Resilience and Cyber Security of Technology in the Built Environment

Size: px
Start display at page:

Download "Resilience and Cyber Security of Technology in the Built Environment"

Transcription

1 IET Standards Technical Briefing Resilience and Cyber Security of Technology in the Built Environment

2 Resilience and Cyber Security of Technology in the Built Environment

3 Author: Hugh Boyes CEng FIET CISSP The IET would like to acknowledge the help and support of CPNI in producing this document. Published by The Institution of Engineering and Technology, London, United Kingdom The Institution of Engineering and Technology is registered as a Charity in England & Wales (no ) and Scotland (no. SC038698) First published 2013 This publication is copyright under the Berne Convention and the Universal Copyright Convention. All rights reserved. Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may be reproduced, stored or transmitted, in any form or by any means, only with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms of licences issued by the Copyright Licensing Agency. Enquiries concerning reproduction outside those terms should be sent to the publisher at this address: The Institution of Engineering and Technology Michael Faraday House Six Hills Way, Stevenage Herts, SG1 2AY, United Kingdom While the publisher, author and contributors believe that the information and guidance given in this work is correct, all parties must rely upon their own skill and judgement when making use of it. Neither the publisher, nor the author, nor any contributors assume any liability to anyone for any loss or damage caused by any error or omission in the work, whether such error or omission is the result of negligence or any other cause. Any and all such liability is disclaimed. The moral rights of the author to be identified as author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act A list of organisations represented on this committee can be obtained on request to IET standards. This publication does not purport to include all the necessary provisions of a contract. Users are responsible for its correct application. Compliance with the contents of this document cannot confer immunity from legal obligations. It is the constant aim of the IET to improve the quality of our products and services. We should be grateful if anyone finding an inaccuracy or ambiguity while using this document would inform the IET standards development team at IETStandardsStaff@theiet.org or The IET, Six Hills Way, Stevenage SG1 2AY, UK. ISBN (paperback) ISBN (PDF)

4 Contents Participants in the Technical Committee 4 1 Introduction 5 2 Background 7 3 Overview of resilience and cyber security 13 4 Understanding the threat landscape 18 5 Resilience and cyber security during specification phase 23 6 Resilience and cyber security during design phase 27 7 Resilience and cyber security during construction 31 8 Resilience and cyber security during operations 35 9 Managing change impact on resilience and cyber security Resilience and cyber security during decommissioning Relevant standards 44 Appendix A Intelligent building case studies 47 Appendix B Twenty critical controls 52 Appendix C Glossary 55

5 Participants in the Technical Committee The IET and author wish to acknowledge the support received from representatives of the following organisations in reviewing the drafts of this document. Arup Centre for the Protection of National Infrastructure (CPNI) Corporate IT Forum Defence Science and Technology Laboratory (dstl) ECA Group Ltd General Dynamics UK Ltd Incoming Thought Ltd Newrisk Ltd Symantec Transport for London

6 CHAPTER 1 Introduction Creation of intelligent or smart buildings requires greater integration of systems, both the operational and business systems used by the buildings occupants and a wide range of infrastructure systems. This is typically being achieved through the convergence of the technical infrastructure and the widespread use of readily available commercial and open source technologies. Although the initial focus of the designers of intelligent or smart buildings has been on developing solutions to make them more energy-efficient, there is an increasing focus on the interaction of systems. The drivers for intelligent buildings and thus systems integration arise from the need for new energy-efficient interventions, real-time decision support systems, enhanced building and personnel security, and better management information dashboards that offer easy access to key performance indicators. The purpose of this technical briefing is to inform professionals involved in the development and operation of intelligent or smart buildings about the resilience and cyber security issues that arise from a convergence of the technical infrastructure and computer-based systems as those systems become interconnected with the global network that comprises cyberspace. This document is not intended to address the physical hardening of buildings to protect against specific physical threats such as earthquakes, weather or blast. The document examines different sources of threats across the building life cycle from initial concept through to decommissioning. It considers potential threat agents that could cause or contribute to a cyber security incident and identifies some of the measures that may be appropriate to reduce the risks. The key points that we highlight in this document are as follows: Economic and environmental factors place increasing pressure on building owners and operators to adopt a converged (i.e. common or shared) IT infrastructure and to achieve integration between multiple electronic systems supporting building management functions and business applications. Given that systems integration blurs the boundaries between traditional roles and responsibilities in any organisation, it is important to adapt the business practices and governance processes to work effectively across organisational boundaries. In view of the significant level of systems convergence in intelligent buildings and the consequent higher probability of systems failure, the design of the built environment should take resilience into account. Sharing of IT infrastructure and the integration of corporate IT and industrial control systems (ICS), including building systems, in an intelligent building poses a number of design and operational challenges if a safe, secure and resilient environment is to be achieved. Thus whenever upgrades or new investment are planned, a strategic review of new or upgraded threats should inform the requirements and design brief. 5

7 From a resilience perspective the greatest threat to the building is likely to come from single points of failure, which may be the building fabric or structure, utilities, infrastructure, systems or processes. When considering the potential threats to a building, the assessment should take into account non-malicious acts, malicious acts (from employees, contractors, visitors and, in open access buildings, from the public) and the potential effects of natural causes. A serious challenge with some incidents, particularly those that are cyber security-related, may be identifying the cause of an incident. The task is particularly difficult where there is a lack of logs or system logging and audit. During the requirements, concept and specification phase of a building project, the resilience and cyber security requirements need to be identified, taking into account the nature and purpose of the construction and the potential threats to the occupants and their business operations. These requirements should include appropriate protection for intellectual property, and commercial or sensitive information. During the design phase of a building project, appropriate solutions to the resilience and cyber security requirements should be developed. As part of a design assurance exercise, the proposed design should be assessed to ensure that it has not introduced any new or unforeseen risks. Assuring the continuity of intent through the construction phase may require investment in competent resources. During construction of the building, resilience and cyber security issues need to be addressed while managing the supply chain, monitoring design integrity, maintaining physical security and implementing systems security. Once the building is in operational use, its resilience should be proactively managed to prevent any unforeseen or emergent loss of resilience and to identify any additional requirements arising from changes in the building s use. The building s IT systems are at risk from the outset. Application of the 20 critical controls 1 (see Appendix B) can provide protection by detecting reconnaissance, preventing unauthorised access or actions, detecting unauthorised access or actions and mitigating cyber security events. When changes to the building, its infrastructure, systems and use are being planned and implemented, the impact on resilience and cyber security should be assessed and appropriate steps taken to address any new or modified risks. This should include assessment of the impact of any decommissioning. 1 Developed, coordinated and published by the SANS Institute: [accessed 24 Apr 2013] 6

8 CHAPTER 2 Background 2.1 Technology developments in the built environment Economic and environmental pressures are increasingly affecting the design and operation of the built environment. In a competitive global economy, economic pressures relate to the total cost of ownership, both in terms of capital investment throughout the building s life cycle and operating costs. These operating costs are not just the costs of facilities management and building maintenance, but also the users operational costs that are influenced by the built environment. A building that is operationally inefficient will inevitably have an economic impact on its occupants. Environmental pressures include the need to reduce energy consumption through increased energy efficiency and to reduce waste. To address these pressures a range of innovative IT-enabled solutions are being developed, as summarised in Figure 1. Smart Cities Figure 1 Intelligent buildings are part of an increasingly integrated built environment Smart Grid Intelligent Buildings Smart Homes Intelligent Transport A key theme in these solutions is the increased IT-based interaction between physical assets with supporting communications, energy and transport infrastructures. Examples of this integration would include an intelligent building interacting with the smart grid to manage energy demand and ensure the most economic use of supply tariffs. In future it could include interaction with urban transport systems to inform building users of the current local transport situation. This integration affects both the operational and business systems used by the buildings occupants and a wide range of infrastructure systems that maintain a comfortable, safe and secure environment. Historically this integration has been difficult due to the proprietary nature of many building systems. However, the increasing adoption of open standards and commercial off the shelf products to 7

9 build these systems, for example TCP/IP networking and the use of commercial operating systems, has made the integration much easier. Unfortunately the use of these technologies can create significant issues from a resilience and security perspective. For example, some software products have remote access links inbuilt, connecting them to their suppliers for upgrade and maintenance support by default, and the increasing use of browser-based control interfaces has encouraged some manufacturers to require Internet access to their systems for condition monitoring and diagnostic purposes. If these remote connections are not adequately protected and managed, they create vulnerabilities and adversely affect system security and resilience. The greatest economic and environmental benefits are likely to be derived from deployment of new automation and control systems that take information from business systems and data from sensor networks and building systems, to automate routine functions, maintain an optimum environment and achieve improved performance. In an office environment an example of intelligent building technologies could be the management of meeting rooms. If a building management system has access to meeting room booking information, it could be configured to reduce energy use by turning off non-essential equipment in the room and limiting environmental conditioning until the room is required and the first occupants arrive. This would require interaction between building systems and the room-booking service, which may be part of the organisation s or operational systems. In a factory environment, similar integration might be used to control the heating and lighting of operational areas based on shift patterns, operational demand and the presence of the workforce in a particular area. Provided that these features work reliably they can offer significant user benefits, but chaos can result when there are system failures or unwanted/unauthorised human intervention. Therefore, the more complex the technology and the greater the reliance on its fault-free operation, the greater the need will be for integrity, availability and confidentiality from a safety, security and reputational perspective. Any IT system is potentially at risk, regardless of whether it is standalone or part of an integrated system. The increased systems integration required to deliver an intelligent building is therefore not without risk even when carefully managed and monitored. We need to recognise that intelligent buildings are complex systems. This document outlines the key factors that need to be addressed to identify and manage the resilience and cyber security factors, and risks to an intelligent building. 2.2 What is an intelligent building? The precise definition of an intelligent building varies around the world. Although there is no agreed definition, there is a common theme the integration of technologies. For the purpose of this document we define an intelligent building as one that provides a responsive, effective and supportive environment within which an organisation can achieve its business objectives. Intelligent buildings may also be referred to as smart buildings. Some of the systems that may be integrated in an intelligent building are illustrated in Table 1. The fact that a building contains some of the listed systems does not 8

10 make it an intelligent building: it is the systems integration to achieve operational efficiencies, energy efficiency, additional functionality or other user benefits that delivers the intelligent element. An issue that potentially increases the operational complexity of managing an intelligent building is the organisational and often contractual boundaries between those responsible for the different elements of infrastructure, building, ICT and business systems. A key principle for an intelligent building is that it needs to be designed and operated so that it provides a safe, secure and resilient environment, and to the extent that is practical, it needs to include a degree of future-proofing. Infrastructure Sensors, Structured cabling, IP network, Wireless*, Plant rooms, Data rooms, Server rooms, Communications rooms, etc. Building systems (ICS) ICT systems Business systems Building management HVAC controls Access control Lighting control Intruder alarm Security/CCTV Fire alarm Water management Waste management Utilities Stand-by generators UPS Office automation ( , data, Internet) Media/multi-media (voice, video, music) Telephony (voice, fax, video conferencing, SMS, pagers) IP-based applications Enterprise resource planning (ERP) Material requirements planning (MRP) Customer relationship management (CRM) Integrated commandand-control centre Integrated service/ helpdesks Table 1 Systems that may be integrated in an intelligent building * The term wireless is used as a generic term to cover communications and data links that do not require a physical connection; technologies employed include WiFi, Bluetooth, ZigBee, radio, NFC, RFID ICS Industrial Control Systems Only included to the extent that they are integrated with building systems, for example CRM Access Control, ERP/MRP Supply Chain Management Relevant where they interact with building systems or sensors, for example RFID for tracking location of material or assets An innovative aspect of systems integration is the increasing use of sensors within intelligent buildings. This can range from passive infrared motion detectors, to the CCTV motion detection and the use of radio frequency identification (RFID) technologies. By allowing sensors that are usually applied to a single sub-system to be used by other systems, the building can be made more intelligent: for example, the use of RFID tokens to control access to the building or building zones, to provide access to the corporate network and to retrieve documents on communal printers. Another example is the use of building security sensors and CCTV motion detection to operate and control lighting (both internal and external) and in conjunction with environmental monitoring systems to manage heating, shutters, etc. Appendix A to this document contains some intelligent building case studies, which provide examples of the types of systems integration already occurring and the operational benefits achieved. Currently the intelligence is predominantly automation of routine tasks, based on the sharing of information or data, e.g. energy efficiency measures applied to unoccupied rooms. 9

11 As technology develops it is likely that significant gains will occur when the converged systems become self-aware, with network-based tools learning over time and responding accordingly. For an intelligent building this could represent the development of a self-preservation response, with the systems developing an awareness of relationships between events. An example might be that rather than relying on signature-based analysis to detect malware, attacks or system failures, the intelligent building responds to deviations from system and network behavioural norms, seeking to minimise disruption and alerting an operator to the need for an intervention. With this increased integration and interaction there will be a need to avoid the creation of single points of failure. Economic and environmental factors place increasing pressure on building owners and operators to adopt a converged (i.e. common or shared) IT infrastructure and to achieve integration between multiple electronic systems supporting building management functions and business applications. 2.3 How does this integration affect building operations? There are three fundamental issues that need to be considered in respect of the operation of an intelligent building: the organisational responsibilities for integrated technical infrastructure; the differences in the nature of corporate IT and building systems (ICS); the processes, practices and governance, including legal and regulatory compliance, required to operate and maintain the intelligent building in a safe, secure and resilient fashion. In multi-occupancy buildings there will also be the issue of maintaining the privacy of the occupiers, and where appropriate, their information and data, their staff, visitors or customers. If there is no integration or interconnection between corporate IT and building systems (ICS), the responsibility for these systems will lie with IT management and facilities or operations management respectively. Integration and interconnection creates a shared responsibility across two often culturally and technically different teams, because a malware incident on a corporate computer could have a significant impact across the entire intelligent building, affecting all the systems. At a generic level, the differences between the building systems (ICS) and corporate IT systems (ICT and business systems) are shown in Table 2. These differences are significant and inevitably lead to differing operational practices. For an intelligent building, the criticality of a system needs to be assessed in terms of business impact on resilience, physical security and personal safety. A failure to recognise these differences and system-criticality assessments, or to take account of them in the design, delivery and operation phases of an intelligent building, will significantly affect resilience and increase cyber security risks. Where some features are at the very least safety or security critical, they must be adequately protected from unauthorised intervention or access from the rest of the system while being part of it. 10

12 2 Characteristic Corporate IT systems Building systems (ICS) Lifetime 3 5 years 5 20 years Availability Out-of-hours outages often acceptable Continuous operation typically required for control systems Time-critical Delays often acceptable May be safety-critical Patching Frequent, can be daily Rare User accounts Usually individual users with permissions according to business role Often shared functional accounts, based on specific roles, e.g. operator, administrator, engineer Outsourcing Widely used Varies, rare for production systems Antivirus Widely used Difficult/impossible to deploy Security skills Limited to good Often poor or non-existent Security awareness General awareness Often poor or non-existent Security testing Widely used Rarely used and risk of damage to control systems Physical security Generally secure and manned Generally remote/ unmanned Table 2 Comparison of corporate IT systems and building systems (ICS) 2 An example of the difference between systems is the practice of allowing users to access removable media (CDs, DVDs, USB drives) from their desktop or laptop computers, which may be acceptable on the corporate IT system, where antivirus and anti-malware is installed, but is best avoided on the building management network where not all computers can be protected in this way. The practices for dealing with a compromise may also differ significantly. The New York Times, 3 for example, simply replaced all compromised computers on its corporate network when faced with a serious threat. Removing a virus or malware from a building management system may be significantly more complex, however, given that some electronic sensors or components will be embedded in many different major components and sub-systems. The problem may be further exacerbated by the potential age of the systems and the need to maintain building operations. Historically, industrial control systems (ICS), including the subset that comprise building systems, and corporate IT systems have been managed by operations (including estates) teams and IT teams respectively, with different operational processes, practices and governance. The combination of these organisational 2 Adapted from Table 5.1 in Protecting Industrial Control Systems from Electronic Threats, Joseph Weiss, 2010, [accessed 24 Apr 2013] 11

13 boundaries coupled with systems integration and/or interconnection can introduce significant operational complexity and risk into intelligent buildings. Given that systems integration blurs the boundaries between traditional roles and responsibilities in any organisation, it is important to adapt the business practices and governance processes to work effectively across organisational boundaries. 12

14 CHAPTER 3 Overview of resilience and cyber security 3.1 What does resilience mean and why is it an issue? Resilience is the ability to adapt and respond rapidly to disruptions and maintain continuity of business operations. From a business perspective, resilience is generally about preparing for any potential threat to the delivery of a smooth, steady and reliable service so as to maintain the delivery of critical services. Thus when bad things happen, as they do, the personnel operating the building are expected to minimise disruption to the use of the building. To achieve this goal they should have considered potential causes of disruption, both human and natural, make sure that key systems and processes are maintained to ensure business continuity, and have in place systems and processes to enable timely detection of, and response to, disruptive events. The concepts of business continuity and disaster recovery are reasonably well understood by organisations in respect of their corporate IT systems and the management of manufacturing or production processes. To ensure the resilience of business operations, the organisation might employ a range of provisions, including: alternate/disaster recovery premises; offsite backups of business-critical data; diverse network and communication routes, etc. This is particularly the case for organisations that are heavily dependent on technology and IT for their business operations. From a resilience perspective, the threat to business-critical corporate IT systems is generally mitigated and managed through disaster recovery, incident response and business continuity plans. The nature of these plans and the specific measures required to maintain business operations should be determined by the nature of the business, regulatory and legal requirements, and a business impact analysis. Where there is a critical business need to maintain continuity of IT operations, the solution may be to increase redundancy, such as through the provision of duplicate IT systems in geographically separate high-availability data centres. The resilience of systems, whether they are IT or building systems (for example HVAC), is generally considered in terms of redundancy and their availability under both fault and maintenance conditions. Table 3 illustrates a classification mechanism used for data centres and industrial plants. A building or plant classified as Tier 1 will have minimal resilience, with single points of failure in critical systems. This type of accommodation is likely to be used by organisations that can tolerate some loss of IT or building systems. In contrast, a building or plant classified as Tier 4 will have a high degree of fault tolerance and might be used by an organisation delivering critical national infrastructure services. A Tier 4 site should be able to accommodate varying levels of scheduled maintenance and systems failure without losing capacity. 13

15 4 Tier Description Performance 1 Basic infrastructure Non-redundant capacity components and single non-redundant connection/ distribution paths 2 Redundant capacity components infrastructure 3 Concurrently maintainable infrastructure Redundant capacity components and single non-redundant connection/ distribution paths Redundant capacity components and multiple distribution paths 4 Fault-tolerant infrastructure Fault-tolerant architecture with redundant capacity systems and multiple distribution paths In the built environment, the need for building systems to be resilient will generally be determined by the operational use of the accommodation. Thus for example data centres and acute health care facilities will have requirements for the continuity of critical building services, whereas a retail outlet or warehouse may only require the provision of emergency lighting to allow safe evacuation of the premises. Table 3 Tier classifications for site infrastructure performance 4 In an intelligent building, resilience and cyber security are inextricably linked, because the failure of a building system could have a significant impact on the cyber security of the building. In view of the significant level of systems convergence in intelligent buildings and the consequent higher probability of systems failure, the design of the built environment should take resilience into account. 3.2 What does cyber security mean? Cyber security is a broad subject it is not just about the technology, but has to address a wide range of factors: people, process and governance issues, and their interrelationships. These factors are management issues and are as important in cyber security as the deployment of technical solutions such as firewalls and antivirus software. One internationally agreed definition for cyber security is the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance and technologies that can be used to protect the cyber environment and organization and user s assets. 5 The aim is that they remain under the control of legitimate users. 4 Adapted from Site Infrastructure White Paper Tier classifications define site infrastructure performance, W. Pitt Turner IV, John N. Seader and Kenneth G. Brill, 2008, The Uptime Institute; available from Define%20Site%20Infrastructure.pdf [accessed 24 Apr 2013] 5 From ITU-T X.1205: aspx [accessed 24 Apr 2013] 14

16 This definition refers to a couple of terms that perhaps need clarifying: the cyber environment (also sometimes called cyberspace ) effectively comprises the interconnected networks of electronic, computer-based and wireless systems; the organization and user s assets includes connected computing devices, personnel, infrastructure, applications, services, telecommunication systems, and the totality of transmitted, processed and/or stored data and information in the cyber environment. The cyber environment therefore encompasses the Internet, telecommunication networks, computer systems, embedded processors and controllers, and a wide range of sensors, storage and control devices. Although this definition of cyber environment only makes reference to systems, it also includes the information, services, social and business functions that exist only in cyberspace. Experience shows that even standalone systems and isolated networks are at risk from attacks by malicious users and from the introduction of malicious software via removable media. Cyber security strives to ensure the attainment and maintenance of the security objectives of the organisation and user s assets against relevant security risks in the cyber environment. The general security objectives comprise the following: Confidentiality, including the control and authorisation of access to information or data, for example to protect personally identifiable information, intellectual property and commercially sensitive data such as financial transactions, energy-metering data and production records. Integrity, which may include the trustworthy and safe operation of electronic and computer-based systems, their software and associated business processes, the assurance and authenticity of data or information, and the validity and retention of transactions including their authentication and nonrepudiation. Availability of the building in general, and in particular the systems and processes required for its safe, secure and reliable operation. The availability needs to take into account the impact of failure on the system of systems arising from the failure of a single system, i.e. is there a cascading or domino effect. Privacy, as, although this is often treated as part of the confidentiality objective, the convergence of systems creates additional risks. It is important that personal data remains private and that in any system where there is an aggregation of data, that personal data is given appropriate protection as required by regulation and/or legislation. An example of this aggregation in a transport terminal is the aggregation of data relating to individual travellers as passenger data. 3.3 Why is cyber security an issue? For both safety and security reasons it is important that an intelligent building meets the general security objectives of its owners, operators and occupiers, thus maintaining the required level of confidentiality, integrity and availability. From legal and regulatory perspectives (e.g. under EU and UK data protection and privacy legislation) there are also requirements to protect personal data. The interconnection and integration of systems from the three categories (i.e. building, ICT and business 15

17 systems) creates additional risks. Without careful planning, testing and monitoring, the more technology that is added to a building, the more the Law of Unintended Consequences 6 may apply to the system of systems. From a cyber security perspective it is important that the intelligent building is designed and operated so as to minimise and manage the risks to confidentiality, integrity and availability. The nature of potential threats to intelligent building systems will vary widely and will in part depend on the nature of the building and its occupants or users. Threats to systems include deliberate attacks, unintentional disruption and natural factors. A key difference between the cyber security of corporate IT systems and buildings systems (ICS) is the focus of protective measures, as illustrated in Figure 2. In part this arises from the differences between the systems that were outlined in Table 2, but it is also influenced by the differing operational priorities. Corporate IT systems Building systems (ICS) Figure 2 Risks arising from compromised systems Financial integrity Denial of service Loss of information Loss of view Loss of control Financial and reputational risk Impact on systems Safety and operational risk In protecting corporate IT systems the emphasis is typically on the prevention of data loss and the threats to the financial integrity of the business, for example loss of intellectual property or customer data, fraudulent transactions and the continuity of business operations. The focus of technical solutions is therefore generally on the protection and control of information, with solutions deployed to address known attack vectors, for example network security, access control, advanced persistent threat (APT) detection and prevention and encryption. In building systems (ICS), prevention of loss of control (i.e. the ability to control the process and physical assets) or loss of view (i.e. the ability of an operator or manager to see what is actually happening in the process or systems) are the primary requirements. Prevention of information or data loss is potentially accorded a much lower priority for these systems. The reason for this difference in emphasis is that the loss of control or view can lead to significant safety and operational risks: the former could lead to death or serious injury and physical damage to equipment; the latter may ultimately have financial or reputational consequences. Therefore system availability and integrity are generally afforded the greatest protection, with for example mechanisms such as verification of message integrity and the authentication of devices being given a higher priority than encryption of data. 6 [accessed 24 Apr 2013] 16

18 Solutions that afford protection to a corporate IT system may not be an appropriate or optimum solution for building systems (ICS). Thus in an intelligent building, infrastructure convergence and systems integration may impose technical and operational constraints on the protective measures employed. Sharing of IT infrastructure and the integration of corporate IT and industrial control systems (ICS), including building systems, in an intelligent building poses a number of design and operational challenges if a safe, secure and resilient environment is to be achieved. Thus whenever upgrades or new investment are planned, a strategic review of new or upgraded threats should inform the requirements and design brief. 17

19 CHAPTER 4 Understanding the threat landscape 4.1 Who or what might cause an incident? This section examines different sources of threats in terms of who (or what) might cause an incident. It considers the potential threat agents, which can be individual(s) whose actions or inactions will cause or potentially cause a cyber security incident, or natural factors. For those threat agents with a malicious intent, it then considers the nature of the groups to which the threat agents may belong, because this may influence the potential severity and sophistication of the threat. From a resilience perspective the greatest threat to the building is likely to come from single points of failure, which may be the building fabric or structure, utilities, infrastructure, systems or processes Potential threat agents The potential threat agents that initiate a cyber security incident are as follows: Malicious outsiders: This is a person or persons unconnected with the building owner, the building occupier or supporting contractors; in essence, a person who does not have privileged access to the building or its systems. A malicious outsider could be a hacker, a cyber criminal, activist, terrorist or state-supported attacker in all cases the intent is to cause harm or disruption. The attack may be targeted at the intelligent building and/or its occupants or be indiscriminate, for example malware or viruses. Malicious insiders: This is a person (or persons) connected with the building owner, the building occupier or supporting contractors; in essence a person who has some level of authorised or privileged access to the building or its systems and puts that privileged access to a use not intended or allowed. Non-malicious insiders: This is a person (or persons) connected with the building owner, the building occupier or supporting contractors, who through error, omission, ignorance or negligence causes a cyber security incident. Nature: This could be solar, weather, animal or insect related and result in a failure or significant impairment of one or more of the utility supplies or building systems, with a knock-on effect on systems that enable the correct operation of the intelligent building. When considering the potential threats to a building the assessment should take into account non-malicious acts, malicious acts (from employees, contractors, visitors and, in open access buildings, from the public) and the potential effects of natural causes. 18

20 4.1.2 Potential threat agent groups Malicious threat agents will belong to one of the following groups, which are listed in order of increasing sophistication and capacity to cause damage and disruption: Sole activists: This could be a disaffected employee or an activist in an organised group who decides to take his or her own action. The severity and sophistication of the threat will be determined by the individual s capabilities. Unfortunately, the ready availability of hacking and denial-ofservice tools on the Internet (and in some cases distributed with technical magazines) means that the level of technical understanding required to launch an attack has been significantly reduced. Activist groups: The recent activities of some groups demonstrate that when a team of determined activists work together the threat increases, e.g. when they have persuaded naïve third parties to allow installation of software on their computers, thus magnifying the effect of distributed denial of service (DDoS) attacks. Competitors: These groups are likely to work through third parties, with the aim of harming a rival by stealing intellectual property or disrupting operations to cause financial or reputational loss. Organised crime: These groups are well organised and motivated by financial gain, through fraud, theft of intellectual property, attacks on e-commerce and banking systems, and blackmail or extortion. The sophistication of the malware used by these groups is increasing and there is evidence that they operate on a commercial basis, making their tools available to third parties. Terrorist: These groups have demonstrated that they are increasingly IT aware, making use of the Internet to distribute propaganda and for communications purposes. Well-funded groups could take advantage of the services offered by organised crime, seek support from a nation state or encourage internal members to adopt these attack methods. Again these groups could rely on the various toolkits available for download. Proxy terror threat agent with nation state support: In effect, this is statesponsored terrorism, where the proxy party is used to provide deniability. This type of group effectively has the capacity and sophisticated technical support available to a nation state made available by the sponsoring nation. Nation states: It is alleged that some nation states are actively involved in cyber attacks on a wide range of organisations to acquire state secrets or sensitive commercial information and intellectual property. During periods of heightened international tension and conflict, these activities may include more widespread attacks as evidenced by malware such as Stuxnet, Duqu and Flame. 4.2 What harm might an incident cause? Depending on the nature of the incident, where it occurs during the building life cycle and whether it is deliberate (the motivation of the threat agents), the building owner, operator, occupants and user may suffer significant inconvenience or losses. It is important that the losses below are not considered in isolation and there may be significant interdependencies. Commercial losses: These could be consequential losses due to the building being uninhabitable or inoperable, or they could arise from loss of commercial opportunities, e.g. due to commercial espionage during a tender exercise. 19

Intelligent. Buildings: Understanding and managing the security risks

Intelligent. Buildings: Understanding and managing the security risks Version 2 IET Sector Insights Intelligent Buildings: Understanding and managing the security risks More efficient and cost-effective use of the built environment is increasingly being driven by economic

More information

Building Information Modelling (BIM): Addressing the Cyber Security Issues

Building Information Modelling (BIM): Addressing the Cyber Security Issues IET Cyber Security Consortium report Building Information Modelling (BIM): Addressing the Cyber Security Issues Building Information Modelling (BIM) is going to transform the way that the architecture,

More information

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY DATA LABEL: PUBLIC INFORMATION SECURITY POLICY CONTENTS 1. INTRODUCTION... 3 2. MAIN OBJECTIVES... 3 3. LEGISLATION... 4 4. SCOPE... 4 5. STANDARDS... 4

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

INFORMATION TECHNOLOGY SECURITY STANDARDS

INFORMATION TECHNOLOGY SECURITY STANDARDS INFORMATION TECHNOLOGY SECURITY STANDARDS Version 2.0 December 2013 Table of Contents 1 OVERVIEW 3 2 SCOPE 4 3 STRUCTURE 5 4 ASSET MANAGEMENT 6 5 HUMAN RESOURCES SECURITY 7 6 PHYSICAL AND ENVIRONMENTAL

More information

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to

More information

ISO27001 Controls and Objectives

ISO27001 Controls and Objectives Introduction This reference document for the University of Birmingham lists the control objectives, specific controls and background information, as given in Annex A to ISO/IEC 27001:2005. As such, the

More information

ISO 27001 Controls and Objectives

ISO 27001 Controls and Objectives ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements

More information

Nine Steps to Smart Security for Small Businesses

Nine Steps to Smart Security for Small Businesses Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction Policy: Title: Status: 1. Introduction ISP-S12 Network Management Policy Revised Information Security Policy Documentation STRATEGIC POLICY 1.1. This information security policy document covers management,

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security Contents Why you need to know about cyber security... 3 Understanding the risks to your business... 4 How you can manage the risks... 5 Planning

More information

Mitigating and managing cyber risk: ten issues to consider

Mitigating and managing cyber risk: ten issues to consider Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed

More information

University of Sunderland Business Assurance Information Security Policy

University of Sunderland Business Assurance Information Security Policy University of Sunderland Business Assurance Information Security Policy Document Classification: Public Policy Reference Central Register Policy Reference Faculty / Service IG 003 Policy Owner Assistant

More information

A risky business. Why you can t afford to gamble on the resilience of business-critical infrastructure

A risky business. Why you can t afford to gamble on the resilience of business-critical infrastructure A risky business Why you can t afford to gamble on the resilience of business-critical infrastructure Banking on a computer system that never fails? Recent failures in the retail banking system show how

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES POINT OF VIEW CYBERSECURITY IN FINANCIAL SERVICES Financial services institutions are globally challenged to keep pace with changing and covert cybersecurity threats while relying on traditional response

More information

Protecting Organizations from Cyber Attack

Protecting Organizations from Cyber Attack Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 cliff.glantz@pnnl.gov guy.landine@pnnl.gov 1 Key Topics

More information

A GOOD PRACTICE GUIDE FOR EMPLOYERS

A GOOD PRACTICE GUIDE FOR EMPLOYERS MITIGATING SECURITY RISK IN THE NATIONAL INFRASTRUCTURE SUPPLY CHAIN A GOOD PRACTICE GUIDE FOR EMPLOYERS April 2015 Disclaimer: Reference to any specific commercial product, process or service by trade

More information

SPEAR PHISHING UNDERSTANDING THE THREAT

SPEAR PHISHING UNDERSTANDING THE THREAT SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

How To Cover A Data Breach In The European Market

How To Cover A Data Breach In The European Market SECURITY, CYBER AND NETWORK INSURANCE SECURING YOUR FUTURE Businesses today rely heavily on computer networks. Using computers, and logging on to public and private networks has become second nature to

More information

Managing internet security

Managing internet security Managing internet security GOOD PRACTICE GUIDE Contents About internet security 2 What are the key components of an internet system? 3 Assessing internet security 4 Internet security check list 5 Further

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control Requirements Cyber Security For Suppliers Categorised as High Cyber Risk Cyber Security Requirement Description Why this is important 1. Asset Protection and System Configuration

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Managing IT Security with Penetration Testing

Managing IT Security with Penetration Testing Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to

More information

A practical guide to IT security

A practical guide to IT security Data protection A practical guide to IT security Ideal for the small business The Data Protection Act states that appropriate technical and organisational measures shall be taken against unauthorised or

More information

Data Protection Act 1998. Guidance on the use of cloud computing

Data Protection Act 1998. Guidance on the use of cloud computing Data Protection Act 1998 Guidance on the use of cloud computing Contents Overview... 2 Introduction... 2 What is cloud computing?... 3 Definitions... 3 Deployment models... 4 Service models... 5 Layered

More information

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8. micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) Revision 8.0 August, 2013 1 Table of Contents Overview /Standards: I. Information Security Policy/Standards Preface...5 I.1 Purpose....5

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority

Internal Audit Progress Report Performance and Overview Committee (19 th August 2015) Cheshire Fire Authority Internal Audit Progress Report (19 th August 2015) Contents 1. Introduction 2. Key Messages for Committee Attention 3. Work in progress Appendix A: Risk Classification and Assurance Levels Appendix B:

More information

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone:

CyberEdge. Desired Coverages. Application Form. Covers Required. Financial Information. Company or Trading Name: Address: Post Code: Telephone: Company or Trading Name: Address: Post Code: Telephone: E-mail: Website: Date Business Established Number of Employees Do you have a Chief Privacy Officer (or Chief Information Officer) who is assigned

More information

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard The Impact of Wireless LAN Technology on to the PCI Data Security Standard 339 N. Bernardo Avenue, Suite 200 Mountain View, CA 94043 www.airtightnetworks.net Wireless LANs and PCI Retailers today use computers

More information

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device Ten Tips for Managing Risks on Convergent Networks The Risk Management Group April 2012 Sponsored by: Lavastorm Analytics is a global business performance analytics company that enables companies to analyze,

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

Risk Assessment Guide

Risk Assessment Guide KirkpatrickPrice Assessment Guide Designed Exclusively for PRISM International Members KirkpatrickPrice. innovation. integrity. delivered. KirkpatrickPrice Assessment Guide 2 Document Purpose The Assessment

More information

ASX SETTLEMENT OPERATING RULES Guidance Note 10

ASX SETTLEMENT OPERATING RULES Guidance Note 10 BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they

More information

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2

Head of Information & Communications Technology Responsible work team: ICT Security. Key point summary... 2 Policy Procedure Information security policy Policy number: 442 Old instruction number: MAN:F005:a1 Issue date: 24 August 2006 Reviewed as current: 11 July 2014 Owner: Head of Information & Communications

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

National Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them

National Corporate Practice. Cyber risks explained what they are, what they could cost and how to protect against them National Corporate Practice Cyber risks explained what they are, what they could cost and how to protect against them what this briefing covers ff Introduction ff Section 1: What are the risks and the

More information

Cyber and Data Security. Proposal form

Cyber and Data Security. Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which

More information

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3

Operational Risk Publication Date: May 2015. 1. Operational Risk... 3 OPERATIONAL RISK Contents 1. Operational Risk... 3 1.1 Legislation... 3 1.2 Guidance... 3 1.3 Risk management process... 4 1.4 Risk register... 7 1.5 EBA Guidelines on the Security of Internet Payments...

More information

Security & Privacy Current cover and Risk Management Services

Security & Privacy Current cover and Risk Management Services Security & Privacy Current cover and Risk Management Services Introduction Technological advancement has enabled greater working flexibility and increased methods of communications. However, new technology

More information

Cybercrime: risks, penalties and prevention

Cybercrime: risks, penalties and prevention Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,

More information

AUSTRACLEAR REGULATIONS Guidance Note 10

AUSTRACLEAR REGULATIONS Guidance Note 10 BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they

More information

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction

LEEDS BECKETT UNIVERSITY. Information Security Policy. 1.0 Introduction LEEDS BECKETT UNIVERSITY Information Security Policy 1.0 Introduction 1.1 Information in all of its forms is crucial to the effective functioning and good governance of our University. We are committed

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

A 360 degree approach to security

A 360 degree approach to security June 2012, issue 1-1 SCADA communications A 360 degree approach to security Contents 1. The need for 360 degree security 2 2. Considerations in a 360 degree approach 3 3. Implementing a 360 degree approach

More information

Cyber Security Strategy

Cyber Security Strategy NEW ZEALAND S Cyber Security Strategy 2015 A secure, resilient and prosperous online New Zealand Ministerial Foreword The internet and technology have become a fundamental element in our lives. We use

More information

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c

INFORMATION SECURITY MANAGEMENT SYSTEM. Version 1c INFORMATION SECURITY MANAGEMENT SYSTEM Version 1c Revised April 2011 CONTENTS Introduction... 5 1 Security Policy... 7 1.1 Information Security Policy... 7 1.2 Scope 2 Security Organisation... 8 2.1 Information

More information

Stay ahead of insiderthreats with predictive,intelligent security

Stay ahead of insiderthreats with predictive,intelligent security Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz sarah.cucuz@spyders.ca IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10

ASX CLEAR (FUTURES) OPERATING RULES Guidance Note 10 BUSINESS CONTINUITY AND DISASTER RECOVERY The purpose of this Guidance Note The main points it covers To assist participants to understand the disaster recovery and business continuity arrangements they

More information

Newcastle University Information Security Procedures Version 3

Newcastle University Information Security Procedures Version 3 Newcastle University Information Security Procedures Version 3 A Information Security Procedures 2 B Business Continuity 3 C Compliance 4 D Outsourcing and Third Party Access 5 E Personnel 6 F Operations

More information

Music Recording Studio Security Program Security Assessment Version 1.1

Music Recording Studio Security Program Security Assessment Version 1.1 Music Recording Studio Security Program Security Assessment Version 1.1 DOCUMENTATION, RISK MANAGEMENT AND COMPLIANCE PERSONNEL AND RESOURCES ASSET MANAGEMENT PHYSICAL SECURITY IT SECURITY TRAINING AND

More information

How To Protect Your Data From Being Hacked

How To Protect Your Data From Being Hacked Data Security and the Cloud TABLE OF CONTENTS DATA SECURITY AND THE CLOUD EXECUTIVE SUMMARY PAGE 3 CHAPTER 1 CHAPTER 2 CHAPTER 3 CHAPTER 4 CHAPTER 5 PAGE 4 PAGE 5 PAGE 6 PAGE 8 PAGE 9 DATA SECURITY: HOW

More information

Data Access Request Service

Data Access Request Service Data Access Request Service Guidance Notes on Security Version: 4.0 Date: 01/04/2015 1 Copyright 2014, Health and Social Care Information Centre. Introduction This security guidance is for organisations

More information

The evolution of data connectivity

The evolution of data connectivity Leveraging the Benefits of IP and the Cloud in the Security Sector The CCTV and alarm industry has relied on analogue or Integrated Services Digital Network (ISDN) communications to provide data connectivity

More information

Beyond the Hype: Advanced Persistent Threats

Beyond the Hype: Advanced Persistent Threats Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,

More information

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS MARCH 2011 Acknowledgements This Viewpoint is based upon the Recommended Practice: Configuring and Managing Remote Access

More information

ICT Security. High-Quality Information and Know How Protection. Design and implementation of security. Covering almost all of ICT security

ICT Security. High-Quality Information and Know How Protection. Design and implementation of security. Covering almost all of ICT security ICT High-Quality Information and Know How Protection Design and implementation of security solutions optimised to meet the client s needs Implementing state-of-the-art hardware and software security products

More information

University of Aberdeen Information Security Policy

University of Aberdeen Information Security Policy University of Aberdeen Information Security Policy Contents Introduction to Information Security... 1 How can information be protected?... 1 1. Information Security Policy... 3 Subsidiary Policy details:...

More information

Cyber Security Issues - Brief Business Report

Cyber Security Issues - Brief Business Report Cyber Security: Are You Prepared? This briefing provides a high-level overview of the cyber security issues that businesses should be aware of. You should talk to a lawyer and an IT specialist for a complete

More information

PORTABLE DATA STORAGE SECURITY INFORMATION FOR CIOs/CSOs Best Before November 2011 1

PORTABLE DATA STORAGE SECURITY INFORMATION FOR CIOs/CSOs Best Before November 2011 1 Executive Summary PORTABLE DATA STORAGE SECURITY INFORMATION FOR CIOs/CSOs Best Before November 2011 1 In today s business environment, managing and controlling access to data is critical to business viability

More information

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO E MARITIME SAFETY COMMITTEE 95th session Agenda item 4 MSC 95/4/1 5 March 2015 Original: ENGLISH MEASURES TO ENHANCE MARITIME SECURITY Industry guidelines on cyber security on board ships Submitted by

More information

Protection of Computer Data and Software

Protection of Computer Data and Software April 2011 Country of Origin: United Kingdom Protection of Computer Data and Software Introduction... 1 Responsibilities...2 User Control... 2 Storage of Data and Software... 3 Printed Data... 4 Personal

More information

White Paper An Enterprise Security Program and Architecture to Support Business Drivers

White Paper An Enterprise Security Program and Architecture to Support Business Drivers White Paper An Enterprise Security Program and Architecture to Support Business Drivers seccuris.com (866) 644-8442 Contents Introduction... 3 Information Assurance... 4 Sherwood Applied Business Security

More information

The Ministry of Information & Communication Technology MICT

The Ministry of Information & Communication Technology MICT The Ministry of Information & Communication Technology MICT Document Reference: ISGSN2012-10-01-Ver 1.0 Published Date: March 2014 1 P a g e Table of Contents Table of Contents... 2 Definitions... 3 1.

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for White Paper What the ideal cloud-based web security service should provide A White Paper by Bloor Research Author : Fran Howarth Publish date : February 2010 The components required of an effective web

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

Technical Standards for Information Security Measures for the Central Government Computer Systems

Technical Standards for Information Security Measures for the Central Government Computer Systems Technical Standards for Information Security Measures for the Central Government Computer Systems April 21, 2011 Established by the Information Security Policy Council Table of Contents Chapter 2.1 General...

More information

Malware isn t The only Threat on Your Endpoints

Malware isn t The only Threat on Your Endpoints Malware isn t The only Threat on Your Endpoints Key Themes The cyber-threat landscape has Overview Cybersecurity has gained a much higher profile over the changed, and so have the past few years, thanks

More information

GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER

GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER GETTING PHYSICAL WITH NETWORK SECURITY WHITE PAPER Molex Premise Networks EXECUTIVE SUMMARY This article discusses IT security, which is a well documented and widely discussed issue. However, despite the

More information

developing your potential Cyber Security Training

developing your potential Cyber Security Training developing your potential Cyber Security Training The benefits of cyber security awareness The cost of a single cyber security incident can easily reach six-figure sums and any damage or loss to a company

More information

National Cyber Security Policy -2013

National Cyber Security Policy -2013 National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information

More information

INFORMATION SECURITY PROCEDURES

INFORMATION SECURITY PROCEDURES INFORMATION AN INFORMATION SECURITY PROCEURES Parent Policy Title Information Security Policy Associated ocuments Use of Computer Facilities Statute 2009 Risk Management Policy Risk Management Procedures

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Section A: Introduction, Definitions and Principles of Infrastructure Resilience

Section A: Introduction, Definitions and Principles of Infrastructure Resilience Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose

More information

Ohio Supercomputer Center

Ohio Supercomputer Center Ohio Supercomputer Center IT Business Continuity Planning No: Effective: OSC-13 06/02/2009 Issued By: Kevin Wohlever Director of Supercomputer Operations Published By: Ohio Supercomputer Center Original

More information

Data Management Policies. Sage ERP Online

Data Management Policies. Sage ERP Online Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...

More information

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

MEMORANDUM. Date: October 28, 2013. Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance MEMORANDUM Date: October 28, 2013 To: Federally Regulated Financial Institutions Subject: Guidance The increasing frequency and sophistication of recent cyber-attacks has resulted in an elevated risk profile

More information

White Paper. Information Security -- Network Assessment

White Paper. Information Security -- Network Assessment Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

Central and Eastern European Data Theft Survey 2012

Central and Eastern European Data Theft Survey 2012 FORENSIC Central and Eastern European Data Theft Survey 2012 kpmg.com/cee KPMG in Central and Eastern Europe Ever had the feeling that your competitors seem to be in the know about your strategic plans

More information

IIABSC 2015 - Spring Conference

IIABSC 2015 - Spring Conference IIABSC 2015 - Spring Conference Cyber Security With enough time, anyone can be hacked. There is no solution that will completely protect you from hackers. March 11, 2015 Chris Joye, Security + 1 2 Cyber

More information

How To Audit Health And Care Professions Council Security Arrangements

How To Audit Health And Care Professions Council Security Arrangements Audit Committee 28 Internal audit report ICT Security Executive summary and recommendations Introduction Mazars has undertaken a review of ICT Security controls, in accordance with the internal audit plan

More information

DATA SECURITY POLICY. Data Security Policy

DATA SECURITY POLICY. Data Security Policy Data Security Policy Contents 1. Introduction 3 2. Purpose 4 3. Data Protection 4 4. Customer Authentication 4 5. Physical Security 5 6. Access Control 6 7. Network Security 6 8. Software Security 7 9.

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Are you prepared to be next? Invensys Cyber Security

Are you prepared to be next? Invensys Cyber Security Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber

More information

Introduction. Industry Changes

Introduction. Industry Changes Introduction The Electronic Safety and Security Design Reference Manual (ESSDRM) is designed to educate and inform professionals in the safety and security arena. The ESSDRM discusses trends and expertise

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

Cloud Security Speak Glossary

Cloud Security Speak Glossary Glossary Cloud computing is demonstrating its potential to transform the way IT-based services are delivered to organisations. It can and will create substantial business benefits through reduced capital

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information