Cyber Security Report
Cyber Security Report
Presented by:
they are growing more and more difficult to The agencies reported to Homeland Security’s
prevent. U.S. Computer Emergency Readiness Team
(US-CERT) a total of 18,050 incidents in
That’s the grim take presented recently by FBI 2008, compared with 12,986 in 2007 and
cybersecurity analysts and other experts, who 5,144 in 2006. The total number of incidents
are warning of a possible “cybergeddon” – a reported by commercial, foreign, private, and
scenario where the nation’s economy, in which government sectors rose from 24,097 in 2006
almost everything of importance is linked to to 72,065 in 2008.
or controlled by computers, is sabotaged by
hackers. The Federal Information Security Management
Act requires agencies to report cyber incidents,
Alarmist? Hardly. Shawn Henry, assistant which are defined as acts that violate computer
director of the FBI’s cyber division, says security or acceptable-use policies. The types
terrorist groups are working to create a virtual of incidents include unauthorized access;
9/11, “inflicting the same kind of damage on denial of service; malicious code; improper
our country, on all our countries, on all our usage; and scans, probes and attempted
networks, as they did in 2001 by flying planes access.
into buildings.”
Myriad threats
An online attack of that scale hasn’t happened There are, of course, several types of threats
in the U.S., but computer hacking – once that businesses and government agencies
something of a sport for brilliant delinquents alike must be on the lookout for including:
– is rapidly evolving around the world as a tool
of war. l Cyber espionage — occurs when a
government or business uses technology
Incidents skyrocketing to steal sensitive information. This may
One clear indicator of the growing threat is entail sophisticated hacking, but it may
the sheer volume of breaches. Federal civilian be much simpler – as when spies compile
agencies reported three times as many cyber- publicly available information from
related incidents in 2008 as they did in 2006 company websites, legal documents, etc.
l Cyber terrorism — the worst nightmare found that 88% of data breaches were caused
of U.S. security experts, entails seizing by simple negligence on the part of staff. This
control over a networked computer system negligence can take many forms:
to inflict damage. Imagine, for example,
terrorists hacking into the country’s air- u Using weak passwords.
traffic control system, or the electrical grid
of a major city. u Leaving sensitive information
unattended on a desk.
l Mobile computing— while a powerful
productivity tool when used securely, u Having a laptop or PDA lost or stolen.
offers serious breach potential. Lost or
stolen laptops, PDAs, and smart phones u Unknowingly allowing strangers
often carry sensitive data that could harm access to work facilities.
a business or even the government if it fell
into the wrong hands. Malicious insider attacks, while not as common
as innocent mistakes, have the potential to
l USB drives — they can be used by be more devastating because the employee
disgruntled employees to easily steal knows where the crown jewels are kept – the
sensitive company data, and they can also truly valuable company information coveted
be used to introduce crippling viruses to by competitors, hackers, or identity thieves.
corporate networks.
Exploding risk
Having more sensitive information being Changing Face of
seen by more people and accessed on more Cybercrime
devices drives up risk significantly, analysts
point out.
How are cyber criminals working today?
And the slumping economy doesn’t help. Mass According to the security experts, three
layoffs have increased internal threat levels major changes stand out:
dramatically. There are a lot of ex-workers
with a grudge out there, and they need 1. Hackers are in it for profit. The web is
money. Not only that, but one traditionally now a vital tool for criminals looking
weak area for company security is removing to make money, not merely mischief.
a user’s network privileges as soon as he or Malware-infected systems are used
she leaves the company – so plenty of ex- as a network of bots (that is, remote-
employees with an ax to grind have ready control robots) for a wide variety of
access to sensitive data. inappropriate activities. Bots can
perform denial-of-service attacks,
Employees worried about job security face send out spam and phishing emails
rising temptations to seek out and hoard – they’re the Swiss Army knife of
proprietary data that could help boost their malware distribution, analysts say.
job performance, or at least make them more
marketable should they get laid off. 2. Cyber criminals are quieter and
sneakier. While early hackers wanted
Of the 400 information technology pros who to make a big splash by attacking
participated in a recent survey conducted by as many computers as possible in
security vendor Cyber-Ark, 74% said they knew a show of genius and savvy, today’s
how to circumvent security to access sensitive criminals don’t want to be detected.
data, and 35% admitted to doing so without So their takeovers are done in a slow,
permission. Among the most commonly methodical fashion. These crooks know
targeted items: customer databases, email that if they can operate as stealthily as
controls, and CEO passwords. possible and take over systems in a
selective manner, they stand a better
Digital spy threat chance of not getting caught.
As the world’s engine room of research and
3. End users are now the primary targets.
development,the U.S.is vulnerable to espionage,
Large organizations were the main
especially in the technology-rich aerospace
target of attacks less than a decade
and military industries, telecommunications,
ago; now end users are the primary
cars, and pharmaceuticals.
targets, experts say. One bit of fallout
from this shift is the massive growth of
Corporate espionage costs the world’s 1,000
phishing websites, which lie in wait for
largest companies more than $45 billion each
consumers seeking fantastic bargains.
year according to PriceWaterhouseCoopers.
While all industries are vulnerable, firms in that analysts expect cyberspace to be the
the defense and high-tech sectors need to be new battleground in espionage wars for the
especially watchful. All told, U.S. businesses foreseeable future.
lose up to $250 billion in revenue as well as
750,000 jobs annually. Savvy cyber criminals
Internet criminals are increasingly operating
Researchers at the University of Toronto have like successful businesses, borrowing the
uncovered a computer spying operation they best strategies from legitimate companies
called GhostNet that was based primarily and collaborating in partnerships with each
in China and had stolen documents from other to profit from their illegal activities says
governments and private businesses around networking giant Cisco.
the world.
According to security analysts,more companies
In another worrisome sign, there have also are coming under attack from business-aware
been recent credible reports that cyber spies criminals who are creating spam around major
from China, Russia, and other countries have news events, such as swine flu, to gain access
penetrated the U.S. electrical grid with the aim to company systems or persuade victims to
of disrupting the system. visit malware-laden websites.
workers who are much more likely to ever more advanced ways to fight cyber crime
compromise corporate data. and remain vigilant across all attack vectors.
For businesses, experts say the defense The value of the laptop was arrived at by
strategy is clear: organizations need to adopt estimating the cost of the data, the loss of
So, in dollars, who’s at the biggest risk of losing n Hiring forensic experts.
data in a corporation? Not the chief executive,
the study found. Mid-level managers n Notifying consumers.
responsible for keeping the company up,
running, and moving ahead, and their n Setting up telephone hotlines to field
directors, would cost their companies $60,000 queries from customers.
or so in lost data and hardware costs. A CEO’s
lost laptop would cost just $28,449, the study n Offering free credit monitoring
found. subscriptions.
The experts who conducted the study said Other times, though, the breaches are
breaches truly do cost businesses customers; intentional, perpetrated by disgruntled
people really do care when organizations workers or contractors.
compromise their data.
Gaping security hole
The survey did not include the effect of a Every day, organizations deal with proprietary
breach on the company’s stock price, which in information containing everything from
some cases can be substantial. Recently when company trade secrets and marketing research
Heartland Payment Systems, the nation’s to Social Security numbers and addresses
sixth-largest credit and debit card processor, belonging to employees, customers, and
disclosed a breach that could affect millions of others.
customers, the company’s stock lost 42% of its
value. For the first time, insiders have overtaken
computer viruses as the most frequently
The study also didn’t measure the cost of reported type of security incident. The financial
intellectual property that is lost or stolen after implications stemming from the theft of
a data breach. At least 44 states have enacted proprietary information in the workplace are
laws that require companies that experience a startling, as the average hit to U.S. businesses
breach of personal information to notify those recently soared to about $350,000.
affected.
As long as security budgets
The accidental enemy
The potential for both accidental and focus on technology, the more
deliberate breaches of personal information worrisome threat – human
and intellectual property by workers is
a growing concern, security experts say.
beings – will continue to go
Sometimes, employees just get careless, or unaddressed.
perhaps they don’t know all they should about
their security-related responsibilities. What organizations need to understand
is that money spent on technology-based
Indeed, many experts say the top security security solutions has its limits; insiders,
challenge facing business is to plug these after all, by definition already have access
accidental breaches. The enemy, in such cases, to the network. As long as security budgets
is ignorance. For example, an employee in the focus on technology, the more worrisome
human resources department might email threat – human beings – will continue to go
a contractor a spreadsheet that appears to unaddressed.
contain only specific, unclassified material.
Analysts say they’ve seen hundreds of cases in
But if that employee is unfamiliar with the which a large organization devotes virtually its
spreadsheet program, he or she may miss the entire security budget to software and network
fact that the document includes another tab solutions – but doesn’t take such basic steps
that’s full of sensitive data on company workers. as issuing employee badges, training workers
Since 1985, NSI has been recognized as a leader in innovative and proven employee
security awareness training and awareness programs – providing an array of services for
both government and private sector. Our client list includes many of the top names in
corporate America as well as virtually every government agency involved in protecting
the nation’s secrets.
Copyright
This document is copyright © 2009 National Security Institute, all rights reserved.
This report may be freely distributed in Adobe PDF format PROVIDED that it remains intact
including this copyright notice. It must not be sold or incorporated into another product.
FREE! e-newsletter
exclusively for the corporate and government security professional.
Every week NSI’s Security NewsWatch brings news summaries and links to more
information on vital issues of concern to help security professionals stay one step ahead
of ever-changing threats. This weekly e-newsletter is provided to you free of charge
by the National Security Institute as a professional courtesy. To start your free service,
register at http://nsi.org/Newsletter.html.