyber types.pptx
 
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity FrameworkAdvantage Technology - Ransomware and the NIST Cybersecurity Framework
Advantage Technology - Ransomware and the NIST Cybersecurity Framework
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
digital marketing
digital marketingdigital marketing
digital marketing
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
 

Dernier

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 

Dernier (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 

Addressing cyber security

  • 2.  What is Cyber Security?  Cyber Security Cases  Cyber Security Strategy  A Risk Based Approach  Managing Cyber Attacks.. CHECK and ACT  The Bigger Picture!! Agenda
  • 3. What is Cyber Security??  Protection of ICT system, network and data in Cyber Space (i.e. any communications environment, particularly the Internet).  Protection through prevention, detection and response to attacks from wide Cyber Threats such as Cyber Crime, Cyber Terror, Cyber Espionage,  Cyber War etc..  Impact Governments, Financial Organisations, Critical National Infrastructures, Individuals etc.. at significantly different levels of technical sophistication.  Exploits varied Cyber Space offerings (e.g. Cloud, Mobile, Social Networking, Shopping, Online Games etc..) not previously dealt with in traditional Information Security World.
  • 4. Cyber Security Cases  Student, After Delay, Is Charged In Crippling of Computer Network "After more than eight months, the Justice Department said yesterday that a Federal grand jury in Syracuse had indicted the 24-year-old Cornell University graduate student who has been blamed for crippling a nationwide computer network with a rogue software program... The student, Robert Tappan Morris, was charged with a single felony count under a 1986 computer crimes law, the Computer Fraud and Abuse Act ..." The New York Times (27 July 1989)  Youth Sentenced in Government Hacking Case "A 16-year-old from Miami who repeatedly penetrated computer systems of the Defense  Department and the space agency has been sentenced to six months in juvenile  detention. The Justice Department said he is the first juvenile hacker to be sentenced to serve time..." The New York Times (23 Sept 2000)
  • 5. Cyber Security Cases (cont’d..)  Downloaded music by Jay-Z ... all I got was snooped, dog "Fans of rapper Jay-Z who thought they'd grabbed hold of an app granting them access to an early release of his new album Magna Carta Holy Grail have found themselves on the receiving end of an anti- PRISM Android Trojan designed to slurp all their data..." The Register (05 July 2013)
  • 6. Cyber Security Strategy  United Kingdom - Cyber Security Strategy  Improving knowledge, capabilities and decision-making  Reducing risk from the UK’s use of cyber space  Exploiting opportunities in cyber space  United States - Comprehensive National Cyber Security Initiative  Establish a front line of defence against today’s immediate threats  Defend against the full spectrum of threats  Strengthen the future cyber space environment  Similar goals - Understand Cyber Space offerings to exploit the opportunities it delivers and address its risks. However Governments are breaking their own privacy laws on wire snooping to understand and combat Cyber Threats!!!
  • 7. A Risk Based Approach  Risk based approach with emphasis on likelihood of most dangerous attacks on assets with most impact to the organisation needs to be applied.  Objective feedback from existing controls to assess exposure to, and deal instantly with Cyber Threats.   Interrelated international standards already exist to support this approach:  ISO27001 (Design and develop Information Security Controls, Processes and Awareness)  ISO27005 (Manage Information Security Risks)   ISO27035 (Manage Information Security Incidents)  ISO27001 and ISO 27005 uses Deming Cycle for development, maintenance and improvement of Information Security: Plan->Do->Check->Act->Plan->Do->Check->Act->Plan->.... (Anticlockwise 0)  Deming Cycle is more linear to address Cyber Security concentrating on maintenance and improvement exercises to deal with growing Cyber Threats at a faster pace:    Plan->Do->Check->Act->Check->Act->Check->Act->Check->.... (Anticlockwise 6)
  • 8. A Risk Based Approach.. (continue)  ISO standards cover following processes and activities to aid Cyber Security:  Understanding of actual business context information and security related context information (PLAN)  Risk Assessments conducted to understand likelihood of threats and vulnerabilities and impact to the organisation (PLAN and CHECK)  Awareness for the need, and responsibility, for security by all parties (DO)  Security design and implementation of controls commensurate to assessed risk (PLAN and DO)  Prevent, detect and respond to security incidents including review of existing state of security (CHECK and ACT).  Measurement of control effectiveness and maturity of overall security to enable when, where and how to improve overall security posture (CHECK and ACT).
  • 9. A Risk Based Approach.. (continue) Acceptable Risk = Monitor To Ensure stability Significant Risk = Appropriate Actions Required Critical Risk = Immediate Actions Required Acceptable Risk = Monitor To Ensure stability Significant Risk = Appropriate Actions Required Significant Risk = Appropriate Actions Required Negligible Risk = No Action Required Acceptable Risk = Monitor To Ensure stability Acceptable Risk = Monitor To Ensure stability LOW MEDIUM HIGH HIGHMEDIUMLOW <<<<<<<<< Impact (Assets) >>>>>>>>> <<<Likelihood(ThreatsxVulnerabilities)>>> <<<<<<RiskRelatedInformation>>>>>> <<<<<<<< Risk Related Information >>>>>>>>
  • 10. Managing Cyber Attacks.. CHECK and ACT  Identify Cyber Space assets, threats, vulnerabilities and appropriate controls (i.e. risk related information) to address:  IF we are to be attacked what should we have in place to PREVENT an attack?  WHEN we are attacked what should we have in place, and how, to DETECT the attack? And can we RESPOND to it and PREVENT it from happening again?  To address WHEN situation, Preventative and Detective controls need to be implemented to discover, and protect important assets from, attacks. These controls are prime sources for providing risk related information as events in real time.  Event monitoring provides recording of risk related information such as:  Malicious traffic to specific systems  Suspicious activity across domain boundaries  User session activity.. and more...
  • 11. Managing Cyber Attacks.. (..continue) Threat Firewall Identity and Access Manager DLP Vulnerability Vulnerability Scanner Asset Preventative and Detective Controls IDS/IPS Suspicious Login or Access Event Malicious Port Scanning Event Malware Event Data Theft Event Mitigates or stop attack against... Discovers attack against.. Suspicious Network Access Event Application; DB and OS etc.. information Asset Inventory and compliance Information Un-patched OS/Application Denial of Service Event Mounts attack on.. Can be exploited on,, Discovers and protects against Discovers and protects against.  Threat Correlation/Aggregation  Vulnerability Correlation/Aggregation  Asset Correlation/Aggregation  Event Logging and Reporting Risk Information SIEM & Logger AV Gateway ALARM Security Incidents 
  • 12. Managing Cyber Attacks.. (..continue)  SIEM (Security and Information Event Management) requires understanding of business and security related context information to enable:  Correlation and aggregation of event data (i.e. risk related information) for risk assessment  Capability to generate alarms against security incidents  Not all tools can help in instantaneously managing, preventing or detecting all threats and attacks. Computer Forensics provides a methodology to address:  Unknown threats and attacks not picked up as part of security monitoring  How, where and when such threats were realised  Real time assessment of threats and vulnerabilities provides understanding of the effectiveness of controls and risks to assets.  Measurement of control effectiveness can be obtained through a combination of output of incidents; events and information acquired through forensics investigation.
  • 13. Managing Cyber Attacks.. (..continue) Acceptable Event = Monitor To Ensure stability (e.g. Admin is logged on to Catalogue Server for > 8 hours) Significant Event = Appropriate Actions Required (e.g. Malicious script on company’s Intranet portal) Critical Event = Immediate Actions Required (e.g. Worm discovered on air traffic control system) Acceptable Event = Monitor To Ensure stability Significant Event = Appropriate Actions Required Significant Event = Appropriate Actions Required Negligible Event = No Action Required (e.g. Legitimate user carries out a wrong search on Catalogue server.) Acceptable Event = Monitor To Ensure stability Acceptable Event = Monitor To Ensure stability LOW MEDIUM HIGH HIGHMEDIUMLOW <<<<<<<<< Impact (Assets) >>>>>>>>> <<<Likelihood(ThreatsxVulnerabilities)>>> <<<<Correlated/AggregatedEvents>>>> <<<<<<< Correlated/Aggregated Events >>>>>>>>
  • 14. The Bigger Picture!!  Addressing Cyber Security is not so fundamentally different to Information Security.  Main difference is keeping up with growing opportunities and challenges (i.e. risks) in Cyber Space. These differences are created by:  Expanding technology and new, but converging, service offerings (e.g. cloud, social networking and mobile) landscape in the past twenty or so years.  The business and user interaction with new services like social networking and it's impact on personal data privacy, politics, etc..  Risk based approach required to fully understand the scale and impact of Cyber Threats.  Indicators for risk exposure and control effectiveness identifies key risks over time.  Data and system centric processes and key controls already exists for dealing with Cyber Threats.  Might require help from other disciplines such as criminologists, sociologists, psychologists. lawyers etc.. leading to people and behaviour centric controls.  Additional control types required but continuous maintenance and improvement activities to deal with risk at real time is important.
  • 15. The Bigger Picture!!.. (continue)  Approach covers risk identified across people and process activities not just technical.  Existing Information Security related standards, regulations and guidelines important to risk based approach for addressing Cyber Security.  Changes to old legislation, and new legislations, on computer misuse, fraud and abuse aim to further tighten the noose on individuals involved in Cyber Security breaches. Thank You!!Thank You!!