Cyber Resilience: Defence-in-depth principles
By Alan Calder and Alan Medcroft
()
About this ebook
For the foreseeable future (and perhaps beyond), the growth and prominence of data in business shows no signs of slowing down, even if the technology in question will likely change in ways perhaps unimaginable today. Naturally, all this innovation brings huge opportunities and benefits to organisations and people alike. However, these come at more than just a financial cost.
In the world as we know it, you can be attacked both physically and virtually. For today’s organisations, which rely so heavily on technology – particularly the Internet – to do business, the latter attack is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. Worse, when a vulnerability is identified, a tool that can exploit it is often developed and used within hours – faster than the time it normally takes for the vendor to release a patch, and certainly quicker than the time many organisations take to install that patch.
This book has been divided into two parts:
- Part 1: Security principles.
- Part 2: Reference controls.
Part 1 is designed to give you a concise but solid grounding in the principles of good security, covering key terms, risk management, different aspects of security, defence in depth, implementation tips, and more. This part is best read from beginning to end.
Part 2 is intended as a useful reference, discussing a wide range of good-practice controls (in alphabetical order) you may want to consider implementing. Each control is discussed at a high level, focusing on the broader principles, concepts and points to consider, rather than specific solutions. Each control has also been written as a stand-alone chapter, so you can just read the controls that interest you, in an order that suits you.
Alan Calder
Alan Calder is a leading author on IT governance and information security issues. He is the CEO of GRC International Group plc, the AIM-listed company that owns IT Governance Ltd. Alan is an acknowledged international cyber security guru. He has been involved in the development of a wide range of information security management training courses that have been accredited by the International Board for IT Governance Qualifications (IBITGQ). He is a frequent media commentator on information security and IT governance issues, and has contributed articles and expert comment to a wide range of trade, national and online news outlets.
Read more from Alan Calder
ISO 27001/ISO 27002: A guide to information security management systems Rating: 0 out of 5 stars0 ratingsInformation Security Risk Management for ISO 27001/ISO 27002 Rating: 4 out of 5 stars4/5IT Governance: A Pocket Guide Rating: 3 out of 5 stars3/5IT Governance – An international guide to data security and ISO 27001/ISO 27002, Eighth edition Rating: 5 out of 5 stars5/5ISO/IEC 38500: A pocket guide Rating: 4 out of 5 stars4/5Risk Assessment for Asset Owners Rating: 4 out of 5 stars4/5Nine Steps to Success: An ISO 27001:2022 Implementation Overview Rating: 0 out of 5 stars0 ratingsPCI DSS: A Pocket Guide, fourth edition Rating: 0 out of 5 stars0 ratingsNetwork and Information Systems (NIS) Regulations - A pocket guide for operators of essential services Rating: 0 out of 5 stars0 ratingsIT Regulatory Compliance in the UK Rating: 0 out of 5 stars0 ratingsPCI DSS: A Pocket Guide - 3rd edition Rating: 0 out of 5 stars0 ratingsCyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications Rating: 0 out of 5 stars0 ratingsSelling Information Security to the Board: A Primer Rating: 0 out of 5 stars0 ratingsCompliance for Green IT: A Pocket Guide Rating: 5 out of 5 stars5/5The EU Data Protection Code of Conduct for Cloud Service Providers: A guide to compliance Rating: 0 out of 5 stars0 ratingsThe Green Agenda: A Business Guide Rating: 0 out of 5 stars0 ratingsThe Green Office: A Business Guide Rating: 0 out of 5 stars0 ratingsA concise introduction to the NIS Directive: A pocket guide for digital service providers Rating: 0 out of 5 stars0 ratingsThreat 2.0: Security and Compliance for Web 2.0 Sites Rating: 0 out of 5 stars0 ratingsHow to Use Web 2.0 and Social Networking Sites Securely: A Pocket Guide Rating: 0 out of 5 stars0 ratingsIT Regulatory Compliance in North America Rating: 0 out of 5 stars0 ratingsNetwork and Information Systems (NIS) Regulations - A pocket guide for digital service providers Rating: 0 out of 5 stars0 ratings
Related to Cyber Resilience
Related ebooks
Cyber Essentials: A guide to the Cyber Essentials and Cyber Essentials Plus certifications Rating: 0 out of 5 stars0 ratingsSafeguarding the Digital Fortress: A Guide to Cyber Security: The IT Collection Rating: 0 out of 5 stars0 ratingsA Last Minute Hands-on Guide to GDPR Readiness Rating: 0 out of 5 stars0 ratingsAgile Information Security: Using Scrum to Survive in and Secure a Rapidly Changing Environment Rating: 0 out of 5 stars0 ratingsInformation Security Breaches: Avoidance and Treatment based on ISO27001 Rating: 0 out of 5 stars0 ratingsPractical Network Security: An auditee’s guide to zero findings Rating: 0 out of 5 stars0 ratingsCombat Ready IT and PIE: Cyber Security for Small Medium Business and Perpetual Improvement Everywhe Rating: 5 out of 5 stars5/5Managing Information Security Breaches: Studies from real life Rating: 0 out of 5 stars0 ratingsManaging Cybersecurity Risk: Book 3 Rating: 0 out of 5 stars0 ratingsStart-Up Secure: Baking Cybersecurity into Your Company from Founding to Exit Rating: 0 out of 5 stars0 ratings8 Steps to Better Security: A Simple Cyber Resilience Guide for Business Rating: 0 out of 5 stars0 ratingsManaging Cybersecurity: A Project Management Approach Rating: 0 out of 5 stars0 ratingsSecurity Architect: Careers in information security Rating: 4 out of 5 stars4/5Managing Cybersecurity Risk: Cases Studies and Solutions Rating: 0 out of 5 stars0 ratingsAdvanced Cybersecurity Strategies: Navigating Threats and Safeguarding Data Rating: 0 out of 5 stars0 ratingsCyber Intelligence-Driven Risk: How to Build and Use Cyber Intelligence for Business Risk Decisions Rating: 0 out of 5 stars0 ratings"Careers in Information Technology: Cybersecurity Analyst": GoodMan, #1 Rating: 0 out of 5 stars0 ratings7 Rules to Influence Behaviour and Win at Cyber Security Awareness Rating: 5 out of 5 stars5/5Secure Your Business: Insights to Governance, Risk, Compliance & Information Security Rating: 0 out of 5 stars0 ratingsImplementing Zero Trust Architecture: An Enterprise Guide Rating: 5 out of 5 stars5/5Cyber Mayday and the Day After: A Leader's Guide to Preparing, Managing, and Recovering from Inevitable Business Disruptions Rating: 0 out of 5 stars0 ratingsNetwork and Information Systems (NIS) Regulations - A pocket guide for operators of essential services Rating: 0 out of 5 stars0 ratingsSecuring Critical Infrastructures Rating: 0 out of 5 stars0 ratings(ISC)2 CCSP Certified Cloud Security Professional Official Study Guide Rating: 0 out of 5 stars0 ratingsModern Cybersecurity Practices: Exploring And Implementing Agile Cybersecurity Frameworks and Strategies for Your Organization Rating: 0 out of 5 stars0 ratingsFundamentals of Adopting the NIST Cybersecurity Framework Rating: 0 out of 5 stars0 ratingsShedding Light on Cloud Computing Rating: 5 out of 5 stars5/5Defending the Digital Perimeter: Network Security Audit Readiness Strategies Rating: 0 out of 5 stars0 ratings
Earth Sciences For You
The Witch's Yearbook: Spells, Stones, Tools and Rituals for a Year of Modern Magic Rating: 5 out of 5 stars5/5A Fire Story: A Graphic Memoir Rating: 4 out of 5 stars4/5Weather For Dummies Rating: 4 out of 5 stars4/5Fantasy Map Making: Writer Resources, #2 Rating: 4 out of 5 stars4/5Rockhounding for Beginners: Your Comprehensive Guide to Finding and Collecting Precious Minerals, Gems, Geodes, & More Rating: 0 out of 5 stars0 ratingsThe Lost Book of Dr Sebi Self-Healing Bible Rating: 5 out of 5 stars5/5The Phantom Atlas: The Greatest Myths, Lies and Blunders on Maps Rating: 4 out of 5 stars4/5Young Men and Fire Rating: 4 out of 5 stars4/5Bushcraft Basics: A Common Sense Wilderness Survival Handbook Rating: 0 out of 5 stars0 ratingsHow to Lie with Maps Rating: 4 out of 5 stars4/5Geography For Dummies Rating: 4 out of 5 stars4/5Answers to Questions You've Never Asked: Explaining the 'What If' in Science, Geography and the Absurd Rating: 3 out of 5 stars3/5Smokejumper: A Memoir by One of America's Most Select Airborne Firefighters Rating: 0 out of 5 stars0 ratingsThe Way of the Water Priestess: Entering the World of Water Magic Rating: 4 out of 5 stars4/5Geology: A Fully Illustrated, Authoritative and Easy-to-Use Guide Rating: 4 out of 5 stars4/5Infinity in the Palm of Your Hand: Fifty Wonders That Reveal an Extraordinary Universe Rating: 4 out of 5 stars4/5The Way Home: Tales from a life without technology Rating: 4 out of 5 stars4/5Rocks and Minerals of The World: Geology for Kids - Minerology and Sedimentology Rating: 5 out of 5 stars5/5The Handy Geology Answer Book Rating: 3 out of 5 stars3/5Five Acres and Independence Rating: 4 out of 5 stars4/5Norwegian Wood: Chopping, Stacking, and Drying Wood the Scandinavian Way Rating: 4 out of 5 stars4/5Energy: A Beginner's Guide Rating: 4 out of 5 stars4/5Water 4.0: The Past, Present, and Future of the World's Most Vital Resource Rating: 4 out of 5 stars4/5A Book of Bees Rating: 4 out of 5 stars4/5The Secret of Water Rating: 5 out of 5 stars5/5
Reviews for Cyber Resilience
0 ratings0 reviews
Book preview
Cyber Resilience - Alan Calder
INTRODUCTION
This book has been divided into two parts:
•Part 1: Security principles
•Part 2: Reference controls
Part 1 is designed to give you a concise but solid grounding in the principles of good security, covering key terms, risk management, different aspects of security, defence in depth, implementation tips, and more. This part is best read from beginning to end.
Part 2 is intended as a useful reference, discussing a wide range of good-practice controls (in alphabetical order) you may want to consider implementing. Each control is discussed at a high level, focusing on the broader principles, concepts and points to consider, rather than specific solutions. Each control has also been written as a standalone chapter, so you can just read the controls that interest you, in an order that suits you.
Together, the book will give you a good understanding of the fundamentals of cyber security and resilience, without tying them to specific standards, frameworks or solutions, and provide an excellent starting point for any cyber resilience implementation project.
Part 1: Security principles
CHAPTER 1: THE CYBER THREAT LANDSCAPE
We live in a world where technology and vast quantities of data play a considerable role in everyday life, personal and professional. For the foreseeable future (and perhaps beyond), their growth and prominence show no signs of slowing down, even if the technology in question will likely change in ways perhaps unimaginable today. Naturally, all this innovation brings huge opportunities and benefits to organisations and individuals alike. However, these come at more than just a financial cost.
In the world as we know it, you can be attacked both physically and virtually. For today’s organisations, which rely so heavily on technology – particularly the Internet – to do business, being attacked virtually is the far more threatening of the two. The cyber threat landscape is complex and constantly changing. For every vulnerability fixed, another pops up, ripe for exploitation. Worse, when a vulnerability is identified, a tool that can exploit it is often developed and used within hours – faster than the time it normally takes for the vendor to release a patch, and certainly quicker than the time many organisations take to install that patch.
The cyber criminal’s point of view
The nature of the cyber world means that cyber attackers can attack anyone, anywhere, from the comfort of their home. You might say that they were ahead of the game in terms of taking advantage of the benefits and opportunities offered by working remotely.
Furthermore, from an attacker’s perspective, there is often a very good reward-to-risk ratio: for the victim, it can be hard enough to detect that an attack happened at all, never mind trace who was behind it. It is in the very nature of the digital information that we are trying to protect that it is easy to copy. In fact, stealing the information does not require removing it from its original location at all, meaning that the owner of that information may never realise that the theft happened.
Unfortunately for us, committing crimes over the Internet can also be very lucrative. Physical pickpocketing may earn a thief cash and credit cards (that will likely be blocked very quickly, and probably can only be used up to the contactless limit per transaction anyway), but digitally targeting someone gives them a chance to steal that person’s identity and get credit cards issued in the victim’s name. Upscale that, and a criminal might think about targeting organisations that hold databases with thousands or even millions of payment card details and personal information about their owners. Whether they then directly use that information for themselves or sell it on the dark web (where you can buy virtually anything, from drugs and human organs to hacking software and stolen credentials), the profits are certainly far greater than those of a physical crime conducted in the same timescale and with the same manpower.
Moreover, cyber criminals are spoilt for choice when it comes to deciding who to target. Because virtually every organisation holds valuable information, and often in huge quantities, essentially anyone will do. In fact, criminals often do not target specific businesses at all, but specific vulnerabilities. Attackers tend to use automated tools to identify those vulnerabilities, and therefore their victims, for them.
Securing your assets
The information that attackers target is often vital to the organisations that hold it. More often than not, you cannot do business if you lose access to that information, making it one of your most important assets. At the same time, the fact that criminals can extract significant value from this information means that it is an asset to them too. There is good reason to refer to them as information ‘assets’ – by definition, someone wants to get hold of them. Many a time, that ‘someone’ is a business partner that will go through the proper channels – but not everyone will take the legal route.
With all this in mind, it should not come as a surprise that cyber attacks are – and will probably continue to be – on the rise. Such attacks can vary widely, ranging from simple phishing emails to complex, detailed operations masterminded by skilled criminal gangs. However, even the simplest attack, if executed successfully, can wreak havoc if you are not prepared.
Clearly, it is in your organisation’s best interests to protect yourself. While this might cost, it will prove far cheaper than experiencing a breach and having to deal with the operational, financial and reputational damages that follow.
Is security affordable?
Despite the clear value of implementing security measures, given the frequency of data breaches and cyber attacks in the press, many of them large-scale, you could be forgiven for thinking that it is impossible to defend your organisation against the predations of cyber attackers. After all, if massive multinationals cannot stay secure, what hope is there for small businesses?
The truth is that you can achieve far more, and on a far smaller budget, than you think. Particularly if you take a strategic approach and aim for the lower-hanging fruit first, becoming secure – and even becoming cyber resilient (more on that distinction in Chapter 3) – does not have to cost vast amounts of money or take years to implement. And it is a worthwhile investment: no matter the size of your organisation, improving your security helps protect your data and that of your clients, improving business relations and opening new business opportunities.
CHAPTER 2: LEGAL AND CONTRACTUAL REQUIREMENTS
Although the best mindset towards implementing security is to think of it as a business investment, it can take hard legal and/or contractual requirements to secure the necessary commitment and resources from your organisation. (Making a tight budget stretch is one thing; doing so without organisation-wide commitment is quite another.)
Data privacy laws
As far as legal requirements are concerned, data privacy laws have been widely updated in recent years. The most well-publicised one was the EU General Data Protection Regulation (GDPR), enforced in 2018, which marked a major milestone for data protection and privacy laws across the world. The EU GDPR places a wide range of security and privacy obligations on organisations that process the data of EU residents and is supported by a regime of significant financial penalties (up to the greater of 4% of annual turnover or €20 million).
Following the introduction of the EU GDPR, other updated privacy laws have emerged around the world, including the UK GDPR and Data Protection Act (DPA) 2018 in the UK, and the California