Posts

Showing posts from June, 2024

Modernizing Disaster Recovery: The Shift from Traditional to Cloud-Based Solutions

Image
Strong data protection and disaster recovery measures prevent fraud and cybercrimes that cause considerable financial loss and damage user trust. IBM’s Cost of a Data Breach Report 2023 reports a 15% increase in data breach costs averaging $4.45 million per breach (Pop, 2024). Disaster recovery in cloud computing offers a more flexible, cost-effective approach to disaster recovery that scales according to your resource needs. By enabling organizations to store system backups on multiple servers in different geographic locations, disaster recovery in cloud computing reduces the harm caused when natural disasters affect system backups on physical servers (Veritas Transcend, 2024). Cloud snapshots, incremental backups, and automation improve the speed that data can be stored, whereas physical disaster recovery requires full, less frequent backups (Stringfellow, 2019). Disaster recovery in cloud computing offers additional security in a setting familiar with monitoring disaster recovery, w...

Challenges in Prosecuting Deep Web and Darknet Crimes: The Case of Ross Ulbricht and the Silk Road

  The deep web represents online information that is not easily accessible through search engines. Prosecuting crimes on the deep web is no more challenging than prosecuting crimes for any standard website because law enforcement can still track the user's location through a domain or IP address. Alternately, the darknet poses a challenge for law enforcement to address illicit activity because while the darknet is a web-based system, it is accessible only through the Tor protocol that encapsulates HTTP and HTTPS traffic, much like a VPN that hides a user’s location and identity. The Tor protocol, often called the Onion Router, contains methods for encrypting and routing traffic between peers. The purpose of the Tor protocol is to make web browsing anonymous by routing each request through multiple peers and altering encryption at various steps until the request reaches its destination. Subsequent requests may hop through different peers, making traffic appear random, unpredictable,...

Bridging the Gap: The Need for Technical Expertise in Auditing Records Management and Security Controls

Image
Evaluating Internal Controls for Records Management To evaluate how management establishes adequate internal controls for records management, an auditor would first consider the information security policy, privacy policies, standards, and procedures. Evaluating the policy against laws, regulations, and best practices provides insights into access control, data protection, incident response, and user responsibilities. However, an auditor cannot adequately assess the adequacy of records management and the records management classification processes for the IT organization. While data classification helps auditors identify the required level of protection and handling, the auditor checks off that the organization has access controls and other policies. However, auditors do not typically verify the correct technical implementation of these controls. This oversight creates potential security gaps when technical implementation during an audit is not validated. The auditor is not a software ...

Auditor's Perspective: Responsible Operations and Service-Level Management

Service Level Agreements define service expectations and establish accountability between the service provider and the client. The service level agreement provides baseline metrics for expected performance, whereas KPIs provide data on the operational efficiency of the provider at meeting those expectations. Service Level Agreements address key business needs to protect the organization from financial loss. Ajelix.com identifies the important role of KPIs in “identifying bottlenecks, eliminating waste, maximizing the performance of your equipment, workforce, and processes, discovering actionable strategies to optimize your production flow, minimizing downtime, and driving your operation towards peak performance” (Raza, 2019). It suggests that effectively leveraging KPIs can transform an organization’s operational efficiency and move the organization towards success. The auditor would request to review the SLA agreements, KPI reports, and operational performance data to verify that the ...

Challenges in Investigating and Prosecuting Cybercrimes: Insights from the International Target and Lauri Love Data Breach Cases

Investigating and prosecuting cyber crimes presents unique challenges due to the borderless nature of the internet and the complexity of digital evidence. These difficulties are exacerbated by varying international laws and the need for extensive technical expertise to prosecute cyber crimes. Two notable real-world examples, the 2013 Target Data Breach and the 2012 Lauri Love FBI Breach, vividly illustrate these challenges. 2013 Target Data Breach. Red River Security identifies the 2013 Target Data Breach as a real-world case example of the difficulties involved in investigating and prosecuting cyber crimes: “The Target data breach was one of the biggest security breaches in history. Target was required to pay an $18.5 million settlement after hackers stole 40 million credit and debit records. But as with many unprecedented security attacks, Target’s data breach came with both warnings and lessons — which are still valid today” (Jones, 2021). It suggests that we can still learn lessons...

Measuring Risk Culture: Company Culture and Security Go Hand In Hand

Image
Organizations set security goals for their departments. One way that they can measure if the departments are reaching those goals is by setting KPIs. KPIs can count the number of employees that have completed their online employee training modules or count the number of systems that keep their patches up to date. This helps organizations quickly measure the work that has been done and the work that still needs to be done in the organization to ensure security. If a KPI indicates one employee still needs to do their employee training for compliance regulations, HR might send the employee a message to remind them to do their employee training modules as it is a part of the companies compliance requirements. If one system shows a need to have updates, the organization may schedule an engineer to complete the work to ensure a secure system. These alerts guide organizations in managing the control environment of large systems to monitor their security culture over time when their focus may...

Quality System Oversight: Ensuring Responsible System Development Life Cycle Practices Over Time

  Responsible System Development Life Cycle (SDLC) practices are crucial for developing systems because the System Development Life Cycle allows a company to account for systems used in their business for operational or financial benefits over time. The point of the System Development Life Cycle (SDLC) is to account for everything going on in the organization, including the technical systems. The SDLC helps the company track the financial, operational, regulatory, and business alignments in the organization. It allows the company to determine whether or not to use a system based on cost-effectiveness and ensures that configurations are correct. It's an important part of asset management because once you choose a system, it becomes an asset for the company. The SDLC covers the entire lifecycle, including the disposal of the system once you are done with it. Following the SDLC allows the company to have eyes on the system in all the important ways that apply to the business. Function...

Bridging the Gap Between Leadership and Cybersecurity: Lessons from John D. Rockefeller to Prevent Data Breaches

John D. Rockefeller once said, “I believe that every right implies a responsibility; every opportunity, an obligation; every possession, a duty.” He suggests that strong leadership holds a tremendous duty to act responsibly and ethically, recognizing that their power and resources come with the obligation to contribute positively to society and ensure the well-being of others. Data breaches are occurring with increasing frequency due to the rapid digital transformation of businesses, increasingly sophisticated cyber attacks, inadequate security measures, poor resource allocation, financially dependent employees with lower performance and loyalty due to increased stress and high employee turnover rates, and the lack of a comprehensive, integrated, proactive approach to cybersecurity. By adopting Rockefeller's principles of rigorous control, standardization, innovation, risk management, efficiency, and continuous education, organizations can significantly improve their data security ...

Enhancing Business Goals Through Effective Cybersecurity KPIs: How to Bridge the Gap Between Security Frameworks and Business Objectives

A security framework should act as a facilitator rather than a barrier to achieving business goals (Nichols, 2024). The Key Performance Indicator (KPI) serves to indicate if a goal is feasible and if it will bring value to the organization. Key Performance Indicators often serve as quantitative measures of compliance. The Cybersecurity Architect’s Handbook uses the example of including a KPI in an incident response policy to monitor that all incidents are contained within 24 hours of detection. A security information and event management (SIEM) system would continuously monitor the KPI and alert administrators to any deviations from the plan that incidents will be contained within 24 hours of detection. These important alerts allow the right administrators to step in when issues are not contained as expected within 24 hours, and they give the CIOs and CISO more visibility into the organization to create effective response and remediation plans. The top three cyber KPIs an organizatio...