Sunteți pe pagina 1din 30

Cyber Security

Risk Assessment
and Management

Enielbert E. Estefanio
DENR-National Capital Region
What Are Cyber Threats?
refer to the possibility of or attempt of
gaining unauthorized "access to a device
or system or network using a data
communication pathway
What Are Cyber Threats?
A cyber threat can be intentional
What Are Cyber Threats?
A cyber threat can be also unintentional
What Are Cyber Threats?
Intentional threats include targeted and
attacks.
What Are Cyber Threats?
Intentional threats can also include non-
targeted attacks.
Seven of the most common cyber
threats or cyber-related risks:
I. Malware is software that is used to
disrupt computer operations, gather
sensitive information, or gain access to
private computer systems.
Seven of the most common cyber
threats or cyber-related risks:
Common Types of Malware:
a. Virus
b. Ransomware
c. Worms
d. Trojans
e. Spyware
f. Botnet
g. Logic Bombs
h. Phishing
Seven of the most common cyber
threats or cyber-related risks:
II. Distributed denial of service (DDoS)
attacks occur when an attacker
leverages a number of computers from
various locations to send simultaneous
requests to a target computer or
website.
Seven of the most common cyber
threats or cyber-related risks:
Seven of the most common cyber
threats or cyber-related risks:
III. Automated Clearing House/payment
corporate account takeover is a type
of identity theft in which cyber thieves
gain control of a business's bank
account by stealing the business's valid
online banking credentials through
various methods.
Seven of the most common cyber
threats or cyber-related risks:
IV. Data leakage is the unauthorized
transmission of data or information
from within an organization to an
external destination or recipient. This
can be executed electronically or
through a physical method.
Seven of the most common cyber
threats or cyber-related risks:
V. Third-party/cloud vendor risks will
expose a financial institution to risks
that are outside of its immediate
control; therefore, the financial
institution has to rely on due diligence
in the contract and monitoring of the
service provided, rather than being
able to manage the risk in-house.
Seven of the most common cyber
threats or cyber-related risks:
VI. Mobile/ web application
vulnerabilities are the weaknesses or
flaws that reside in a mobile
application, smartphone, or Internet-
facing web server.
Seven of the most common cyber
threats or cyber-related risks:
VII. Weaknesses in project management
or change management can directly
expose a sensitive data or information.
Common Model for Cybersecurity
practices

PLAN PROTECT

RESPOND DETECT
NIST Cybersecurity Framework
National Institute of Standards and Technology Cybersecurity
Framework
Five core functions of effective cybersecurity
Function Description Category
Identify An understanding of how Asset management,
to manage cybersecurity business environment,
risks to systems, assets, governance, risk
data, and capabilities assessment, risk
management strategy
Protect The controls and Access control,
safeguards necessary to awareness and
protect or deter training, data security,
cybersecurity threats data protection
processes,
maintenance,
protective
technologies
NIST Cybersecurity Framework
National Institute of Standards and Technology Cybersecurity
Framework
Five core functions of effective cybersecurity
Function Description Category
Detect Continuous monitoring to Anomalies and events,
provide proactive and real- continuous
time alerts of monitoring, detection
cybersecurity-related processes
events
Respond Incident response activities Response planning,
communications,
analysis, mitigation,
improvements
Recover Business continuity plans Recovery planning,
to maintain resilience and improvements,
recover capabilities after a communications
cyber breach
Cybersecurity guide
Privacy and Data security
1. Conduct an inventory to help you answer
the following questions:
a) What kind of data do you have in your
company?
b) How is that data handled and protected?
c) Who access to that data and under what
circumstances?
2. Once youve identified your data, keep a
record of its location and move it to more
appropriate locations as needed.
Cybersecurity guide
Privacy and Data security
3. Develop a privacy policy
4. Protect data collected on the Internet
5. Create layers of security
a) Inventory your data
b) Identify and protect your sensitive and
valuable data
c) Control access to your data
d) Secure your data
e) Back up your data
Cybersecurity guide
Privacy and Data security
6. Plan for data loss or theft
Cybersecurity guide
Scams and Fraud
1. Train employees to recognize social
engineering
2. Protect against online fraud
3. Protect against phishing
4. Dont fall for fake antivirus offers
5. Protect against malware
6. Develop a layered approach to guard against
malicious software
Cybersecurity guide
Network Security
1. Secure internal network and cloud services
2. Develop strong password policies
3. Secure and encrypt your companys Wi-Fi
4. Encrypt sensitive company data
5. Regularly update all applications
6. Set safe web browsing rules
7. If remote access is enabled, make sure it is
secure
Cybersecurity guide
Website Security
1. Carefully plan and address the security
aspect of the deployment of a public web
server
2. Implement appropriate security
management practices and controls when
maintaining and operating a secure web
server
3. Ensure that web server operating systems
meet your organizations security
requirements
Cybersecurity guide
Website Security
4. Ensure the web server application meets
your organizations security requirements
5. Ensure that only appropriate content is
published on your website
6. Ensure appropriate steps are taken to
protect web content from unauthorized
access or modification
Cybersecurity guide
Website Security
7. Use authentication and cryptographic
technologies as appropriate to protect
certain types of sensitive data
8. Employ network infrastructure to help
protect public web servers
9. Commit to an ongoing process of
maintaining web server security
Cybersecurity guide
Email
1. Set up a spam email filter
2. Train your employees in responsible email
usage
3. Protect sensitive information sent via email
4. Set a sensible email retention policy
5. Develop an email usage policy
Cybersecurity guide
Employees
1. Develop a hiring process that properly vets
candidates
2. Perform background checks and
credentialing
3. Take care in dealing with third parties
4. Set appropriate access controls for
employees
5. Provide security training for employees
Cybersecurity guide
Policy Development and Management
1. Establish security roles and responsibilities
2. Establish an employee Internet usage policy
3. Establish a social media policy
4. Identify potential reputation risks
End of Presentation

S-ar putea să vă placă și