Cyber Security Auditing Framework CSAF F
Cyber Security Auditing Framework CSAF F
MARY’S UNIVERSITY
SCHOOL OF GRADUATE STUDIES
By
Tesfaye Asfaw Getahun
July10, 2018
Addis Ababa, Ethiopia
Cyber Security Auditing Framework (CSAF) For Banking Sector In Ethiopia 2018
By
Tesfaye Asfaw Getahun
July10, 2018
Addis Ababa, Ethiopia
Temitime_Assefa(PhD) ____________________
External Examiner Signature
Acknowledgments
First and for most I would like to thank the Almighty GOD for his unending helps and
blessings to complete my thesis, without his blessings and support I wouldn't have
been write a single word. Next I would like to express my special appreciation and
thanks to my advisor, Asrat Mulatu (PhD) for the guidance and support in my research
work. I would like to extend my appreciation to my family members especially my
beloved wife W/o Yeshashework Abebe for her kind support and encouragement, and
pray for the success of my work. And I am also grateful thanks to my best friend
shimelies Tamiru for the support and encouragement. My thanks also extend to Ato
Dawit from abysinya bank, W/o Yeshiwork from CBE and Ato Samson Tesfaye from
Dashen Bank for their support during the data collection process. I am also very
thankful to all staff members of informatics faculty of St. Mary’s University, for the
success of the research work in one way or the other.
List of Acronyms
ATM: Automatic Teller Machine
BS: British Standard
CBS: Core Banking Solution
CCTV: Closed Security Television
CIS: Center for Internet Security
COBIT: Control Objectives for Information and related Technology
CS: Cyber Security
CSA: Cyber Security Auditing
CSAF: Cyber Security Auditing Framework
CSAS: Cyber Security Auditing Standard
CSF: Cyber security Framework
GASSP: Generally Accepted System Security Principles
ICT: Information Communication Technology
IEC: International Electro technical Commission
INSA: Information Network Security Agency
IT: Information Technology
ITGI: Information Technology Governance Institute
ISACA: Information Systems Audit and Control Association
ISO: International Standardization of Organization
MCIT: Ministry of Communication and Information Technology
NBE: National Bank of Ethiopia
NIST: National Institute of Standards and Technology
PCI-DSS: Payment Card Industry Digital Security Standards
SCSAP: Simple Cyber Security Audit Process
SPSS: Statistical Product and Service Solutions
LIST OF FIGURES
Figures Descriptions Pages
LIST OF TABLES
Tables Descriptions Pages
Abstract
The advancement of cyber security and technology offers a vital benefit for business. Modern Banking
increasingly relies on the Internet and computer technologies to operate their businesses and market
interactions. Banks are on the way of using up-to-date technologies to increase efficiency and
effectiveness in service delivery. However, these benefits do not come without risks for information
being misused, service disrupted or any other attacks interrupting the normal operation of computer
based cyber systems. The threats and security breaches are highly increasing in recent years globally.
Ethiopian case is not an exception.
The main objective of this study is to propose and develop a workable Cyber Security Auditing
Framework (CSAF) in banking sector. In this work, attempts were made to examine and compare the
available cyber security frameworks and best practices. This research combines ISO audit checklists
and expert experiences to assess the cyber security system practices in the banking industry.
By applying a mixed research method approach the study assesses the existing practices, process and
challenges of the selected banks cyber security issues and proposed cyber security audit framework
which is workable for the Ethiopian banking industry. The framework is constructed from two basic
pillars. The first is the requirement identification mechanism which is further broken into ERM (Entity
Relation Model) and organizational & process models. The second one is the counter measure which
focuses on the organizational policy, procedure, guideline, and controls. Finally, the researchers
proposed a workable framework that can assist the industry from cyber-attacks.
The framework has both practical and theoretical contributions to the industry at large and for
researchers for further similar efforts.
Keywords: Cyber Security, Cyber Security Auditing, Cyber Security Auditing Framework, Security
Threats, and Security controls.
Contents Page
CHAPTER ONE - INTRODUCTION ....................................................................................................................... 1
2.5.2. Payment Card Industry - Data Security Standard (PCI -DSS) ............................................................... 16
2.5.3. COBIT (Control Objectives for Information and related Technology) .................................................. 16
5.6. The Design of Proposed CSA Framework for Banking Sector .................................................................... 53
5.6.1. ERM- Different entities inter relationship to selected local banks of Ethiopian .................................. 54
References ..................................................................................................................................................... 75
Appendix’s ..................................................................................................................................................... 79
Cyber Security Auditing (CSA) is an independent review and examination of system records, activities
and related documents. These auditing are intended to improve the level of cyber security, avoid
improper cyber security designs, and optimize the efficiency of the security safeguards and security
processes. It is a systematic, measurable technical assessment of how security policies are built into
the cyber systems and it is part of every successful cyber security management [26].
The major challenge in cyber Security in banking industry is the knowledge gap about the holistic
approach of cyber security management, Due to this, most security requirements are derived by the
external bodies than the Bank’s management. Even though security measures are technical, physical
and human, Banks concentrate on the technical security measures only in order to comply with the
external requirements. This situation creates bad security culture in most of the bank industry [22].
Some of the challenges in banking industry are numerous and inherently diverse. A traditional
approach in addressing these challenges includes the use of technical controls to treat risks. While
technical controls are helpful in protecting valued assets, unfortunately, technical controls alone are
insufficient in providing reliable security. Thus, Global outsourcing, consumer-centricity, security
compliance and legislation as emerging global business drivers have imposed new security
requirements that complicate traditional perspective of cyber security [4].
Literature in the area of cyber security shows that security culture is still in its early stages of
development especially in developing countries. Thus, the establishment of an organizational cyber
security culture is necessary for effective cyber security [22].
Ethiopian IT capacities are still at a developmental phase and are immature in relation to leading
western technologically developed countries. In addition, the business environment of Ethiopian is
different from the business environment in the USA and other Western countries [22]
Cyber Security Framework (CSF) is a set of industry standards and best practices to help organizations
manage cyber security risks. It is basically, a blueprint for building a cyber-security program to
manage risk and reduce vulnerabilities. The Framework enables organizations – regardless of size,
degree of cyber security risk, or cyber security sophistication – to apply the principles and best
practices of risk management to improve the security and resilience of critical infrastructure. [25].
Cyber-attack involves the malicious application of information and communication technology either
as a target or as a device by several malicious actors. Cyber security could also refer to the security of
internet, computer networks, electronic systems and other devices from the cyber-attacks.
Research in Ethiopia indicates that, there is lack of cyber security auditing framework and practice. For
instance the research done in the investigation of the state of cybercrime in Ethiopia by taking 40
institutions from Financial Organization of Ethiopia found that all respondents experienced a number of
cybercrime incidents, Computer viruses, worms, malware, or other malicious attacks (57.1 %), website
defacement (40%), illegal access (17.1%), and spam (14.7%) were the most frequently penetrated
cybercrimes against the organizations. The respondents also indicated a range of infrequently occurring
cybercrimes such as causing damage to computer data (62.9%), denial of service (DOS) (45.7%), and
system interference (45.7%). Overall, the survey results demonstrate that cybercrime is a legitimate
problem in Ethiopia. When one takes into account institutions’ lack of capability regarding cybercrime
detection, it is valid to presume that cybercrime in Ethiopia is more prevalent than what is revealed in
this survey. A majority of the respondents (77.1%) also said that they do not have any organizational
structure specifically dedicated to dealing with cybercrime threats. Only 8.6% of the institutions (four
banks) have specialized teams responsible for cyber security incidents. These results demonstrate that
cyber security governance is neglected by the majority of the institutions involved in the survey. The
results may indicate that institutions as a whole are ill-prepared to deal with cybercrime [12].
This research work propose a workable cyber security audit framework that can be used to guide the
banking industry by , assessing the current practice, and challenges, which at the end helps the
banking industry as guideline for cyber security auditing process of the industry.
Ethiopian banking system is still underdeveloped compared to the rest of the world regarding
electronic payment, internet banking, telephone banking, online shopping etc. Such systems are at an
embryonic or infant stage. The reason for this weak or evolutionary development is being numerous,
the main one that is cited by different scholar is security threats or poor implementation of cyber
security in the country [18] [37] Currently, for banking industry there is no cyber security standards
provided and there is no clear guidance regarding what would constitute an acceptable minimum
baseline body of cyber security knowledge for end users in the country [18].
The preliminary literature survey shows organizations in Ethiopia are at different level of
understanding and acting with regard to security auditing and various threat mitigation. There is no
standard format to conduct a cyber-security audit framework by the regulatory body and to follow up
the work done by other external parties in case of outsourcing cyber security audit framework task to
the third parties[18].
In addition, from my preliminary investigation it was revealed that many banks have invested on IT
security devices as part of CORE Banking Solution project. However, managing these IT security
devices may be challenging since they do not have overall or comprehensive cyber security
framework which serve as a guide to develop and implement their own cyber security auditing based
on their own requirement in line with the valid national cyber security policy, besides lack of skilled
manpower, security management resources and finance [15].
What are the existing practices and processes of cyber security auditing and the methods,
techniques, standards and tools used in Ethiopian banking sector
What are the major challenges that the Ethiopian banking sector are facing on cyber security
management.
What framework can support Ethiopian banking industries to perform effective cyber security
auditing and ensure that cyber resources are well protected?
assess the existing practices and process of cyber security auditing systems and the methods and
techniques used in selected Ethiopian banks
identify variations in cyber security systems and process and major causes of their variations.
identify the predominant problems that impedes the cyber security auditing process in the banking
sector in Ethiopia.
assess different cyber security frameworks which are done by different scholars across the world.
propose a cyber-security auditing framework that can address the current challenges and,
standardize the process of cyber security management, this can be applied in Ethiopian bank
sector.
validate the framework based on the actual environment
1.5.6 Validation
Validation on the final output of the research is made through distributing a questionnaire at some
selected banks that have better experience and experts to provide valuable comments.
The study shall serve as a guideline for developing and implementing cyber security auditing
framework in banking industry in Ethiopia.
It enables all banks to have a common cyber security framework in Ethiopia.
It adds a new way of thinking in the existing body of knowledge.
It also serves for practitioners and researchers to conduct more comprehensive research in
cyber security management.
Chapter One: focuses on the background of the study, statement of problem, objectives and
significant of the study.
Chapter Two: is the literature on cyber security, Auditing activities and implication process, Cyber
security auditing standards (CSAS), and Tools, Cyber security Audit Frameworks, Basic criteria to assess
cyber security audit readiness, and presented for further description of the research area. Related works
are presented.
Chapter Three: this chapter presented research design and methodology which includes general
insight on the existing research methods, Selection of sample for the study, data collection techniques,
and data analysis methods was stated clearly.
Chapter four: is where the data collected through questionnaire, interview, and document collection
was analyzed and presented. And the findings from the analysis were discussed, interpreted and
summarization was made as related to the research problems statement.
Chapter five focuses on a new proposed Cyber Security Auditing Framework (CSAF) clearly
presented.
Chapter six: focus on conclusions, recommendations and future works of the study.
Cyber security has become the heart of modern banking in our world today, and information has come
to be the most valuable asset to protect from insiders, outsiders and competitors. [23] .The application
of information technology has brought about significant changes in the way the institutions in the
banking sector process and store data. This sector is now composed to face various developments such
as internet banking, mobile banking, e-money, e-cheque, e-commerce etc., as the most modern
methods of delivery of services to the customers. However, Customers are very concerned about
privacy and identity of theft. [32]. Business partners, suppliers, and vendors are seeing security as the
top requirement, particularly when providing mutual network and data access. Banks’ ability to take
advantage of new opportunities often depends on their ability to provide open, accessible, available,
and secure network services.
Having a good reputation for safeguarding data’s and information’s will increase market share and
profit [23].Banks are clearly responsible for compromised data in their possession that results in fraud.
Therefore, banks have to be responsible for fraudulent activity perpetrated via the internet channel
[23].
Telecommunication networks have played a catalytic role in the expansion and integration of the
Cyber Security (CS), within and between the institutions, facilitating data accessibility to different
users. In view of the critical importance of Cyber Security (CS), there is a need to exercise constant
vigilance for the safety of the financial systems. Structured, well defined and documented security
polices, standards and guide lines lay the foundation for good cyber security.
Legend
The CSA is therefore a tool for determining, achieving, and maintaining a proper level of security in
an organization. The audits are intended to improve the level of cyber security, avoid improper cyber
security designs, and optimize the efficiency of the security safeguards and security process [35]. The
CSA differs from the traditional audit in the sense that it requires adequate knowledge of computer
systems in addition to the basic concepts of normal auditing.
In general, the CSA, as anew auditing discipline, places emphasis on a holistic examination of cyber
security. This means that all levels, from the establishment of cyber security organization through
personnel issues to system configurations, are checked [31].
According to [42] [5] the Simplest Cyber Security Audit Process (SCSAP) is a dynamic security audit
approach based on both BS 7799.2 and ISO 17799. A security standard is regarded as a control system
where on iterative control mechanism simulates standard compliance inputs to produce a CSA design
that translates the initial security audit objectives. SCSAP consists of the following phases:
1) Security Audit; 2) planning; 3) Review of policy; 4) Normal Audit; 5) Technical Audit; 6) Data
Analysis; 7) Risk Analysis; 8) Report; and 9)Post-Audit. These are the same steps found in any other
security audit methodology reported in the literature [30]. In addition[36] proposed an audit process in
seven steps at figure 2.1[36] , the input data are log file, Intrusion detection systems report and data
from the system, and deliverables from those steps of audit are vulnerability report, threat/risk
assessment report and audit report. This deliverables are ultimately meant to address the security holes
by addressing weakness in different aspects of systems which could be technical, human resources
issue or policy cases, etc., [42]. But the audit process is limited by the following seven steps:
(4) baseline auditing - auditing the security setup to verify that it is in accordance with the security
baseline of the organization,
(5) internal control and workflow audit - auditing the existing work-flow,
(6) policy audit - auditing the security pol-icy to ensure that it is in line with the business objective
and
(7) Threat/risk assessment – assessment of the various risks and threats facing the company’s
information systems [2].
(3) performing audit tests - general review on the existing security policies or standards(security
configurations)Technical investigation;
(4) reporting for audit results – present the current security environment;
(5) protecting audit data & tools - safeguard the audit data and tools for the next audit or future use;
(6) Making enhancements and follow-up - make corrective actions if required.
(7) The security audit process is becoming more difficult to undertake with the growing complexity of
information systems.
This standard adopts a process approach for establishing, implementing, operating, monitoring,
reviewing, maintaining and improving an organization's Cyber Security Management System
(CSMS).
Cyber security auditing in a given organization needs to consider the status of the domains numbered
from 4-15 and their sub-domains depicted in figure 2.4[17] with respect to the objectives, resource
availability, and other issues relevant for a particular organization[42][17].
ISO/IEC 27001:2005 is its use in the internal and external auditor of organizations to determine the
degree of compliance with the policies, directions and standards adopted by an organization [17], it
specifies the requirements for establishing, implementing, operating, monitoring, reviewing,
maintain and improving a documented cyber security management system within an organization.
This standard is usually applicable to all types of organizations, including business enterprises,
government agencies, and so on.
of software), from a variety of sources, that give advice on topics related to cyber security, in
particular regard to the planning, managing, or auditing of overall cyber security practices for a given
institution [34]
Framework for CSA consists of multiple level of guidance, which consists of polices, standards,
procedures, principles, breakdown structures, audit guidelines/outlines, Legislations. Reporting
standard and product evaluation [34] they are components that are always assessed while conducting
security audit in a certain setting.
National ICT
Security Policy and
Standard
Organizational
Cyber security
Policy and
Standard
Infrastructure
Cyber security Protection
Audit Policy
Cyber security
Audit Processes Business
continuity
Procedure
CERT
Readiness
Regulatory
compliance
The standard in the framework refer to mandatory requirements that security systems at organization
or national level need to meet. For example, Cyril Onwubiko has developed a full- fledge cyber
security audit framework, which addresses five main components and three sub-component of
security, refer figure 2.5[26]
The components comprises: security policy that defines acceptable use, technical controls,
management standards and practices. Audit policy that specifies what needs to be audited processes
which are organization process around security; procedures that organization engages in order to
protect its valued asset; Regulatory compliance that stipulates acceptable regulatory and security
compliance for the organization in its given environment. Sub-components included infrastructure
protection plan, business continuity plan and computer emergency response team readiness plans and
practices for incident response [26].The components each has direct relations to the three sub
components as shown in figure 2.5 above.
There is also plenty of management and enterprise architectural security frameworks are available in
the world, those give a better direction to create or model new frameworks for any kinds of problems.
The architecture framework should be able to be modified and add value in future applications based
on organizational growth and needs [11].Many sustainability standards have been developed and will
be developed in the future, However, information model in the standards and relationships among
standards are hard to describe and understand because of their complexity. After a thorough review of
management and enterprise architectural frameworks it is shown that ZACHMAN framework is a best
fits to plan security architecture for an enterprise as any evolving changes in technology can be
implemented onto the ZACHMAN framework without affecting the direction of the enterprise. The
ZACHMAN framework can contribute to understanding and describing complex relationships and
information models in sustainability standards [14]. Therefore, the security planning using the
ZACHMAN framework applied to enterprises is helpful for sorting out complex technology and
methodology issues that are significant both to general and technology management[7].A framework
was developed by John ZACHMAN, in 1980, which is a two- dimensional classification schema
diagramed in a six-by-six matrix format as shown in figure 2.13[41].The rows represent the
perspective of different players in the process ( Planner, Owner ,Designer, Builder , Sub-contractor,
the system) while the columns represent aspects of the process (Data, Function, Network, People,
Time, Motivation).The thirty-six frames at the core of the integrated framework are referred to as
cells. In this model, each cell is unique. The columns manage the complexity while the rows manage
the changes [41]. The framework is comprehensive, primitive, and generic and distinguishes an issue
by answering all the six primitive linguistic interrogative questions who, what, where, when, why, and
how, hence they cannot be fragmented further after analyzing. In addition to this, it is a logical
structure for descriptive representations (i.e. models, or design artifacts) of any complex object and it
is neutral with regard to the processes or tools used for producing the descriptions. Therefore, the
framework as applied to enterprises is helpful for sorting out very complex technology and
methodology choices and issues that are significant both to general management and to technology
management. This makes the framework generic [41] [11].
basic model of each column must be unique, Rule 4. Each row describes a distinct, unique perspective,
Rule 5. Each cell unique, Rule 6. The composite or integration of all cell models in one row constitutes
a complete model from the perspective of that row and Rule 7. The logic is recursive [41].
The basic idea behind the ZACHMAN framework is that the same complex thing or item can be
described for different purposes in different ways using different types of descriptions(e.g. textual,
graphical)[27]. Security is a never- ending process that requires constant monitoring, updates,
investment, research and implementation of new technologies. The ZACHMAN framework is based
on an open architecture, which ensures solutions that can be easily extended to an enterprise’s security
policy of today and that of the future [7].
This research began with assessing the basic issues that needs to be addressed during survey, in order
to identify the readiness of banking sector. Based on this research question, twelve minimum security
requirements stated commonly by scholars have been identified. In building cyber security audit
capability, management should assess the organization’s cyber security audit readiness by taking into
account the relevant factors discussed below. In many instances, this process will determine what is
practical to implement within a given time and budget constraints [14]. Based on NIST[32], ISO
27002 [17], ICT readiness check list for developing countries[32] and formulation of IT Auditing
Standards by [14], the minimum security requirements cover 6 generally accepted security- related
areas in order to check the confidentiality, Integrity and Availability of cyber systems on three state:
information in processes, at rest and on transmittal. These minimum security requirements and
interview results from IT and security auditors are presented as follows.
2. Organizational security
Organizational security has been seen from the perspective of existence of management forum that
ensures the management support to cyber security. This could be the work given to a unit or on
individual, who work with the IT organization to acquire appropriates tools and implement the
right processes which implements the security policy. They are additionally responsible for
providing the initial and refreshes training to the staff and address security incidents. There is also
a need to ensure that the date of the organization that is accessed by or transferred to external
organizations is suitably protected [14].
According to [42], “Cyber security audit readiness in case of Ethiopian government organization. The
study aimed at identifying the cyber security audit readiness of Ethiopia governmental offices The
researchers’ used a mixed research method approach. The result of his analysis was based on the
responses obtained from 8 Ethiopian government organizations; those are the main organization
selected by the government through the MCIT for the first phase implementation of e-government
service delivery. The findings from the research shows that 56.25% of the organizations surveyed
have no security policy document while the rest of them do have some level of security protection
manual documents, which they cascaded and adopted from the national ICT security policies and
standards. But when it comes to implementation, none of the organizations have implemented the
policy.68.75% of the respondent organizations never conduct any cyber security awareness and
training , security roles and responsibilities are not defined and documented in 62.5% of the
organization. In general, he concluded that the capability and readiness of Ethiopian government
organizations to perform cyber security audits is extremely low.
Another work is done by [23] entitled “A framework for the governance of cyber security in banking
system in 2011; the purpose of this study was to identify the possible guidelines that can help in
protecting the cyber problems by proposing an initial framework for the banking industries. The
proposed framework was categorized into three levels which are strategic level, tactical operational
level and technical level. Having a reputation for safeguarding information and the environment with
in which it resides enhances an organization’s ability to preserve and increase market share. The
research shows that a comprehensive information security governance framework is highly needed for
banking industries to satisfy the security need of business activities of the industries. The researcher
also proposed adoption a better way of cyber security auditing frame work for the industry.
Sampling is mainly based on ease of access to data and wiliness of banks and experts to provide
relevant information that goes with the research problems.
Therefore, the selected data sources are both from private and government .Namely, Nib International
bank, Bank of Abyssinia, Dashen Bank and Commercial Bank of Ethiopia (CBE). The criteria for the
selection of the banks are based on the level of ICT usage, their willingness to provide data for the
researcher. In the above banks, the primary data sources used in this study are IT managers who have
decision power related to IT security. This is because, IT departments manage all the information
systems functionalities including its security while the security experts or system administrators make
sure that the systems are functioning as per the required policy, procedures, bank’s requirement, etc. In
addition, secondary sources of data such as relevant best practices in cyber security policy, standard
and procedure documents were reviewed. In addition, standard compliance experts and financial audit
professionals of bank and other institutions like Cyber security policy makers and regulatory body
which were identified by Ethiopian government offices such as Information Network Security Agency
(INSA), Ministry of Communication and Information Technology (MCIT) and National Bank of
Ethiopia (NBE) were additional target respondents to the survey questions. In each of the selected
banks there are about an average of 30-40 IT staff are there among this the researcher was interested to
select only few of them based on lottery system with total of 100 and additional staff who have direct
or indirect attachment with the cyber security system management of the organization and end service
provider total of 100 finally total of two hundred questioners were distributed among all respondents.
The research also includes interview session participants of 15 interviews who have deep experience
and awareness in both management and use of cyber systems among the participants, IT experts,
higher officials of the banks and relevant stake holders.
A questionnaire was developed based on the three categories such as Administrative, Technical, and
Physical& environmental security. The questions items are open and closed on practices and status in
Cyber security system management. The questioners were prepared and distributed to IT manager of
the respective sampled Banks. The questionnaire developed had three categories. The first section
dealt with physical and environmental security management of the respondent bank. The second
section inquired about the technical aspect of cyber security, and the third section deals with the
administrative aspect of cyber security. Were used to collect primary data from Ethiopia banks and
other selected organizations for the study. The major focuses area includes security policies,
organizational security, personnel security, physical and environmental security, communication and
operations management, access control, system development and maintenance, and compliance. The
response is used to see the existing practices , understand whether information systems users in
organizations have awareness of cyber security , policies and procedures etc.[37], [19], [38]and Cyber
security auditing readiness checklist for developing countries[38]. In addition interview were
conducted for security and financial audit professionals based on the concept made by using Fredrik
model of building a given framework , which was focused on three stages such us evaluation stage,
formation stage and implementation stage. The result of interview has served as a guidance to propose
a framework for the industry.
a flexible structure of report and data collected from qualitative aspect of the analyzed and interpreted
using thematic coding [6].
3.5 Validation
Validations are done through user acceptance test hence the measurement or instrument is valid when
it measures what it is expected to measure, and validity is concerned with the accuracy of the way of
measurement [40]. Data gathering with the help of survey has its own threats to validity. For example
the respondent may answer what he feels to answer rather than the actual fact exist [6], indicate that
the best forms of protection against potential threats to questionnaire validity are careful attention to
both the research process and questionnaire design. Validation involves the collection and analysis of
data to test the accuracy of an instrument.
Therefore, both the questionnaire and the framework will be evaluated by designing relevant question
which will be distributed among the senior IT officers and Experts in order to check for its validity and
its workability.
4.4. Findings
In this section, the results from data analysis are presented and addressing the main components of
cyber security auditing framework which make up the themes .The data analysis result is depicted
using charts in percentage which refers to the number of banks having or not having certain security
situations. The result of the analysis is based on the responses obtained from four banks.
All control domains are categorized in to three based on the idea of [3]. The focus of cyber security
evolved from physical security of computer centers to technical and then administrative cyber security.
Not in Implem
70%
plan for ented,
60% implem 20%
50% entatio In plan
n, 5% for
Percent
40%
implem
30% entatio, Not
20% 35% implem
10% ented,
40%
0%
Figure 4.2 Cyber security policy and standard Figure 4.3 Cyber security policy implementation status
As shown in the figure 4.2 above, the findings from the survey shows that 40% of the surveyed banks
don’t have cyber security policy document while the rest 60% possesses the document which they
cascaded and adopted from the national and international cyber security policy.
PCI- Others
DSS, , 5%
10%
ISO/IE
C
27002:
2005,
30%
COBIT,
40%
Indu
standard
Figure 4.5 Standard usage information Figure 4.4 cyber security policy update
In the described figure 4-5 above, 40% of the surveyed banks COBIT, others use 30% ISO/IEC
27002:2005, PCI-DSS use 10% and 15% uses industry standards and 5% of those banks use other
standards like in house developed. But when it comes to implementation, as shown figure 4-3 above,
only 20% of the surveyed banks that have implemented their cyber security policy and 35% of
surveyed banks that have the policy document are in plan stage of implementation. The rest 40% and
5% are undertaking the preparation and are planning to create the document and they are planning to
implement in a very near future.
As shown in figure 4.4 above, 40% of the surveyed banks have never updated the security policy. This
is mainly due to the fact that none of them is being fully implemented so far. 30% and 5% of those
banks have updated every two years and annually respectively, where as other 25% of banks updated
as required, there is no pre-defined plan for updating.
Figure 4.7 lack of experienced staff and budget, dedicated cyber security individual(s), annual budget for security
awareness, and separating cyber security department.
As shown in figure 4.7 above, 25% of the banks have dedicated cyber security professionals with
responsibility of assuring cyber security whereas 75% did not have dedicated expert. Only 40% of the
banks have assigned annual budget for staff cyber security awareness program and technical training
even though it is not enough whereas 60% they didn’t allocate.
As shown in figure 4.7 above, 95% of those banks agreed on the idea of separating cyber security team
(department or unit) from other IT staffs structurally under IT department.
2. Organizational Security
Organizational security has been seen from the perspective of existence of management consensus that
ensures the management support to cyber security. The management of the organization follows
authorization, organization, management and processes and has responsibilities to protect individual
organization’s inventory, information classification, third party access, security issues in contracts, and
possibilities of finding specialists in the area etc. These were some of components of the organization
cyber security that are addressed by the research.
Figure 4.9.Management authorization and support for cyber security, define inventory for cyber security, and defined
information scheme
As shown in the figure 4.9 above, 70% of the banks have defined inventory or registry with an
accountability of assuring for cyber security system, where as 30% did not have defined inventory or
registry. Only 70% of the banks have defined information classification scheme whereas 30% they did
not defined. From the figure 4.9 above also, 87% of those banks agreed on the idea of management
support for cyber security and also 91% management authorization process, for new information
processing facilities including all hardware and software use.
Poor,
10%
Good, 15%
Excellent, 45%
3. Personnel Security
Personnel security has been seen from the perspectives of ensuring security of organization’s
information and IT resources as a result of employees and other third party access and use. Hiring a
person working in the security area has its own procedure and requirement based on the level of their
experts, experience they have and refer case personnel or organization they have.
100%
90%
80% 90%
70%
60%
50% 58%
40% 45%
30% 40%
20%
10%
0%
employees’ written employees involve in verification checks on Sign confidentiality or
job description cyber security policy permanent staff of non-disclosure
include cyber security implementatio job applications agreement
responsibility
Figure 4.11cyber security responsibility is included in job description, policy, job applications, and cyber Security
awareness for employees and third party
As shown in figure 4.11 above, employees’ written job description includes responsibility for cyber
security in 45% of the surveyed banks. And 58% of the banks invite employees to participate in the
development of cyber security policies in order to encourage a sense of ownership. In addition, 40% of
those banks have confidentiality or non-disclosure agreement with employees as a part of their initial
terms and conditions of the employment and also 90% of surveyed banks has check on permanent
employment staff of job applications.
Twice a
year,
20%
Don't conduct
awareness,
Once a year, 40%
40%
good, 15%
As depicted in figure 4.13 above, technical staffs’ awareness about emerging technologies and related
control issues rated as Poor, Very good , Excellent and Good with 40%, 25% , 20 % and 15% of the
surveyed banks respectively.
Figure 4.14 Incident management & formal reporting procedure, Business Continuity & disaster recovery plan,
organization perform cyber security and Penetration testing
As indicated in figure 4.14 above, 30% of the surveyed banks have written incident management and
formal reporting procedure to handle security incidents. But the remaining they don’t have. In
addition, 50% of the surveyed banks have an approved Business Continuity and Disaster Recovery
plan. Only 25% of the surveyed banks perform periodical penetration testing and 45% of organization
performs cyber security performance evaluation of their infrastructure.
4. Compliance
Figure 4.15 formal Contacts, auditing, outsource auditing and third party access control
As shown in figure 4.15 above, only 85% of the surveyed banks have made formal contract which
refers to all the security requirements to ensure compliance with the Bank’s security policies and
standards. In addition, 60% of those banks never conduct cyber security auditing at all. Only 40% of
them did it. And 20% of the surveyed banks outsourcing their cyber Security audit to third party. In
general, from the above diagrams, we can see that under administrative category, surveyed banks are
weak in designing and implementing cyber security policies & procedures, standard usage,
Stakeholders involvement, dedicated cyber security, management support, annual budget staff,
personnel security, staff awareness training, performing periodical penetrating testing, incident
management and compliance.
Figure 4.16 installed antivirus, web traffic filtering, management review, Operating procedures, and taking regular backup.
As shown from the figure above,90% of the surveyed banks have documented operating procedures
such as back-up, and equipment maintenance and 100% of them takes daily back up of financial data
and other like human resource data has taken on a weekly bases. Beside this 99% of the surveyed
banks has installed and regularly update antivirus on computers that they possess. In addition to, 65%
of them protect web traffics originating from untrusted network using firewall, and Web filters.
85% of surveyed banks have management review internal control reports and initiate corrective action
where necessary.
Access Control
The majority of banks follow some steps when a new system (such as Firewalls, Routers, and
Switches etc.) is installed on the network. In this group the researcher has tried to see issues by
categorizing in to seven basic elements which are stated in the figure below.
Figure 4.17 user access control, formal user registration& de-registration procedure, allocate & use any privileges, keep
password of organization, reviewing user access rights, disable protocol, & guidelines for users
In the above figure 4.17, it shows that 100% of surveyed banks user sign a statement to keep password
to the organization. In case of access right 90% to allocate and use any privileges in multi-user
security and 60% of surveyed banks close or disable any unnecessary protocol and services.
In addition, 75% of the surveyed banks have access control policy documents for granting access to
information systems. And 80% of them has formal user registration and deregistration procedures to
manage users who have access to the very critical resources of the server.
Only 20% of the surveyed banks have procedures to review access rights they grant to users as
required and also 85% have guidelines for users in selecting and maintaining the security password of
the organization.
Poor, 5%
Good, 15%
Excellent,
Very good, 45%
35%
In general, the surveyed banks have medium technical security facilities to protect their sensitive and
mission critical information even though they are so weak in performing key management assessment,
and reviewing user access rights.
Figure 4.21 visitors & contractor’s supervision, performing equipment pre-disposal authorization and checking.
As shown in figure 4-21 above, 30% of the banks surveyed do not supervise the visitors and
contractors when they visiting the data center /server room while the rest 70% supervises them. 70%
of the surveyed banks, authorization and checking occur on equipment entering or leaving your site
while 30% did not do same. Moreover, in 40% of the banks, sensitive data and licensed software
removed from data-storage equipment prior to disposal but 60% of the banks did not do same.
Figure 4-22: alternate power, AC, Fire extinguisher system, fences, and CCTV camera & door access system
As shown in figure 4-22, the finding from the survey shows that 20% of the banks surveyed don’t have
fire suppression, water leakage while the rest 80% possesses, and also 15% of the bank don’t have
door access control, and CCTV system, while the rest 85% possesses. But when it comes to alternate
power supply (generator) 100%, Air Conditioning, and fence or security guard 95% all surveyed banks
have employed.
In general, most selected banks have enough physical and environmental security facilities for their
sensitive and mission critical equipment like servers, even though they are weak in visitor and
contractor supervisions.
The literature review, questionnaire and interview findings and the researcher’s findings and exposure
shows that there is no local cyber security auditing framework that aid in development and
implementation of cyber security framework to secure data in banking industry in Ethiopia.
Therefore, based on insights gained from the analysis of literature on various international frameworks
such as ISO/IEC27k series, COBIT, PCI-DSS...etc., data analysis of interviews and questionnaire
findings, and the student researcher exposure findings from different sources, cyber security audit
framework has been proposed. The proposed CSA Framework has two major components viz;
Requirement identification mechanism and Counter measures.
In requirement identification mechanism the student researcher used the combination of two models
such as: Entity Relation Model (ERM) and CSAF process Model to identify a bank’s cyber security
requirements prior to select best practice or controls. The process is supported by a template which is
developed by the student researcher.
ERM is employed to identify the entities which have interaction to a bank and its data flow among
them. In CSAF process model it is employed to guide the bank’s cyber security requirement
identification and best practice (control) selection and implementation process.
In addition, the researcher’s own defined template or tool is employed for easy understanding and
documenting the detail security requirement identification and controls selection process.
Ethiopian banks have different goals, strategies, organizational cultures and structures. Consequently,
the ideal management system and the way to achieve it will differ among banks. Thus, this study
proposed a framework instead of a proposing a simple methods of cyber security control and
management techniques.
V. President for
IT division
Director for cyber security resource audit and the director for cyber security resource management are
directly reports to Vic president for IT division, in turn to higher officials or board. The two
directorates of the IT divisions are responsible for creating secure operational and technical systems of
the banks. Including the system administrator, data base administrator, web developer, technical
supports etc. are also reports directly based on the divisions stated above.
of a resource. For example, for a physical resource (e.g. server) the value of the resource could be
determined at the replacement cost, but there are a variety of other factors that need to be considered
including, cost of unavailability of service provided and loss of reputation or goodwill, etc. It is
important that all costs or values are considered.
Physical inventories of equipment and the data they host will help the bank to identify critical assets.
There are two methodologies for creating a complete inventory: service based and hardware based
[46]. A service-based inventory establishes a hierarchy of assets, starting with a top-level service,
branching into the information assets that support it, branching again divided into the assets that
support them, and so on.
The cyber resource identification process should at least identify:
The bank’s cyber resources such as: Policies, procedures, guidelines, user manuals, Organizational
chart, Function descriptions, Business applications, The data used by business applications and
flow, Roles and Authorization matrix, Operating Systems, Database management systems, cyber
resource utility programs, The existing network infrastructure, The communication links between
the cyber resources systems and the outside world, The hardware in use (e.g. routers, firewalls,
servers etc.).
The owners of these resources
Its value and sensitivity of cyber resources
Threats to those resources
Possible vulnerabilities exploited by the threats and implemented security management and
control.
Implemented security management and controls.
The best way for a bank to know its assets and protect them from attack, including from insiders, is to
conduct a risk assessment. A risk assessment will teach a bank about the types of data and its systems
process, who uses the data, and where it has to be stored [10].
The risk assessment is a process to identify the risks and assess the damage it could cause. The end
result of a risk assessment is justification of any control or safeguards that need to be implemented to
mitigate the risk to an acceptable level.
Risk identification is the determination of threats and vulnerabilities that could lead to an adverse
event. The focus is on the nature and source of the risks such as:
What was happened? What goes wrong?
How could it happen?
Why it is happened?
Who is affected? What is affected?
A combination of the following methods and techniques may be used to carry out the risk assessment:
Interviews, Walkthroughs, Workshops, Questionnaires, “Computer-assisted audit techniques” (CAAT)
(e.g. vulnerability scanning), and Network penetration testing.
Once the risk against any resource is identified, the risk is analyzed based upon two factors, namely,
likelihood of risk materializing and the Consequence of risk materialization to the bank.
Risk measurement is the next critical stage after identification and analysis of risks and it is concerned
with quantifying the extent of the bank’s risk exposure.
This model has three stages as stated by [9] such as Evaluation stage, Formation Stage and
implementation stage (Figure 5-3).
5.5.1.3 Template
Cyber security resource management (CSRM) system process model is supported by the template
which is designed by the researcher for easy understanding and documentation purpose. The detail will
be presented in the next section.
identified in literature reviews, interview and questionnaires of the study. This framework is an
integration of available standard components discussed and derived from literature review.
Nevertheless, the suggested framework is still a general approach to cyber security resource
management program, it needs to be reviewed by professionals and tested in the real banking
environment. As each bank’s environment is different and additional components might be required.
Since framework is a real or conceptual structure intended to serve as a support or guide for the
building of something that expands the structure into something useful (ISO2001-2, 2005).
CSRM Framework has a great contribution in CSAF development even though it is a time consuming
process, but it is a necessary perform secure operations of any cyber system. This paper describes the
CSA Framework using cyber security resource management Process model, ER-model and template.
5.6.1. ERM- Different entities inter relationship to selected local banks of Ethiopian
Correspondents (e.g.
Venders and support
Dehabshil, western union , providers (ATM machines
money gram, Bole Atlantic, software providers etc.)
swift, etc
Other Local Banks External Consultant
Selected Banks and Auditor
In
Ethiopia
Government
(National bank policy Customers
®ulations) Internal / External
Service Providers (e.g.
Ethio-Telecom, Ethiopia
Electric Utility
Figure 5-2 Different Entities Interacting selected banks
ER-diagram is used to show the trust relationship or interaction between entities (figure 5-2). It is also
used to identify a type of cyber resources required for business process, level of interaction through the
Feed back
Figure 5.3 the model divides the CSRM processs into its sub-processes
Evaluation stage: What is the subject of evaluation? What types of activities are generally
associated with an evaluation? What does an evaluation result in?
The evaluation stage includes everything it takes to assess the current situation about cyber security
management in the bank. It takes into account not only the administrative / organizational security
issues, but also the technical (IT) security issues. The main results (output) of the evaluation stage are
reports of vulnerabilities and deficiencies in relation to cyber security.
Formation stage: The formation stage takes these reports as its main input. And also adds
knowledge about the bank, its business processes, culture, etc. The goal is to design and develop
solutions tailor-made to the bank that will remedy any vulnerabilities and deficiencies in the
current situation. The formation stage is largely analytical.
Implementation stage: The implementation stage takes the solutions from the conceptual level and
makes them work in the organization. It entails for example installing and configuring technical
security mechanisms as well as cyber security education and training to employees.
Feedback: Once implemented, the cyber security auditing framework is in operation and it starts
to generate feedback information to the next iteration – as input into the new evaluation phase.
Now, let us examine each of these stages more closely.
A. Evaluation Stage
The goal of the evaluation stage is to assess the current cyber security situation of the bank. This
evaluation takes into account not only the administrative security issues, but also the technical (IT)
security issues. Before any fruitful evaluation take place, cyber security management system
development team of a bank needs to gather some data (table 5-1). That is, data gathering based on
business objective and security strategies of the bank. There should be pre-evaluation task.
B. Formation stage
The goal of the formation stage is to design a technical and organizational infrastructure for cyber
security that suits the business. Such infrastructure is documented as cyber security management
system – often presented in the form of a security handbook for the bank. The written documents
contain policies, procedures and guideline, with regards to how employees should handle cyber
securely.
C. Implementation stage
The goal of the implementation stage is to take the CSRM documents, including also the technical
controls, from the design document to reality.
The rules in the CSRM have to be communicated to relevant groups throughout the bank, employees
have to be motivated and educated and trained in using new technical security controls and following
the rules agreed to CSRM. Also, all the IT-related solutions have to be installed or (re-configured).
Cyber security has to be marketed so that the bank accepts adherence to the rules laid out in the
CSRM. This work can be aided by using a brochure or bank’s email communicating the most
important rules (e.g. “This is how you use the password”) and explaining the most common technical
controls. If all goes well, the employees will sign on and feel motivated to follow the rules in the
CSRM. In that case, the result is that the bank will have reduced the cost from security breaches and in
some cases even enabled new streams of revenue in the future.
D. Feedback Mechanism
The feedback from all employees of the bank or any entity will be collected via email or forum
discussion. The responsible body of the bank related to security will analyze and discuss with the top
management about the advantage and disadvantages of the feedback and take action.
Internal Auditing
Branches of
the banks
Guests
Procurement and
Service management Security
(PSM)
The Risk & Compliance process: has a mandate to perform risk identification, assessment, control
and monitoring of the bank’s business risks.
Legal Services: is responsible for timely and reliable legal services to processes of the bank. This
process is also responsible for ensuring the provision of independent legal advice in the best
interests of the bank and consistent with the bank’s legal obligations.
Other Business Departments: Provides a detailed record of the transaction coming in and going
out of the business and prepares accounts as a basis for financial decisions. To accomplish these
tasks they need to get bank’s financial data from the system which is managed by cyber security
resource management (CSRM) department since it is the owner of the cyber system.
Bank’s Internal Audit Process: The Internal Audit Process (IAP) bears primary responsibility for
audits. IAP conducts audits in accordance with the banks internal polices and International
Standards for the Professional Practice of Internal Auditing (Standards). In other words, auditing
department that inspect, analyze and rate the financial (or IT services) operations and practices of
bank.
Human Resource and Administration: Deals with all the recruitment, training, health and safety
and pay negotiations with unions/workers of bank. And also it ensures the proper performance of
the Human Resource Process across the bank.
Procurement and Service Management: Buys all the supplies materials and goods required for
bank and manage transport service. And it also performs asset inventory.
Branches: is part of the bank which has a mandate to accomplish bank’s objective and mission at
branch level. It also responsible for the branch system security
Guest: a person who has limited access to bank’s system based on the contractual agreement.
Security: This has a mandate for assuring physical security of the bank and cleaning the server
room/ data center and disaster recovery and the whole compound by large.
According to [23] State that although it is often speaks of “best practice” in connection with data
security, in practice there is no standard that completely regulates all of the aspects of cyber security
and can fulfill the needs of individual banks to the same degree. The reasons why there cannot be
universally correct cyber security, because of the significant differences between various economic
operators, even within the same industry. Different banks have different sizes, financial strengths,
organizational cultures, values, core competencies, visions, business strategies, business models, target
customer segments, and also different risk policies. Thus, banks may have dissimilar ideas about the
importance and value of cyber security for the achievement of particular business objectives and a
correspondingly different willingness to pay for it.
Bank cyber security resource management should have its own place within the framework of bank
governance, beside cyber resource governance and risk management. The effectiveness of CSRM
depends on management's commitment and ability to clearly identify what makes existing business
processes work properly and safely. Each bank should evaluate its own unique circumstances and
environment to develop appropriate CSRM policies and procedures. The required controls can be
derived from the ISO/IEC 27002 standard, internal sources or any other sources such as COBIT, PCI-
DSS …etc.
Adopting to the cyber security controls from ISO/IEC 27k-series will provide the bank a solid base to
build on. banks are free to choose any standard, however in order to have a common and solid
foundation for CSRM, the CSRM policies, standards and procedures should at least consider the
ISO/IEC 27002 control objectives in addition to controls added by the researchers in this paper
Therefore the newly proposed frame will have fundamental elements that should all banks cyber
security resources could be controlled and managed, but there might be variations in the detail
components of the cyber security controlling and managing element among different banks which will
be cover in the proposed framework.
ORGANIZATIONAL MANAGEMENT
ASPECT
Security Policy
Organizational
Security
OPERATIONAL
ASPECT
Legend
Based on the literature review, questionnaires and interview findings 16 main control objects are
identified the sources for such controls are derived from international standards, Literatures and
challenges from the real world during the survey. All these 16 components or control objects are
summarized using organizational structure for easy understanding as shown in figure 5-5 above.
These components are further categorized into three major groups for easy of understanding such as
Administrative, Physical & environmental, and Technical & operational issues.
A1. Asset Management: To achieve and maintain appropriate protection of information assets.
A2. Human Resource Security: To ensure that employees, contractors, and third party users
understand their responsibilities, and are suitable for the roles they are considered for, and to
reduce the risk of theft, ethical issues, fraud or misuse of facilities.
A3. Cyber Security Incident Management: To ensure cyber security events and weaknesses
associated with cyber systems are communicated in a manner allowing timely corrective action
to be taken.
A4. Business Continuity Management: To counteract interruptions to business activities and
to protect critical business processes from the effects of major failures of cyber systems or
disasters and to ensure their timely resumption.
A5. Compliance: To avoid breaches of any law, statutory, regulatory or contractual
obligations, and of any security requirements set by the banks policy and regulations.
A6.Risk management: coordinated activities to direct and control an organization with regard
to risk. It includes risk assessment, risk analysis, and risk evaluation.
A7. Security Policy: is a set of guidelines established to safeguard the network from attacks,
both from inside and outside a bank. A cyber security policy must be developed which reflects
bank’s objectives, management support and commitment, and core values gives to
technological advancements.
A8. Organizing Cyber Security – Management must establish a framework to initiate and
control the implementation of cyber security. Cyber security must extend to external parties.
A9. Cultural analysis: To keep and understand the society where the business runs in and be
able to obey and protect the resources from misuse.
A10.Trust and ethical conduct: must be exercised in the bank to control human elements.
P1. Physical and Environmental Security: To monitor and prevent unauthorized physical
access, damage, and interference to the bank’s premises and cyber resource.
T1. Communications and Operations Management: To ensure the correct and secure
operation of cyber processing facilities.
T2. Access Control: To control read, add, update and delete access to cyber resources.
T3. Cyber systems acquisition, development and maintenance: To ensure that security is an
integral part of cyber systems.
T4. Penetration testing: A penetration test is a method of evaluating the cyber security of a
computer system or network by simulating an attack from external threats and internal threats.
Hack yourself before hacked by someone!
T5. Cyber Security Auditing: Defines audit policies to ensure the integrity of cyber and
resources. This includes a process to investigate incidents, ensure conformance to security
policies, and monitor user and system activity where appropriate.
All these 16 components or control objects, which are identified above, are summarized using
organizational structure for easy understanding.as shown in figure 5-5 below.
A security policy is a living document, meaning that the document is never finished and is
continuously updated as technology and employee requirements change. It acts as a bridge between
management objectives and specific security requirements.
The cyber security policy is for everyone, including employees, contractors, suppliers, venders and
customers who have access to the network. However, the security policy should treat each of these
groups differently. Each group should only be shown the portion of the policy appropriate to their
work and level of access to the network.
It is identified some of (around 21), not limited to, the components of compressive cyber Security
Policy of a bank that requires policy.
Statement of authority and scope- Defines who in bank sponsors the cyber security policy, and
who is responsible for implementing it, and what areas are covered by the policy.
Acceptable use policy (AUP)-Defines the acceptable use of equipment and computing services,
and the appropriate employee security measures to protect the bank’s resources and proprietary
information.
Identification and authentication policy-Defines which technologies the bank uses to ensure that
only authorized personnel have access to its data.
Internet access policy-Defines what the bank will and will not tolerate with respect to the use of its
Internet connectivity by employees and guests.
Incident handling procedure-Specifies who will respond to security incidents, and how incidents
have to be handled
Account access request policy-Formalizes the account and access request process within bank.
Users and system administrators who bypass the standard processes for account and access
requests can lead to legal action.
Cyber resource Audit policy-Defines audit policies to ensure the integrity of cyber and resources.
This includes a process to investigate incidents, ensure conformance to security policies, and
monitor user and system activity where appropriate
Data sensitivity policy-Defines the requirements for identifying, classifying and securing
information assets in a manner appropriate to its sensitivity level.
Password policy-Defines the standards for creating, protecting, and changing strong passwords.
Risk assessment policy-Defines the requirements and provides the authority for the “cyber security
team” to identify, assess, and remediate risks to the cyber resource infrastructure associated with
conducting business.
Web server policy-Defines the standards required by all web hosts.
E-mail policy-Defines content standards to prevent tarnishing the public image of the bank.
Automatically forwarded e-mail policy-Documents the policy restricting automatic e-mail
forwarding to an external destination without prior approval from the appropriate manager or
director.
E-mail Retention Policy- is intended to help employees determine what cyber information sent or
received by email should be retained and for how long
Spam policy-Defines how spam should be reported and treated.
Cyber resource equipment Disposal Policy- defined procedures that ensure implementation of
controls to address the reassignment or final disposition of hardware and electronic media.
Wireless network security policy- defines the requirements for the secure implementation of
wireless networking technology within bank. This policy applies to all wireless networking
equipment, software and services used for official bank purposes.
Mobile Banking Security policy-defines security guidelines for mobile device banking
applications (that is, banking from mobile phones and other mobile devices like iPhones with web
access) and user requirements for enrolment to this service.
Internet Banking Security Policy –defines the requirement of Internet banking users and
enrolment process.
Remote access policy-Defines how remote users can use the remote access infrastructure of bank.
Remote access policies may include:
a. Defines the appropriate dial-in access and its use by authorized personnel.
b. Defines the standards for connecting to the bank network from any host or network external to
the bank.
Data Center and Disaster Recovery Policy
Some of the points which may include are:
Physical Access Management (i.e. Door access control System). It will consider the following
entities.
Data Center and Disaster recovery Tours / Visitors access
The scope of Vendors access
The scope of Ethio-Telecom and Ethiopian Electric utility Service engineers access
Employees access
Systems Monitoring
External (Network) System Monitoring/Intrusion Detection
Internal (Host) System Monitoring/Event Log Monitoring
Environmental Controls system CCTV/ IP Camera
Air conditioning units
explained based on theoretical studies which were later confirmed by performing survey among the
selected banks. The survey results were analyzed, for all security frameworks based on the following
interview questions.
How easy is the framework to learn?
How efficient is it for frequent use?
How easy is it to remember the activities in each phase of the framework?
How satisfied are you with the framework?
How easy it is to understand the benefits of the framework?
The first two interviews revealed that the guideline requires a change. We improved the framework
guideline thus making it easier to understand. After that, we proceeded with next respondents. The
interviews with the respondents lasted on an average an hour by raising relevant comments by the
respondents. Three of the interviews were recorded using phone while one respondent asked us only to
make footnotes. The goal of the interviews was to understand whether improvements should be made
to the framework and to get feedback on the workability.
5.8.4 Results of the Case Study
Each of the study participants was asked to give feedback on the framework usability and to rate it on
a scale of 1 (lowest) to 5 (highest). We provide the results in Table 5.8 below
The first response about the ease of learning is lower than the others, since improvements were made
to the framework guideline based on the interviews. The rest of the survey does not have outstanding
differences.
We have applied the guidelines (e.g. personal interviews, objective questions, addressing potential
risks to validity) suggested by [37] to minimize the threats to the validity of our case study. However
there are still few which should paid attention be to when reviewing the results. The first and probably
St. Mary’s University 70
Cyber Security Auditing Framework (CSAF) For Banking Sector In Ethiopia 2018
the biggest threat, is the number of participants in the case study. We asked 4 professional to evaluate
our framework. The number of the participants was kept low due to the lack of professional and
willing to respond the questionnaire. For future work, further analysis should be carried out by
including more respondents to the evaluation framework’s usability case study. Another aspect which
should be mentioned is that the framework validation focused only on the usability and did not address
the completeness of the security framework. To address this risk additional research should be carried
out to confirm if all required test features have been included to the evaluation framework. Finally, a
threat to the validity of the case study comes from not confirming the correctness of the evaluation
framework. We have not investigated if the framework will produce the same results for different
respondent groups who evaluate the same test frame work with other security system evaluation
framework. Our focus was only on the framework usability and thus, the correctness is subject for
future work.
5.8.6 Summary of the Framework Validation
The researchers carried out a case study to investigate the usability of the cyber security framework
evaluation. The study involved 4 practitioners and they were asked to evaluate their banks system
based on the proposed framework .The result of the evaluation confirms that the framework is easy to
learn, efficient for frequent use and fit for purpose. There was one respondent, who was doubtful of
the framework suitability for the task, In addition the student researcher has made an improvement
based on the comments given by the professional in the areas of its guideline to follow a stepwise
approach in which the In conclusion, the strongest aspects of the cyber security frame Auditing
framework are efficient and it reduces some of the risk in the area.
6.1. CONCLUSIONS
In today’s technological and social environment, cyber security is a very important part of a banking
system. Business partners, suppliers, customers, and vendors require high cyber security from one to
another, particularly when providing mutual network and data & information access. Banks’ ability to
take advantage of new opportunities often depends on its ability to provide open, accessible, available,
and secure network connectivity and services.
The general objective of this research was to propose generic cyber security auditing framework for
banking sector in Ethiopia. To achieve this objective, the researcher selected Ethiopia banking sector
to understand the current cyber security auditing by investigating the readiness situation and identify
factors that influence security audit implementation on the industry. After sharing experiences and
knowledge from the survey study, then put it in to the existing knowledge on the subject matter, which
identified from document analysis and literature reviews. Finally, a new framework has been
developed to help the banking industry for exercising cyber security audit activity. The empirical study
was done through mixed research method; questionnaire designed was based on ISO, NIST, and ICT
security readiness checklist based on twelve minimum security requirements and data was conducted
with professionals, having good experience on the subject, by using Fredric framework model.
Therefore, based on the researches finding, Ethiopia banking industries are at low level of readiness.
The capability to conduct cyber security audit partly depends on the existence of policies, procedures
and processes, which the majority of Ethiopia banking industries are lacking. The existence trained
man power in the area, consulting firms specialized in cyber security auditing, IT staffs readiness, etc.
also have low readiness in the country. The study shows it is in adequate. To solve the existing
situation we recommend having cyber security auditing framework. It enables organizations to have
standardized approach of addressing cyber security auditing by realizing the requirements: cyber
security polices, standards, procedure and processes in the different security management domains.
Therefore, the research proposes a workable cyber security auditing framework that contributes for the
industry as a starting point for cyber security auditing.
6.2. Recommendations
1. The framework can be used as an initial effort for practitioners in the banking industry to
manage their cyber security. The results of the research also imply the need for further
researches to make the framework more compressive and useful.
2. The framework should also be inclusive through rigorous testing to minimize the limitation of
the framework
3. The framework should also be strong through upgrading it elements in different approaches
4. There need continues follow up for its validation as per the dynamic cyber security challenges
of the real-world.
5. The Organizational management aspect, operational aspects and the physical and
environmental aspect should fit to the best level of the current challenge, mitigation strategies.
6. Beside the above listed recommendation there needs cyber security training for all employees
in organization is important;
7. Frequent workshops or seminars should be organized on cyber security on top of training;
8. Government and other responsible organizations need to formulate ethical hackers team and
cyber security audit firms by encouraging with some special benefit (like tax shield, office
facility) up until the proper awareness about cyber security audit made to people and
organizations in the country;
9. Need to formulate security professions association for challenging things in group:
10. Encourage researchers to work more on security and related areas to develop more personnel in
the area.
11. A national or regulatory bodies that manages and leads the country’s cyber security needs to
formulate a program and give training to different organizations in country about the use of
cyber security and policies;
12. Laws and policies must define what is right what is wrong as well as what penalties are put in
place for violating security policy and prepare legal framework for security audit;
References
th
[1] Abiy, W., and Lemma, L. Information Security Culture in the Banking Sector. Ethiopia. 5 ICT
2012 Ethiopia Conference. Venue: UN ECA, Addis Ababa, Ethiopia, (2012),
[2] Ana-maria, M. nizol & F. Gheorghe, “Audit for information system security”, Informatical
economical Vol, 14, no. 1/2010, pp5, 2010, retrieval from http: //
revistaie.ase.ro/content/53/049620 suduc, % 2013, 201, %20Filip.pdf, last accessed on October
2012.
[3] Anene, L. N., & Annette, L. S.. An Architectural and Process Model Approach to Information
Security Management. Lawrence Technological University. (2007)
[4] Anon International Journal of Electronic Security and Digital Forensics [Online] 2(3), P.306–
321Retrievedfrom:
http://www.inderscience.metapress.com/openurl.asp?genre=article&issn=1751-
911X&volume=2&issue=3&spage=306. Accessed Date: 12 Sep 2012 9:31 AM, (2009).
[5]. Bel G.Raggad & Emilio Collar,” The Simple Information Security Audit Process:
SISAP”,IJCSNS International Journal of Computer Science and Network Security, Vol-6,No 6
,June 2006,retrieved from http://papaer.ijcsns.org/07-book/200606/200606c10.pdf Last
accessed on January 23,2013.
[6] Catherine, D. “Introduction to Research Methods a Practical guide for any one undertaking a
Research Project”, Oxford, 2009, 4th Ed.
[7] Ettaul1, L. Rathod, V. “The zachman framework, the owner’s perspective & security” retrieved
from http://www.mcs.csueastabl.e.Last accessed on March 2013.
[8] Franklin D. Kramer, An Integrated Governmental Strategy for Progress, IOSR – JCE pp. 136-
150, (2011),http://www.jstor.org/stable/43133822.
[9] Fredrik. J. B. Discovering information Security Management. Stockholm: Department of
Computer and Systems Sciences Stockholm University & Royal Institute of Technology.
(2005).
[10] George, S., Dawn, C., Andrew, M., Randall, T., Timothy, J. S., & Lori, F. Common Sense
Guide to Mitigating Insider Threats 4th Edition. Software Engineering Institutes. (2012).
[11] Griffin L. K. “Analysis & comparison of DODAF and ZACHMAN framework for use as the
Architecture for the united states coast guard’s Maritime patrol coastal (WPC)”,
[35] Santos, H. & Periora, T. “ A security framework for Audit and management Information system
security” IEEE/WIC/ACM International conference on web Intelligence and intelligent agent
the chorology, 2010, retrieved from http: // www.researchgate.net/publishing/224187157
[36] Seribd, “Networks security Audit”, February 2010 retrieved from, http:
//www.scribd.com/doc/12734608/security-Network-Audit-Steps, last accessed on November
2012
[37] Tan, M.T.K. and Hall, W. Beyond Theoretical and Methodological Pluralism in Interpretive IS
Research: The Example of Symbolic Interactions Ethnography, Communications of the
Association of Information Systems, 19(1), (2008).
[38]. Tarimo, C. N. “ICT Security Readiness Checklist for Developing Countries, Stockholm;
Department of computer and Systems Science, Stockholm university, 2006
[39] Terry. T and Robert K., “Intrusion Detection and Information Security Audit, IGI Global, 2007,
retrieved from http: // www.hiltbrand.net/docs/auditing.pdf,Last accessed on December 01,
2012.
[40] Venkatesh, V., Brown, S. A., & Bala, H. Bridging the qualitative-quantitative divide: Guidelines
for conducting mixed methods research in information systems.MIS quarterly, 37(1), 21-54.
(2013)
[41] Wikipedia free encyclopedia, http: // www.en.wekipedia.org/wiki/wikipedia:free encyclopedia.
[42] Yigezzu.B, “Information System Security Audit readiness in case of Ethiopian government
organizations. 2011, retrieved from http: // www.spidercenter.org/sites/defult/files/master-
thesessponsoret/Ms-thesis-jorro.pdf.lastaccesses on July 2012.
Appendix’s
ST.MARY’S UNIVERSITY
SCHOOL OF GRADUATE STUDIES
FACULTY OF INFORMATICS
Dear respondent,
First of all, I would like to thank you in advance for devoting your precious time to fill in the
questionnaire. This questionnaire is prepared to assess the Ethiopian Banking Industry’s Cyber
Security Auditing experience and readiness for implementation of cyber security audit and exploit as
an input for developing a new cyber security audit framework. The information that you provide will
be used to undertake a study entitled “Cyber Security Auditing Framework For Banking Sector In
Ethiopia”
The study is done as part of partial fulfillment of Master of Science in Computer Science. The
information you provide will be very confidential, and hence, I kindly request you to carefully and
attentively read all the questions and give your genuine answers to the best of your knowledge. Your
data is expected to contribute for the success of the study tremendously. If you have any enquires, you
may contact me via the address stated below.
Instruction: Please put a “”sign in the square bracket for each item. You can also write your
opinion or justification for open ended question.
Part I. PROFILE OF RESPONDENTS
1. Sex:
Male Female
2. Age:
3. Marital status:
Single Married
4. Educational Level:
Certificate Diploma
5. Your Profession:
6. Position:
8. Work Experience:
10 Do you think that separating Cyber security team from other IT staffs structurally under IT
department is advantageous from Cyber security auditing perspective?
Yes No. .
If the answer is No, why?
____________________________________________________________________________
______________________________________________________________
_____________________________________________________________________
11. Do you think that lack of experienced staff on international standards, lack of local cyber
security Framework/standard, and budget are problems that hindered the implementation of cyber
security System in your bank?
Yes No
12. Does the bank have formal risk management mechanisms?
Yes No
13. Does the information security policy consider all stakeholders such as employees, contractors,
suppliers/venders, service providers, and customers who have access to the bank’s network?
Yes No
1. How do you rate the physical and logical security facility implemented to protect Cyber
Security System of your organization?
Excellent Very good
Good Poor
2. Are visitors and contractors supervised when they visiting your servers room?
Yes No
3. Does authorization and checking occur on equipment entering or leaving your site?
Yes No
4. Physical security is critical to achieving confidentiality and availability goals of mission
critical facilities like server rooms/ data center. What kind of security enforcement is/are used
to protect it.
1. Does employees’ written job description include responsibility for information security?
Yes No
2. Does the bank invite employees to be involved in the development of information security
policies in order to encourage a sense of ownership?
Yes No
3. Are employees sign confidentiality or non- disclosure agreement as a part of their initial terms
and conditions of the employment or on internal memo?
Yes .No
4. Do you have verification checks on permanent staff at the time of job applications?
Yes No
5. Do you have written incident Management and formal reporting procedure to handle security
incidents?
Yes No
6. How often your organizations give IT use and security awareness training to staff, venders
and/or customer?
Don’t conduct awareness .Once a year
. Twice a year
7. How do you rate technical staffs’ awareness about emerging technologies and related control
issues?
Excellent Very good
Good .Poor
1. Do you have any operating procedures such as back-up, equipment maintenance, etc.?
Yes .No
2. Is antivirus installed and regularly updated on the computers that exist in your organization? Yes
No
3. Is all the traffic originating from un-trusted network into the organization checked for viruses?
Yes .No
4. Is back-up of essential information taken regularly?
Yes .No
5. Does management review internal control reports and initiate corrective action where
necessary?
Yes No
Yes .No
1. How do you rate a culture of conducting cyber security requirement study before systems
development in your organization?
3. Is there a culture of conducting cyber security requirement study before systems development
and test its security related issue in your bank?
Yes No
Yes No
4. Are risks from third party access identified and appropriate security controls implemented?
Yes No