Security

Computer Security and Data Privacy, the perfect alliance

Computer security and data privacy are often poorly considered issues, experts urge more awareness of cyber threats.

Computer security and data privacy are often poorly considered issues until incidents occur and unfortunately sometimes even the very seriousness of the events, understood as virtual happenings, is not adequately perceived. An injection of digital culture is needed to increase awareness of the cyber threat in all its forms.

While the 27035 standard covers system and network security incidents, it can also apply to incidents involving other forms of information such as documents, intellectual property, personal and business information. In this regard, both standards, the NIS Directive (EU) 2016/1148 and the GDPR Regulation (EU) 2016/679 define the correct protocol to be followed in the management of information in a complementary way.

It’s not possible to guarantee only security without having privacy or only privacy without guaranteeing security.

It’s not acceptable that a computer attack on the security of an information system could also lead to a breach of sensitive data.

Computer incidents commonly involve the exploitation of unknown (or poorly managed) vulnerabilities, and in some cases they are due to the superficiality of handling digital information in its various forms. Therefore, an adequate management of vulnerabilities and custody of information must represent the main objectives to be pursued through preventive and possibly corrective actions.

The Computer Security Incident Response Team

The RFC 2350 standard provides for the training of the CSIRT (Computer Security Incident Response Team), the team that performs, coordinates and supports the management of security incidents. The CSIRT must offer support through actions of awareness, prevention and coordination of the response to computer incidents, with the following main objectives:

  • Provide timely information about potential cyber threats;
  • increase security awareness and culture;
  • cooperate with other similar institutions;
  • facilitating the response to cyber incidents;

Once reports of incidents or threats have been received, the CSIRT evaluates their possible impact and informs stakeholders and, if necessary, coordinates them until the incident is resolved.

The CSIRT must disseminate the information necessary to counteract the incident and restore the state of normality as quickly as possible in cooperation with the community involved and must act primarily as an information gathering center that is promptly sorted within its community to facilitate its solution.

CSIRT – The Coordination

The coordination of the incident is managed through the following actions:

  • Identify the organizations involved;
  • Activate contacts with those directly involved to analyze the incident and identify actions to be taken;
  • Facilitating contacts with other organizations that can provide support in resolving the incident;
  • Promptly inform all those potentially involved within your community;
  • Prepare reports to be sent to other affected teams or organizations;

CSIRT – Services

The CSIRT to its community which can be a company, a company or an entire country system must offer proactive and responsive services:

Proactive:

  • dissemination of information aimed at increasing security;
  • dissemination of guidelines and standards for proper management and prevention of cyber incidents;
  • security training and awareness-raising and training campaigns aimed at users to increase awareness of cyber security issues;
  • exchange of information;

Reactive:

  • alerting and warning;
  • coordination and exchange of information for the solution of incidents.

The process of managing a computer incident

Standard 27035 also outlines the basic rules of the process of managing a computer incident (security/privacy) and provides steps that can be summarized as follows:

1.  The Incident Management Preparation phase;

2.  The Identification and Assessment phase to understand the extent and impact of the incident through monitoring and reporting;

3.  The Incident Response phase by containing, removing and attempting to resolve the problem or at least mitigate its consequences;

4.  The Learning phase to learn lessons for the future.

Considerations

Data protection and IT security is an issue that must involve the entire organization. The management of indexes must be understood as a process of continuous improvement ensuring:

  • a synergy of protection measures with management processes;
  • a definition of the roles to be assigned;
  • a training of the actors involved in the management;
  • a regulatory update;
  • a preservation of the activities carried out in the management of incidents.

About the author: Salvatore Lombardo

IT officer, ICT expert, Clusit member

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Computer security)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Meta plans to train AI on EU user data from May 27 without consent

Meta plans to train AI on EU user data from May 27 without consent; privacy…

2 hours ago

AI in the Cloud: The Rising Tide of Security and Privacy Risks

Over half of firms adopted AI in 2024, but cloud tools like Azure OpenAI raise…

4 hours ago

Google fixed a Chrome vulnerability that could lead to full account takeover

Google released emergency security updates to fix a Chrome vulnerability that could lead to full…

5 hours ago

Nova Scotia Power discloses data breach after March security incident

Nova Scotia Power confirmed a data breach involving the theft of sensitive customer data after…

15 hours ago

Coinbase disclosed a data breach after an extortion attempt

Coinbase confirmed rogue contractors stole customer data and demanded a $20M ransom in a breach…

18 hours ago

U.S. CISA adds a Fortinet flaw to its Known Exploited Vulnerabilities catalog

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a Fortinet vulnerability to its Known Exploited Vulnerabilities…

1 day ago