Security

Computer Security and Data Privacy, the perfect alliance

Computer security and data privacy are often poorly considered issues, experts urge more awareness of cyber threats.

Computer security and data privacy are often poorly considered issues until incidents occur and unfortunately sometimes even the very seriousness of the events, understood as virtual happenings, is not adequately perceived. An injection of digital culture is needed to increase awareness of the cyber threat in all its forms.

While the 27035 standard covers system and network security incidents, it can also apply to incidents involving other forms of information such as documents, intellectual property, personal and business information. In this regard, both standards, the NIS Directive (EU) 2016/1148 and the GDPR Regulation (EU) 2016/679 define the correct protocol to be followed in the management of information in a complementary way.

It’s not possible to guarantee only security without having privacy or only privacy without guaranteeing security.

It’s not acceptable that a computer attack on the security of an information system could also lead to a breach of sensitive data.

Computer incidents commonly involve the exploitation of unknown (or poorly managed) vulnerabilities, and in some cases they are due to the superficiality of handling digital information in its various forms. Therefore, an adequate management of vulnerabilities and custody of information must represent the main objectives to be pursued through preventive and possibly corrective actions.

The Computer Security Incident Response Team

The RFC 2350 standard provides for the training of the CSIRT (Computer Security Incident Response Team), the team that performs, coordinates and supports the management of security incidents. The CSIRT must offer support through actions of awareness, prevention and coordination of the response to computer incidents, with the following main objectives:

  • Provide timely information about potential cyber threats;
  • increase security awareness and culture;
  • cooperate with other similar institutions;
  • facilitating the response to cyber incidents;

Once reports of incidents or threats have been received, the CSIRT evaluates their possible impact and informs stakeholders and, if necessary, coordinates them until the incident is resolved.

The CSIRT must disseminate the information necessary to counteract the incident and restore the state of normality as quickly as possible in cooperation with the community involved and must act primarily as an information gathering center that is promptly sorted within its community to facilitate its solution.

CSIRT – The Coordination

The coordination of the incident is managed through the following actions:

  • Identify the organizations involved;
  • Activate contacts with those directly involved to analyze the incident and identify actions to be taken;
  • Facilitating contacts with other organizations that can provide support in resolving the incident;
  • Promptly inform all those potentially involved within your community;
  • Prepare reports to be sent to other affected teams or organizations;

CSIRT – Services

The CSIRT to its community which can be a company, a company or an entire country system must offer proactive and responsive services:

Proactive:

  • dissemination of information aimed at increasing security;
  • dissemination of guidelines and standards for proper management and prevention of cyber incidents;
  • security training and awareness-raising and training campaigns aimed at users to increase awareness of cyber security issues;
  • exchange of information;

Reactive:

  • alerting and warning;
  • coordination and exchange of information for the solution of incidents.

The process of managing a computer incident

Standard 27035 also outlines the basic rules of the process of managing a computer incident (security/privacy) and provides steps that can be summarized as follows:

1.  The Incident Management Preparation phase;

2.  The Identification and Assessment phase to understand the extent and impact of the incident through monitoring and reporting;

3.  The Incident Response phase by containing, removing and attempting to resolve the problem or at least mitigate its consequences;

4.  The Learning phase to learn lessons for the future.

Considerations

Data protection and IT security is an issue that must involve the entire organization. The management of indexes must be understood as a process of continuous improvement ensuring:

  • a synergy of protection measures with management processes;
  • a definition of the roles to be assigned;
  • a training of the actors involved in the management;
  • a regulatory update;
  • a preservation of the activities carried out in the management of incidents.

About the author: Salvatore Lombardo

IT officer, ICT expert, Clusit member

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Computer security)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

FBI chief says China is preparing to attack US critical infrastructure

China-linked threat actors are preparing cyber attacks against U.S. critical infrastructure warned FBI Director Christopher…

2 hours ago

United Nations Development Programme (UNDP) investigates data breach

The United Nations Development Programme (UNDP) has initiated an investigation into an alleged ransomware attack…

4 hours ago

FIN7 targeted a large U.S. carmaker with phishing attacks

BlackBerry reported that the financially motivated group FIN7 targeted the IT department of a large…

15 hours ago

Law enforcement operation dismantled phishing-as-a-service platform LabHost

An international law enforcement operation led to the disruption of the prominent phishing-as-a-service platform LabHost.…

20 hours ago

Previously unknown Kapeka backdoor linked to Russian Sandworm APT

Russia-linked APT Sandworm employed a previously undocumented backdoor called Kapeka in attacks against Eastern Europe since…

1 day ago

Cisco warns of a command injection escalation flaw in its IMC. PoC publicly available

Cisco has addressed a high-severity vulnerability in its Integrated Management Controller (IMC) for which publicly…

1 day ago

This website uses cookies.