Four questions every NED should be able to answer.

Four questions every NED should be able to answer.

Following my previous article on the ‘Challenges to NEDs in Financial Services’, it was suggested that a checklist of questions that a non executive might ask would be useful.

After giving this some thought, I started to put together a few simple questions around the risks of Cyber security, and quickly realised that without at least a base knowledge of the topic it would be difficult for the uninitiated to interpret a response.

While I have run large bank services and been responsible for managing their risks including cyber, I would be the first to admit that I am not a cyber expert. What follows is a very simplified view, but it should allow NEDs get a feel for the basics.

Attackers and Attacks

The terminology of cyber security it built up around the concepts of being under attack. Attacks have characteristics, methods, modes, patterns and signatures, which allow you identify the attack and defend against them. They occur across an attack surface, which is simply a term used to describe the potential points of entry into the organisation. 

Attackers come in many guises, they may be protest groups, professional criminals, governments or even just teenagers, known in the hacking community as script kiddies

Attacks can be active or passive. Passive being the term where an attacker is performing a recon to identify weaknesses and help plan a future attack.

Attack Types

The most common form of cyber fraud is probably still down to customers or employees providing fraudsters access, but for this piece I want to focus more on forced entry. In this space the Distributed Denial of Service (DDOS) attack is the most common method used to disrupt service or gain access to the organisations data.

A DDOS attack, as the name implies, is an attack originating from many locations whose purpose is to overwhelm the software and hardware of the organisations defences and gain entry.

This type of attack utilises software that has been distributed to the PC’s of unsuspecting internet users. These bots can then be grouped into botnets and used by a bot master to attack specific organisations. The scale of botnets can be staggering with tens of millions of devices being used simultaneously to overwhelm the systems defending the targeted entry points.

Typical Defences

Multiple lines of defence are normally put in place across the attack surface of the organisation with a buffer area being established to separate the points of entry from the organisations core system. These Demilitarised Zones (DMZs) are structured to physically separate the external networks and contain special hardware and software (Firewalls, Intrusion Detection Systems (IDS), Intrusion Protection Systems (IPS) etc.), whose sole purpose is to prevent unauthorised penetration into the organisations systems and data.

Even behind this primary defensive wall secondary monitoring needs to take identify unauthorised/suspicious activity which may indicate a potential incursion. In an effort to keep the article reasonably short I will not focus on this further monitoring, but it could include further IDS,IPS software on networks, packet sniffing etc. (There is plenty of good material on the internet if you want to investigate further)

Dealing with an Attack

As I have said, attacks can be active or passive. Active attacks such as a DDOS are primarily targeted at overwhelming the targeted service, so initial activity needs to be focussed at ensuring continuity of service for genuine customers. While bringing more processing capacity into play may deal with some attacks, the scale of botnets is such that action needs to be taken to quickly screen out and block the malicious traffic. There are now specialist providers, such as Verisign, who can perform this type of screening service. Essentially the company will redirect all traffic to these providers and receive back genuine customer traffic. The advantage of using these companies is that they hold libraries of know attack patterns and have the skills to quickly deal with new occurrences.

Passive attacks are much more difficult to identify as they are not designed to be service disrupting, the criminals are looking to test security measures and identify weaknesses to exploit in a future attack. They are attempting to do this without alerting the company and may leave very little trace of their activity. In many cases monitoring and alerting to suspicious activity is the only way to identify a breech, but as hackers often boast or sell information on weaknesses, intelligence gathering on the darkweb can often prove useful. Interestingly, another useful technique is to use a honey pot to tempt criminals, deliberately leaving a weakness, monitoring this for activity. If nothing else the hacker is then forced to deliberate whether the weakness is genuine or a trap.

The Questions

And so to the questions. I have tried to structure these to create a dialogue in key topic areas, the depth that you go to with executives will really depend on the response that you get and the subsequent questions you ask.

1. What measures do you have in place to identify you are under attack?

The reason for asking this question is to understand how proactive the organisation is in determining an attack is underway. Continuously screening traffic for attack patterns is expensive and potentially disruptive for genuine customers, and therefore being able to quickly identify an attack in order that counter measures can be initiated is key to keeping services running. In addition to monitoring performance internally, it is also useful to use social media monitoring to understand impacts from a customer perspective. This can sometimes give an earlier indication of issues.

As above passive attacks are much more difficult to identify, but with monitoring and effective intelligence the organisation can mount a defence and deter criminals.

2. What processes and procedures do you have in place to defend and ensure continuity of customer service?

No two organisations will be same. Their businesses and external connections will vary, but the concepts of segmented networks, DMZs, firewalls etc, are standard in architecture terms across the industry. Asking this question should be able to allow you to understand how your organisation has structured its specific defences.

Remember it is not just consumer internet interfaces that are at risk, corporate client dedicated interfaces, and even ATMs can present a potential point of entry. These should be considered on your attack surface.

3. What risks do we run if an attacker breaks through this defence ?

What you are trying to understand here is whether multiple lines of defence are in place. For example is equipment behind the Demilitarised zone (DMZ) secure, is internal messaging encrypted, is alerting and monitoring in place to identify intruders. Basically what damage could be done if defences are breached. 

It is not uncommon for less focus to be given to the security of internal networks on the basis they are behind the firewalls. While this may be a valid commercial decision it needs to be done consciously in line with the organisations risk appetite

4. What pro-active steps are you taking to prevent attacks ?

The purpose of this question is to understand if intelligence is being gathered directly, through government agencies, other banks, Dark web, about potential attacks, and if pro-active steps are being taken both defensively and in conjunction with law enforcement bodies to prevent attacks.

The above is only a brief dip into the world of cyber, but hopefully it provides enough of a flavour to be of use when discussing this topic with your executives. Good luck.


About the Author

Richard has an extensive career in technology and operations spending the last 30 years in Financial Services. Until recently he was responsible for the design and implementation of Banking Reform changes in one of the world's largest banking groups. He now runs a advisory and professional services company supporting Board and Executive level management. If you wish too discuss any of the above topics in more detail please contact Richard at [email protected].

___________________________________________________

Some Further Useful Cyber Terms and definitions

Attack method/mode

The manner or technique and means an adversary may use in an assault on information or an information system.

Attack pattern

Similar cyber events or behaviors that may indicate an attack has occurred or is occurring, resulting in a security violation or a potential security violation.

Attack signature

A characteristic or distinctive pattern that can be searched for or that can be used in matching to previously identified attacks.

Attack surface

The set of ways in which an adversary can enter a system and potentially cause damage.

Air Gap

To physically separate or isolate a system from other systems or networks (verb).

Easter egg

An unexpected ‘feature’ built into a computer program by the author. Can be added for fun or malicious intent.

Bot

A computer connected to the Internet that has been surreptitiously / secretly compromised with malicious logic to perform activities under remote the command and control of a remote administrator.

Bonet

A collection of otherwise unrelated PCs which have been infected by a virus and which are under the central control of criminals or hackers. Abbreviation for Robot Network.

Bot Master/Herder

The controller of a botnet that, from a remote location, provides direction to the compromised computers in the botnet.

Honey Pot

A security feature built into a network, designed to lure hackers into meaningless locations to avoid harm to genuine, crucial data.

Dark/Deep Web

The portion of World Wide Web content that is not indexed by standard search engine generally attributed to hacking and illegal cyber activities.

DMZ

(DeMilitarized Zone) A middle ground between an organization's trusted internal network and an untrusted, external network such as the Internet. 

Firewall

Hardware or software designed to prevent unauthorised access to a computer or network from another computer or network.

Moving Target Defence

The presentation of a dynamic attack surface, increasing an adversary's work factor necessary to probe, attack, or maintain presence in a cyber target.

Passive Attack

An actual assault perpetrated by an intentional threat source that attempts to learn or make use of information from a system, but does not attempt to alter the system, its resources, its data, or its operations.

Pharming

An exploit in which criminals disrupt the normal functioning of DNS software which translates internet domain names into addresses. The user enters a correct address but is redirected to a fake website.

Phishing

An attempt at identity theft in which criminals lead users to a counterfeit website in the hope that they will disclose private information such as user names or passwords.

Ransomware

Is a type of malware that holds your data hostage. It has been a problem with computers for many years, but it’s only recently started showing up on mobile devices. When you activate the program or app, it blocks you from accessing the data on the device and displays a message demanding payment by untraceable methods like Bitcoin or MoneyPak.

Rootkit

A set of software tools with administrator-level access privileges installed on an information system and designed to hide the presence of the tools, maintain the access privileges, and conceal the activities conducted by the tools.

Script Kiddies

Hackers who carry out their illicit activity for notoriety rather than criminal intent.

Spoofing

When an unauthorised person makes a message (typically an email) appear to come from a genuine sender by using either the genuine or a very similar address.

Spyware

Malware that secretly monitors a user's activity or scans for private information.

Trojan

Software posing as an authentic application, which actually conceals an item of malware. Term comes from Trojan Horse in Greek mythology.

Intrusion Detection System (IDS)

A system that interrogates information from systems and networks to determine if a security breach or security violation has occurred

Intrusion Protection System (IPS)

Intrusion detection system that also blocks unauthorised access when detected.

Keyboard Logger

A virus or physical device that logs keystrokes to secretly capture private information such as passwords or credit card details.

Marco Virus

Malware (ie malicious software) that uses the macro capabilities of common applications such as spreadsheets and word processors to infect data.

Malware

Software intended to infiltrate and damage or disable computers. Shortened form of malicious software.

Virus

Malware that is loaded onto a computer and then run without the user’s knowledge or knowledge of its full effects.

Virus signature

A virus’s 'fingerprint' which contains the characteristics of a virus or type of virus. Internet security software uses a database of signatures to detect viruses. 

Vishing

The practice of attempting to obtain personal or financial information via a telephone call in order to commit fraud or identity theft.

Worm

Malware that replicates itself so it can spread to infiltrate other computers.

Thanks Rumi we should have a catchup..I'll message you R

回复

Very well written, Richard !

回复

要查看或添加评论,请登录

Richard Dunlop的更多文章

  • 'to Qubit or not to Qubit ?'

    'to Qubit or not to Qubit ?'

    Given the significant investment being made by most of the major economies into Quantum technology, I thought it was…

  • The challenge to Non-Executive Directors in Financial Services

    The challenge to Non-Executive Directors in Financial Services

    The impact of the banking crisis Over the last ten years I have worked as an executive on the boards of a number of…

    4 条评论
  • Banking Reform - Can Banks now monetise their restructuring investment

    Banking Reform - Can Banks now monetise their restructuring investment

    Since 2008 banks have been spending tens of billions of dollars to structure their businesses and associated operations…

    2 条评论
  • Credit Crunch - 10th Aniversary

    Credit Crunch - 10th Aniversary

    I have read with interest the flood of articles and news items on the 10th anniversary of the credit crunch. What…

  • Don't you know who I am ?

    Don't you know who I am ?

    In a world beset by security concerns I sometime question whether we have lost sight of the impact of our defensive…

  • Are we all wasting our time at the gym ?

    Are we all wasting our time at the gym ?

    You might think that I am going to enlighten you all about some new miracle pill that promises fitness and well being…

    1 条评论
  • Can work be fun – employee engagement from a different direction?

    Can work be fun – employee engagement from a different direction?

    A great of time has been spent over the years analyzing firstly what employee engagement is and secondly what levers…

    3 条评论
  • Robotics or AI ?

    Robotics or AI ?

    Is it just me, or is the industry increasingly using the term Robotics to describe the use of AI to automate the…

  • Sometimes you need to PUSH to open doors

    Sometimes you need to PUSH to open doors

    A funny thing happened to me yesterday, I will relate the story as it may amuse some of you, but more seriously…

  • Follow the leader - 5 small things that make a great leader

    Follow the leader - 5 small things that make a great leader

    On top of the obvious leadership capabilities, for which you should go and buy a book, there are a few small things…

    1 条评论

社区洞察

其他会员也浏览了