Index

Acceptable use, 87

Access control, 87, 138, 142

failures, 48

Account monitoring and control, 135

Accountability controls, 143

Active system, 98

Adjust stage, 67

Administrative policies, 87

Administrative privileges, use of, 134

Adobe Acrobat portable document format (pdf), 37, 73

“Agile” development, 45

Alerting and invocation processes, 74

Amazon, 29

Antivirus software, 89, 91

Apple, 30

Application software security, 133

Argonite, 94

Ashley Madison, 38

Assets

information. See Information assets

management, 137

Asynchronous replication, 99

Atlanta’s Hartsfield-Jackson airport, 94

Audit

and accountability controls, 143

functions of, 121122

logs, maintenance, monitoring, and analysis of, 134

Authentication, 10

controls, 143

Authorized and unauthorized devices, inventory of, 131132

Authorized and unauthorized software, inventory of, 132

Availability, 910

Awareness and training controls, 143

Backup and restoral policy, 90

Big data, 36

Biometric methods, 10

Bitcoins, 55

Bluetooth, 92

Bot herders, 54

Botnets, 54

Boundary defense, 134

Briefing cards, 73

Bring Your Own Device, 92

British Airways (BA), 94

British Standards Institute, 4

BS 11200:2014, 160

BS ISO/IEC 27021:2017, 153

BS ISO/IEC 27033-6:2016, 154

Business cases, 2122

Business continuity

communication

dealing with media, 106108

information sharing, 104105

organization and closely linked parties, 105106

and cybersecurity, embedding

general awareness training, 123127

skills training, 127130

disaster recovery

data/information recovery, 9596

operating system and application recovery, 9697

platform disaster recovery, 9799

disruptive incidents, response to, 99100

escalation, 102

incident management process, 100101

management qualities required, 103104

recording events, 102103

reporting, 102

failure timescales, 7981

planning and preparation

continuity requirements analysis, 8486

policies and procedures, 8693

plans, 71, 75

solutions to cyber issues, 9395

timeline, 8183

immediately following the incident, 8384

prior to the disruptive incident, 83

Business Continuity Institute (BCI), 56

Business continuity management process, 84

and cybersecurity, 3

Good Practice Guidelines, 56

guidelines, 5

information security terminology

authentication, 10

availability, 910

confidentiality, 9

integrity, 9

nonrepudiation, 10

meaning of, 12

Plan-Do-Check-Act, 67

reasons for organizations practicing, 23

recommendations, 5

senior management buy-in, importance of, 3

specifications, 4

standards, 4

terminology

continuity requirements analysis, 9

maximum tolerable data loss, 8

maximum tolerable period of disruption, 7

Minimum Business Continuity Objective, 8

recovery point objective, 8

recovery time objective, 78

Business-critical information, 58

Business impact analysis, 84, 121, 128

Business-impacting cyber incidents, 42

Business resumption plans, 71, 76

Catastrophe, 81

Certification. See ISO/IEC 27001 certification; ISO 22301 certification

Chain of consequence, 1415

Change control policy, 89

Classification, 87

Cloud service, 41, 9091, 92

Cold standby platforms, 97

Commercial in confidence, 87

Communication

and consultation, 2021

business cases, 2122

dealing with media, 106108

information sharing, 104105

organization and closely linked parties, 105106

security, 139140

test

cost and time vs. complexity, 113, 114

description of, 111, 113

formatting of, 115116

frequency of, 113

participants in, 113

process to be tested, 112, 113

Communications-Electronics Security Group (CESG), 162

Complexity

communications test, 114

full exercise, 114

partial exercise, 114

simulation, 114

walk-through test, 113114

Compliance, 141142

Compromised system, 92

Confidentiality, 9

Configuration

data, 38

management controls, 143

Contact information, 76

Context establishment, 1314

Contingency planning controls, 144

Continuity requirements analysis, 9, 8486

Continuous vulnerability assessment and remediation, 132

Control access, 134135

Cooling systems, 94

Copyright violation, 30

Corporate communications/organization’s Press Office, 115

Corrective controls, 67

Corrective risk treatment, 20

Crises, 80

management, 100

Critical Security Controls Version 5.0, 6869

account monitoring and control, 135

administrative privileges, use of, 134

application software security, 133

audit logs, maintenance, monitoring, and analysis of, 134

authorized and unauthorized devices, inventory of, 131132

authorized and unauthorized software, inventory of, 132

boundary defense, 134

continuous vulnerability assessment and remediation, 132

control access, 134135

data protection, 135

data recovery capability, 133

hardware and software, secure configurations, 132

incident response and management, 135

malware defenses, 132

network devices, secure configurations for, 134

network ports, protocols, and services, limitation and control of, 134

penetration tests and “red team” exercises, 136

secure network engineering, 135

security skills assessment and training, 133

wireless access control, 133

Cryptography, 138

Cyber bullying. See Cyber harassment

Cyber harassment, 3132

Cyber incidents, 1

business-impacting, 42

Cyber issues, solutions to, 9395

Cyber surveillance, 33

Cyber threats, 5354

errors and failures, 57

hacking, 5758

loss of key information and IP and financial theft, 58

malware, 5455

misuse and abuse, 5657

social engineering, 5556

Cyber vulnerabilities, 4748

access control failures, 48

data stripping, 51

internet of things, 5153

operational management failures, 4950

people-related security failures, 5051

physical and environmental failures, 49

systems acquisition, development, and maintenance procedures, 4849

Cyber warfare, 3233

Cyberattacks. See also Cybercrime; Cyber threats; Cyber vulnerabilities

external, 17

internal, 17

Cybercrime, 25

copyright violation, 30

dark patterns, 31

defined, 26

Denial of Service and Distributed Denial of Service attacks, 29

exploitation, 28

financial theft, 2728

intellectual property theft, 2930

website defacement, 28

Cybersecurity, 2223, 2526

and business continuity, 3

benefits of, 123

general awareness training, 123127

skills training, 127130

Critical Security Controls Version 5.0. See Critical Security Controls Version 5.0

cyber harassment, 3132

cyber surveillance, 33

cyber warfare, 3233

cybercrime

copyright violation, 30

dark patterns, 31

defined, 26

Denial of Service and Distributed Denial of Service attacks, 29

exploitation, 28

financial theft, 2728

intellectual property theft, 2930

website defacement, 28

failures, 3334

ISO/IEC 27001 controls. See ISO/IEC 27001 controls, for critical security

NIST Special Publication 800-53 Revision 4. See NIST, Special Publication 800-53 Revision 4

Dark patterns, 31

Data

entry validation, 49

journey of, 3538

protection, 135

recovery, 9596, 133

stripping, 51

transfers, 80

Denial of Service (DoS) attack, 29

Detective controls, 65

Detective risk treatment, 19

Direct Attached Storage (DAS), 96

Directive controls, 67

Directive policies for acceptable use, 87

Directive risk treatment, 20

Disaster, 81

Disaster recovery (DR), 11

of business-critical systems, 49

data/information recovery, 9596

operating system and application recovery, 9697

platform disaster recovery, 9799

recovery plans, 71, 75

Disruptive incidents, response to, 99100

escalation, 102

incident management process, 100101

management qualities required, 103104

recording events, 102103

reporting, 102

Distributed Denial of Service (DDoS) attack, 29

eBay, 29

Electronic versions of plans, 72

Environmental failures, 49

Equifax, 2627

Errors and failure threats, 57

Escalation, 102

Event, 80

Exploitation, 28

External audit, 121

External IT systems, 85

External review, 120

Extrinsic vulnerabilities, 1516

Facial recognition, 10

Facilitator, 114

Failure timescales, of business continuity, 7981

Federal Information Processing (FIPS) standards, 150, 161

FedEx, 55

Financial impact, 4243

Financial loss projection, 43

Financial statements, 38

Financial theft, 2728, 58

Fingerprint authentication, 10

Fire detection and prevention measures, 94

First-time “offences,” warnings for, 44

Force majeure, 100

Forward planning, 115

Full exercise

cost and time vs. complexity, 113, 114

description of, 112, 113

formatting of, 115116

frequency of, 113

participants in, 113

process to be tested, 112113

Glitches, 80

Global Domestic Product, 25

Good Practice documents. See Good Practice Guidelines (GPG)

Good practice guidelines (GPG), 56, 149150

Communications-Electronics Security Group, 162

Information Security Forum, 162

National Institute of Standards and Technology, 161

United States Computer Emergency Readiness Team, 162

Guidelines, defined, 5

Hacking, 5758

Hardware and software, secure configurations, 132

High availability systems, 99

Hot standby/high availability platforms, 98

Hoy standby systems, 98

Human resource security, 137

Identification and authentication controls, 144

Impact Team, 38

Impacts, 1417

financial, 4243

legal and regulatory, 44

operational, 4445

reputational, 4344

on well-being of people, 4546

Incident, 80

Incident management plans, 7072, 7475

format of, 7273

generic plan contents, 74

Incident management process, 100101

Incident manager, appointing, 103104

Incident response

and management, 135

response controls, 144

Inergen, 94

Information and Communication Technology (ICT), 124

configuration information, 7677

experts, 115

Information and intellectual property, 3839

Information assets

cloud services, 41

information and intellectual property, 3839

journey of data, 3538

physical environment, 4041

processes, 3940

staff, 39

supply chain, 41

technology, 40

Information hierarchy, 36

Information lifecycle process, 37

Information recovery, 9596

Information security

aspects of business continuity management, 141

incident management, 141

organization of, 136137

policies, 136

terminology

authentication, 10

availability, 910

confidentiality, 9

integrity, 9

nonrepudiation, 10

Information Security Forum (ISF), 162

Information sharing, 104105

Information Technology (IT), 40

Information/cybersecurity staff, 115

Infosec Institute, 51

Insurance claim procedures, 119

Integrity, 9

Intellectual property (IP)

information and, 3839

theft, 2930, 58

Intelligent personal assistants (IPAs), 52

Internal audit, 121

Internal review, 119120

International Monetary Fund, 25

International Standards Organisation, 39

Internet, 81

Internet Engineering Task Force, 150

Internet of Things (IoT), 5153

Internet Service Providers, 81

Intrinsic vulnerabilities, 15

Invocation process, 101

ISO 22300:2014, 158

ISO 22301:2014, 159

ISO 22301 certification, 120

ISO 22313:2014, 159

ISO 22316:2017, 159

ISO 22318:2015, 159

ISO 22320:2011 Ed 1, 159

ISO 22322:2015, 159

ISO 22324:2015, 160

ISO 22325:2016, 159

ISO/IEC 17788:2014, 157

ISO/IEC 17789:2014, 157

ISO/IEC 24762:2008, 157, 159

ISO/IEC 27000:2017, 150

ISO/IEC 27001 certification, 120

ISO/IEC 27001 controls

access control, 138

asset management, 137

communications security, 139140

compliance, 141142

cryptography, 138

human resource security, 137

information security aspects of business continuity management, 141

information security incident management, 141

information security policies, 136

operations security, 139

organization of information security, 136137

physical and environmental security, 138139

supplier relationships, 140

system acquisition, development, and maintenance, 140

ISO/IEC 27001:2017, 150

ISO/IEC 27001/27002 controls, 6970

ISO/IEC 27002:2017, 150

ISO/IEC 27003:2017, 150

ISO/IEC 27004:2016, 151

ISO/IEC 27005:2011, 151

ISO/IEC 27006:2015, 151

ISO/IEC 27007:2017, 151

ISO/IEC 27008:2011, 151

ISO/IEC 27009:2016, 151

ISO/IEC 27010:2015, 151

ISO/IEC 27011:2016, 152

ISO/IEC 27013:2015, 152

ISO/IEC 27014:2013, 152

ISO/IEC 27015:2012, 152

ISO/IEC 27016:2014, 152

ISO/IEC 27017:2015, 152

ISO/IEC 27018:2014, 153

ISO/IEC 27019:2017, 153

ISO/IEC 27031:2011, 153, 159

ISO/IEC 27032:2012, 153

ISO/IEC 27033–1:2015, 153

ISO/IEC 27033–2:2012, 154

ISO/IEC 27033–3:2010, 154

ISO/IEC 27033–4:2014, 154

ISO/IEC 27033–5:2013, 154

ISO/IEC 27034-5:2017, 155

ISO/IEC 27034-6:2016, 155

ISO/IEC 27034–1:2011, 154

ISO/IEC 27034–2:2015, 154

ISO/IEC 27035-1:2016, 155

ISO/IEC 27035-2:2016, 155

ISO/IEC 27035:2011, 155

ISO/IEC 27036–1:2014, 155

ISO/IEC 27036–2:2014, 155

ISO/IEC 27036–3:2013, 155

ISO/IEC 27037:2016, 156

ISO/IEC 27038:2016, 156

ISO/IEC 27039:2015, 156

ISO/IEC 27040:2016, 156

ISO/IEC 27041:2016, 156

ISO/IEC 27042:2016, 157

ISO/IEC 27043:2016, 157

ISO/IEC 27050-3:2017, 157

ISO/IEC 29100:2011, 158

ISO/IEC 29101:2013, 158

ISO/IEC 29190:2015, 158

ISO/IEC 30111:2013, 158

ISO/IEC29147:2014, 158

K.I.S. principle, 103

Led Zeppelin, 30

Legal and regulatory impact, 44

“Light-touch” audit, 117

Likelihood, 16, 1718

Lockheed-Martin, 30, 33

Loss of key information, 58

Maintenance

controls, 144

of plans, 118119

Malware, 5455, 89

defenses, 132

protection up-to-date, failure to keep, 50

Maximum tolerable data loss (MTDL), 8, 81

Maximum tolerable period of disruption (MTPD), 7, 83

Media, 100

dealing with, 106108

protection controls, 145

Meltdown and Spectre, 34

Minimum business continuity objective (MBCO), 8, 83

Misuse and abuse threats, 5657

MTPoD. See Maximum tolerable period of disruption (MTPD)

National Institute of Standards and Technology (NIST), 88

Draft Cyber Security guides, 160161

good practice guidelines, 161

SP 800-53 Revision 4, 70, 71

access control, 142

audit and accountability, 143

awareness and training, 143

configuration management, 143

contingency planning, 144

identification and authentication, 144

incident response, 144

maintenance, 144

media protection, 145

personnel security, 145

physical and environmental protection, 145

planning, 145

program management, 147

risk assessment, 146

security assessment and authorization, 143

system and communications protection, 146147

system and information integrity, 147

system and services acquisition, 146

National Technical Authority for Information Assurance, 162

Network Attached Storage (NAS), 96

Network devices, secure configurations for, 134

Network ports, protocols, and services, limitation and control of, 134

Networks, of organization, 9495

Nonrepudiation, 10

NotPetya, 55

Observers, 115

Operating system and application recovery, 9697

Operational controls, for risk, 6768. See also specific controls

Operational impact, 4445

Operational management failures, 4950

Operations security, 139

Organization-approved training courses, 129

Paper-based documentation, 72

Partial exercise

cost and time vs. complexity, 113, 114

description of, 112, 113

formatting of, 115116

frequency of, 113

participants in, 113

process to be tested, 112, 113

PAS 77:2006, 160

Passcode, for authentication, 10

Passwords

for authentication, 10

length of, 88

policies, 89

recommendations on, 88

“Patch gap”, 91

Patent infringement, 30

PD 25111:2010, 160

PD 25666:2010, 160

PD ISO/TS 22317:2015, 159

Penetration tests and “red team” exercises, 136

People-related security failures, 5051

Personal information, 38

Personnel security controls, 145

Petya struck, 55

Phishing attacks, 56

Physical and environmental protection controls, 145

Physical and environmental security, 138139

Physical controls, 6768

Physical environment, as information asset, 4041

Physical measures, 20

Physical security, 94

defects, 49

Plan-Do-Check-Act, 67

Planning and preparation

continuity requirements analysis, 8486

policies and procedures, 8693

Planning controls, 145

Plans

incident management. See Incident management plans

maintenance of, 118119

review of, 119121

testing and exercising

benefits to organization of, 109110

conditions for, 110

format for, 115118

people involved in, 113, 114115

reasons for, 109

requirements for, 109

types of, 111113

Platform disaster recovery, 9799

Policies and procedures, 8693

Power, 93

Preventative controls, 65

Preventative risk treatment, 20

Prevention, 61. See also Strategic options; Tactical, and operational solutions

cost of, 3

fire detection and, 94

Probability, 16

Procedural controls, 67

Procedural measures, 20

Processes, as information asset, 3940

Program management controls, 147

“Quick wins”, 86

Ransomware, 5455

Recommendations, defined, 5

Recording Events, 102103

Recovery point objective (RPO), 8, 81

Recovery time objective (RTO), 78, 81

Redundant Array of Inexpensive Disks (RAID), 96

Regulatory impact, 44

Remote access, 91

Removable media, 8990

Reporting, 102

Reputational impact, 4344

Requests For Comment, and the International Telecommunications Union standards, 150

“Residual” risk, 19

Review of plans, 119121

Risk

accept/tolerating, 19, 64

analysis, 17

appetite, 14

assessment, 1419, 146

avoid/terminating, 1819

environment, general view of, 1213

evaluation, 18

identification, 14

management process

business cases, 2122

communication and consultation, 2021

context establishment, 1314

defined, 11

monitoring and review, 2223

used in, 11

matrix, 1718

meaning of, 1213

reduce/modifying, 19, 64

share/transferring, 19, 62, 64

treatment, 1920, 64

Robust network monitoring, failure to ensure, 50

Rootkits, 54

Scraping technique, 51

Secure network engineering, 135

Security assessment and authorization controls, 143

Security awareness training

benefits of, 123125

methods to deliver, 125126

outcome of, 126127

Security requirements, 41

Security skills assessment and training, 133

Segregation of duties, 90

Senior management buy-in, importance of, 3

Shaky web interface, 52

Shared network drives, 90

Simulation exercise

cost and time vs. complexity, 113, 114

description of, 111112, 113

formatting of, 115116

frequency of, 113

participants in, 113

process to be tested, 112, 113

Singapore Standards Council, 4

Skills training, 127130

methods of, 129130

requirement of, 127128

Social engineering, 5556

Software, updating, 4849, 91

Solid State Drives (SSDs), 92

Spam, 56

Specifications, defined, 4

Spirit, 30

Spoofing attacks, 56

Spyware, 54

Staff, as information asset, 39

Standard “office” software applications, 73

Standards, 149

business continuity, 158161

defined, 4

ISO/IEC 27000 series standards, 150157

relevant ISO standards, 157158

“Standby” system, 98

Storage Area Networks (SANs), 91, 96

“Storyboard” technique, 125

Strategic options, 6265

Strategic risk management process, 63

Subject matter experts, 115

Supplier relationships, 140

Supply chain, as information asset, 41

Symmetric warfare, 32

Synchronous replication, 99

System acquisition, development, and maintenance, 140

System and communications protection controls, 146147

System and information integrity controls, 147

System and services acquisition controls, 146

Systems acquisition, development, and maintenance procedures, 4849

Tactical, and operational solutions

operational controls, 6768

tactical controls, 6567

Tactical controls, for risk, 6567. See also specific controls

Team members, roles and responsibilities of, 74

Technical controls, 68

Technical measures, 20

Technology, as information asset, 40

Termination of access permissions, 89

Testing and exercising plans, 109

benefits to organization of, 109110

conditions for, 110

format for, 115118

people involved in, 113, 114115

reasons for, 109

requirements for, 109

test and exercise, distinction between, 110

types of, 111113

“The full story”, 107

Third-party relations, 45

Threats, 14

assessments, 59

cyber. See Cyber threats

Timeline, business continuity, 8183

immediately following incident, 8384

prior to disruptive incident, 83

Transmission Control Protocol (TCP), 80

Uber, 28

Uninterruptible power source (UPS), 9394

United Nations, 25

United States Computer Emergency Readiness Team (US-CERT), 162

User Datagram Protocol (UDP), 80

User password management, 48

Users’ access rights, 48

Violation of copyright, 30

Viruses, 89

Vulnerabilities, 1516

assessments, 59

cyber. See Cyber vulnerabilities

Walk-through test

cost and time vs. complexity, 113114

description of, 111, 113

formatting of, 115116

frequency of, 113

participants in, 113

process to be tested, 112, 113

WannaCry virus, 55

Warfare, 32

Warm standby systems, 98

Web-based survey tool, 125

Website defacement, 28

Well-being of people, impacts on, 4546

Wireless access control, 133

Wireless networking and mobile devices, 9192

World Bank, 25

“Zero-day” vulnerabilities, 91