Unit-4 PPT
Unit-4 PPT
D R . V IKR A M
DHIMAN
C S E D E PT T
What Cyber-security
Challenges do
Organizations Face
Maintaining a pulse on new and emerging global cybersecurity threats
Speed and complexity of digital transformation
Utilizing the latest cybersecurity solutions
Lack of skilled cybersecurity professionals
Solutions not customized to the types of risks we face
Lack of integrated cybersecurity solutions
Lack of ability to share threat intelligence cross-functionally (XDR)
Cybersecurity attacks
XDR
Extended detection and response or XDR is a new approach
to threat detection and response that provides holistic
protection against cyberattacks, unauthorized access, and
misuse.
XDR
The digital landscape has witnessed an exponential surge in cyberthreats, prompting
cybersecurity professionals to continually innovate their defensive strategies.
One of the most notable innovations to emerge in recent years is extended detection and
response (XDR).
Evolving from its predecessor, endpoint detection and response (EDR), XDR represents a
paradigm shift in cybersecurity by providing a holistic and integrated approach to threat
detection, response, and mitigation.
frameworks cover various approaches to
handling security challenges
Sample Questions.
Continue..
1. While there is no definitive answer to this question, there are many well-known and widely
used frameworks for cybersecurity. These include MITRE ATT&CK, HIPAA, the NIST
Cybersecurity Framework, ISO 27001, and CIS Controls. Given a business's specific
circumstances, one framework or a combination of frameworks may be most appropriate.
2. The National Institute of Standards and Technology (NIST) Cybersecurity Framework is a set
of best practices and standards designed to help organizations manage their cybersecurity
risk. ISO 27001 is an international standard developed by the International Organization for
Standardization (ISO), which provides best practices and requirements for information
security management systems. While both frameworks have similar goals, they differ in their
specific approach to cybersecurity.
Continue..
3. The Center for Internet Security (CIS) Controls are a set of cybersecurity best practices developed
by the nonprofit organization CIS. The framework is designed to provide organizations with
comprehensive cybersecurity measures for protecting their data and networks.
On the other hand, NIST offers a set of standards and best practices for managing cybersecurity
risk. These frameworks seek to achieve similar goals, but differ in terms of implementation.
CIS Controls provides specific steps for protecting an organization's systems, while NIST offers a
more generalized set of guidelines and principles.
4. Choosing the right cybersecurity framework can take time, as there is no one-size-fits-all
solution. It is essential to consider your organization's or client's specific needs and determine
which framework best meets them.
One important distinction
is that there are other cybersecurity frameworks that are not codified in
law but rather are created and/or enforced by non-governmental entities.
For example, the NIST or ISO 27001 cybersecurity frameworks are both
widely used standards in many industries and government organizations.
The growth in Information Technology and E-commerce sector in the United States has given rise
to cyber crimes, causing a huge loss to the US government and its people.
Data breaches have gained more attention due to the impact of digitization on financial,
healthcare, SMEs, and other industries. Even though data breaches occurred way before
digitization took the world by storm, the popularity of digital platforms gave a new dimension to
these breaches as the importance, volume, and cost of the data breaches have increased
considerably.
Data breaches in the U.S.
The number of data breaches in the U.S. increased from 157
million in 2005 to 781 million in 2015, while the number of
exposed records jumped from around 67 million to 169
million during the same time frame.
Here are some of its sections that empower Internet users and
attempt to safeguard the cyberspace.
Section 65 – Tampering with computer Source Documents. ...
Section 66 - Using password of another person.
Section 66D - Cheating Using computer resource. ...
Section 66E - Publishing private Images of Others.
Are there any
laws about cyber-
security? In India
INFORMATION TECHNOLOGY ACT, 2000
The Federal Bureau of Investigation (FBI) plays a key role in protecting the United States
from cyber threats and investigating cybercrime. The FBI is responsible for investigating a
wide range of cybercrimes, including hacking, online fraud, identity theft, and the
distribution of child pornography.
One of the main responsibilities of the FBI is to investigate cybercrime and bring criminals
to justice. The FBI has several specialized units that focus on cybercrime, such as the Cyber
Division, which investigates cybercrime and espionage. The FBI also works closely with other
federal, state, and local law enforcement agencies to share information and coordinate
investigations.
The FBI also plays an important role in protecting the United States from cyber threats by
providing threat intelligence and warnings to organizations and individuals. The FBI also
improves organizations’ cybersecurity posture by providing training and technical assistance.
What are the two primary
federal cyber-security
regulations?
The primary law governing cybersecurity in the United States is the
Federal Trade Commission Act (FTCA). This law prohibits deceptive
acts and practices in business, including those related to data
security.
The SOC 1 report focuses on controls ranging from password complexity to authorization
restrictions.
It also undertakes a few tests to identify vulnerabilities. It offers assurances concerning
access to information or databases to restricted and authorized personnel.
A SOC 1 report consists of five parts, as
explained below:
Opinion Letter – This section includes the report’s scope, the date of the report for Type 1 attestation,
the test period for Type 2 attestation, and the opinion of the auditors.
Management’s Assertion – This is where the management’s statements are mentioned about the
system’s description, control objectives, and the criteria used to make the assertions.
Description of the System – This includes all your policies, processes, and operations that form your
services and affect financial reporting.
Description of Tests of Control & Result of Testing – This section is for the auditors to list the controls
they have tested, the test procedure, and the results.
Other Information – Auditors use this section to mention any essential information not covered in
other areas of the report.
What is SOC 2?
Security:
Safeguard data and systems against unauthorized access or any form of tampering activities
Availability:
Seamless availability of data and systems for business operations
Processing Integrity:
Accurate processing of data by authorized personnel in a timely manner
Confidentiality:
Appropriate guardrails and authentication mechanisms must be put in place for confidential data
Privacy:
Procedure to efficiently use, retain, and terminate personal information of any personnel
The General Data Protection Regulation (GDPR) International Cyber-security Laws
DR. VIKRAM
DHIMAN
G I TA M
Purpose of GDPR
The General Data Protection Regulation (GDPR) is a robust privacy and security law that has
global implications. Let’s delve into its purpose and significance:
2. Simplifying Regulations: It supersedes the previous Data Protection Directive and simplifies
terminology, making it easier for international businesses to comply.
3. Coordinating EU Legal Landscape: By replacing the 1995 directive, the GDPR establishes a single
framework for personal data protection across all EU Member States.
What are the three main
goals of the GDPR?
The objectives of the GDPR are:
◦ In 1995, the EU introduced the European Data Protection Directive, setting minimum data privacy and
security standards.
◦ As technology evolved, the GDPR emerged to address modern challenges, including breaches and increased
reliance on cloud services.
It aims to improve consumer protection and general levels of privacy for individuals, includes
mandatory reporting of data protection breaches and has an increased emphasis on gaining
explicit consent to process information.
Data Protection Bill
The UK will also replace its current Data Protection Act (1998)
in the next few months, incorporating the GDPR
requirements. The Data Protection Bill is currently going
through the relevant parliamentary processes (it has gone
through the House of Lords and is currently in the House of
Commons on its 2nd reading).
The advice from the Information Commissioner’s Office is
that many of the GDPR’s main concepts and principles are
much the same as those in the current Act, and therefore if
we are complying properly with the current law then most of
our approach to compliance will remain valid under the GDPR
and the new Bill, and will give us a starting point to build
from.
However, there are new elements and significant
enhancements, so we will have to do some things for the first
time and some things differently.
The GDPR - new and changed concepts
from the Data Protection Act 1998
• Breach notification
All staff, students, research subjects, alumni, members of the public etc.
where we hold their data – “identified”
Also includes, for example, pseudo anonymous individuals where the
University also holds the additional information to identify them - “identifiable”
Legitimate Grounds for Processing Personal Data
Necessary for the performance of a contract with the data subject, or to take steps to prepare for a contract
The University needs to enter into an employment contract with you to pay you in accordance with your contract, to
ensure you are subject to it’s policies, regulations and rules and to administer your pension entitlements. These processes
will involve the processing of your personal and special categories data.
Necessary to protect the vital interests of a data subject or another person where the data subject is incapable of giving
consent
This condition is very tightly drafted, and can only be relied upon when there is no other available grounds for processing
the data, e.g. for medical emergencies. A ground for processing necessary for humanitarian purposes as well (e.g. disaster
responses).
Necessary for the performance of a task carried out in the public interest or as a consequence of an official authority
vested in the institution (“the public task”)
Only where the task is laid out in UK or EU law to which the University is subject.
• ‘in the exercise of official authority’. This covers public functions and powers that are set out in law;
or
• to perform a specific task in the public interest that is set out in law.
We don’t need a specific statutory power to process personal data, but our underlying task, function or power must have
a clear basis in law; The processing must be necessary. If we could reasonably perform our tasks or exercise our powers in
a less intrusive way, this lawful basis does not apply.
Universities are likely to be classified as public authorities, so the public task basis is likely to apply to much of our
processing, depending on the detail of our constitution and legal powers.
For example, we might rely on public task for processing student personal data for teaching and research purposes; but
we may need to rely on a mixture of legitimate interests and consent for alumni relations and fundraising purposes.
The university needs to consider its basis carefully – we have to document our decision to help demonstrate compliance
if required. We should be able to specify the relevant task, function or power, and identify its statutory or common law
basis.
What is a legitimate interest basis for the
University?
The legitimate interest basis for processing would be most appropriate where the University is using individuals’ data in
ways they would reasonably expect and which have a minimal privacy impact, or where there is a compelling justification
for the processing. For example in relation to members of staff the University would rely on the fact that it had legitimate
interest in processing personal data before, during and after the end of the employment relationship to:
Explicit Consent
The same stringent consent threshold is required as with personal data – freely given, specific, informed and unambiguous
indication of an individual’s wishes.
Necessary for obligations under employment, social security or social protection law, or a collective agreement - This is a wider
definition than within current legislation and is allowed in so far as it is justified by UK or EU law, or by collective agreement.
Providing there are appropriate safeguards for the rights and interests of the individual.
Necessary to protect the vital interests of a data subject or another person where the data subject is incapable of giving consent
This condition is very tightly drafted, and can only be relied upon when there is no other available grounds for processing the data,
e.g. for medical emergencies
Necessary for the establishment, exercise or defence of legal claims or where courts are acting in their judicial capacity - This is
a wider definition than within current legislation
Grounds for Processing Special Categories of Data
Necessary for reasons of substantial public interest
Necessary for the purposes of preventative or occupational medicine, for assessing the working capacity
of the employee, medical diagnosis, the provision of health or social care or treatment or management of
health or social care
This provision provides a formal legal justification for regulatory uses of healthcare data in the health and
pharmaceutical sectors, and by providing for the sharing of health data with providers of social care
Necessary for reasons of public interest in the area of public health
Necessary for archiving purposes in the public interest, or scientific and historical research purposes or
statistical purposes
This is a new condition under the GDPR and provides that special categories data can be processed for the
purposes of archiving, research and statistics. Pseudoanonymisation procedures would very likely need to be
considered if we were relying on using this ground for processing.
Criminal Convictions and Offences
Data in relation to criminal convictions and offences are not categorised as
“sensitive” under the GDPR, which they were under the Data Protection Act 1998
However, they have not lost their sensitivity and the GDPR states that this type of
data can only be processed under the control of an official authority or where
the processing is authorised by UK or EU law, which provides appropriate
safeguards.
There will be a specific section within the Data Protection Bill relating to law
enforcement which will deal with processing for the prevention, detection,
investigation, or prosecution of criminal offences or the execution of criminal
penalties.
Data Protection Principles
1. Data processed lawfully, fairly and in a transparent manner ('lawfulness, fairness and transparency')
The inclusion of the principle of transparency is a new provision within the GDPR.
2. Data obtained for specified, explicit and legitimate purposes and not further processed in a manner that is incompatible with those
purposes
The current DPA 1998 has similar restrictions on the processing of data. The GDPR provisions include processing for public interest and/or
scientific purposes, widening the scope for further processing. Archiving, scientific / historical research or statistical purposes would not
been seen as incompatible with this purpose. However there would be a need to consider pseudo anonymising the data.
6. Appropriate technical and organisational measures against unauthorised or unlawful processing, loss, damage or destruction
Accountability
The University is responsible for demonstrating that we comply with the six principles
Data processed lawfully, fairly and in a
transparent manner
Lawfulness
What are your grounds for processing both personal data and special categories data? There are no grounds for “it may be
useful”. Remember consent is only one of the grounds you can rely on there may be others that are relevant. If you are relying
on consent ensure the quality of this consent – does it meet the new requirements?
Fairness
If you are relying on consent it must be a freely given, specified, informed and unambiguous indication of an individual’s
wishes. Ensure there is a form of clear affirmative action – a “positive opt in”. What information are you giving individuals in
order for them to make the choice.
Transparency
The University’s privacy notice will be updated, however consider whether you need your own privacy notice for specific
processing activities. Make sure that any notices you use are comprehensive and clear, written in plain language, in an easily
accessible format.
Where is the information located? Can the individual reasonably be expected to locate the privacy notice, and to make an
informed decision to grant consent (where necessary)? Are you informing the individual why you are collecting the data, and
what grounds you are relying on? (i.e. if you are not relying on consent what are you relying on, make this clear)
Make a decision up front on issues such as archiving so that you can inform the individuals how long you will be keeping their
data for.
Data obtained for specified, explicit and legitimate
purposes and not further processed in a manner
that is incompatible with those purposes
Purpose Limitation
Decide what your basis is for collecting the personal information / special categories information and make this known to the individuals concerned e.g. in any T&Cs,
on your website, in any literature.
Make sure you consider whether you need to draft your own privacy policy for the processing, or whether you link to the University policy. Have a clear data
collection statement which is explicit with regard to use of the data. This is essential in order to ensure specified, informed and unambiguous consent. Make sure you
include the retention period for the data.
The GDPR also sets out rules on factors to be taken into account to asses whether a new processing purposes fits with the purpose originally communicated to the
individual:
- Is there any link between the original and proposed new purpose?
- The context in which the data was collected
- The nature of the data (is it special category or criminal offence data)
- The possible consequence of the new processing
- The existence of safeguards such as pseudoanonymisation / encryption
Processing for archival purposes in the public interest, for scientific and historical research purpose or statistical purposes should be considered compatible with the
original purpose.
Data processed is adequate, relevant and
limited to what is necessary
Data minimisation
Only collect and use what you actually need in order to carry out the purpose, and importantly,
only what is compatible with the reasons and purposes which the individuals were informed of,
or the purposes for which you are legally entitled to hold the information.*
Importantly don’t collect (or hold) any data “in case it might come in handy”
Data is accurate and, where necessary, kept up to
date
Accuracy
Make sure that any personal data, or special categories data, collected is recorded accurately.
Every reasonable step must be taken to ensure that any data found to be inaccurate is erased or
rectified without delay, and in any event within a month of receiving a request from the
individual.
The individual needs to notify us of any change in their data. However we should also check
periodically to make sure the data is still up to date.
Data should not to be kept longer than is
necessary for the purpose
Storage Limitation
We cannot hold data which permits identification of individuals any longer than is necessary for the purpose notified to the
individual in our privacy notice / data collection notice etc.
Data can be held for longer as long as this is for the purpose of archiving, or for scientific or historical research, or for
statistical purposes. Remember that when you have archived the data, or if you are using it for scientific /historical research
or for statistical purposes it still comes under the principle requiring appropriate technical and organisational measures to be
in place. Consider pseudoanonymisation at this stage.
Once the purpose for holding the data is no longer valid or the assigned retention date has passed you should not continue to
hold the information (see also principle 6)
We have a legal responsibility to make sure that the information is held securely, and that it is securely disposed of at the end
of the retention period
Appropriate technical and organisational
measures against unauthorised or unlawful
processing, loss, damage or destruction
Integrity and confidentiality
This principle applies to both personal and special categories data which must be kept secure. The data must be processed in a manner
that ensures appropriate security, including protection against unlawful processing, accidental loss, destruction or damage.
The information must only be available to those with a right to see it. Matters to consider:-
◦ Transferring information from one section / function / department to another, or transferring externally – it’s often essential to do this – but
consider what information actually needs to be transferred, to whom and how is it possible to ensure the confidentiality and the security of the
information. Remember even if we are transferring data it is still our responsibility to ensure its safety.
◦ Information is disclosed to members of staff in order for them to carry out their specific roles. This information should not under any circumstances
be disclosed or handed over to anyone other than those with a need to see it.
◦ Staff must be careful with memory sticks, laptops and other portable media – use encryption / passwords etc. Consult the University’s Information
Security Policy.
Information Security
Paper records
Appropriate storage for paper / manual records would include:
Does your School / Department have a clear desk policy? If not are there any risks to having paperwork out on the desk
overnight / at weekends?
The GDPR requires us to be transparent and to provide accessible information to individuals about how we use their information. The usual way in which to
provide this information is through the use of a “privacy notice”. The term “privacy notice” is used to describe all the different ways in which an organisation can
provide privacy information to individuals – on the web, in any literature etc. The privacy notice needs to be comprehensive.
◦ Who is “Bangor University”; and if it is a specific notice, then it should also include who is the school / department;
◦ What is the University going to do with individuals’ information – the purpose for collecting it
◦ Who will it be shared with – important to include everything;
◦ Details of any transfers outside the EU (as we are an international University this may be relevant);
◦ The retention period for the data (consult the records retention schedule);
◦ The individuals right to access the data and to rectify, erase and restrict its use;
◦ The Complaints process (including to the Information Commissioner’s Office)
◦ Whether there’s a statutory or contractual requirement to provide the data and the consequences of not providing it;
◦ If there is any automated decision making;
◦ What is the source of the data (including if it is from a third party source who they are).
The Privacy Notice must be provided at the point in which the individual hands over the data. We can’t assume because someone engages with one service that
they would be happy for their data to be transferred to another service. If the data isn’t obtained directly from the individual, the University should provide the
Privacy Notice to the individual within a month of receiving the data
The right of access
Individuals have the right to be told whether the University is processing their personal data, and to receive a copy of that data.
The individual also has the right to be provided with supplemental information about the processing (purpose of processing,
categories of data processed, recipients, retention period, their right to erasure / rectification, the source of the data)
In order to make a request to see / obtain a copy of the information an individual should make a request in writing. Within the
University the request should be made to info-compliance@bangor.ac.uk or by post to Lynette Hunter in Corporate Services.
There is no charge for making the request, and the request must be dealt without delay, and at the latest within one month of
receipt of the request.
Matters to consider
- Can we make data more accessible to individuals so they can see the information themselves without needing to use the right of
access procedure.
- Are we making students aware that they can see and amend data within MyBangor?
- Can we deal with a request for portability of data – which data can be easily exported in structured, machine readable formats?
Children’s Personal Data in the digital
environment
The GDPR contains new provisions intended to enhance the protection of children’s personal data in the digital environment. In
the GDPR children are identified as those who require specific protection under the regulations.
Will the rules in relation to children affect you?
Proposals in relation to online services would mean children aged 13 years old or above would be able to consent to their data
being processed. For children under 13 years old their parents or guardians would need to consent. Withdrawing consent will also
be simplified for children.
Privacy notices for children
Where services are offered directly to a child, organisations must ensure that the relevant privacy notice is written in a clear, plain
way that a child will understand.
Any current data protection clauses which are put into contracts will need to be updated to ensure they
remain compliant with the GDPR requirements and new data protection legislation.
To do now:
A personal data breach means a breach of security leading to the destruction, loss, alteration, unauthorised disclosure
of, or access to, personal data / special categories data.
The University will have to notify the ICO where the breach is likely to result in a risk to the rights and freedoms of
individuals, and must do so within 72 hours.
Failing to notify a breach when required to do so can result in a fine, in addition there will be a significant fine for the
breach itself … up to 10 million Euros or 2 per cent of an organisation’s global turnover.
The University will be expected to keep an Internal Breach Register noting all personal / special categories data breaches
When should we notify the ICO?
We should notify the ICO of a breach where it is likely to result in a risk to the rights and freedoms of individuals. The individuals themselves will
also need to be notified in most cases.
Whether to notify or not has to be assessed by the University on a case by case basis, and all staff will be made aware of the University’s
internal breach reporting procedures.
The ICO guidance states they would expect the following information to be shared:
◦ The nature of the personal data breach including, where possible the categories and approximate number of individuals concerned; and
◦ the categories and approximate number of personal data records concerned;
◦ The name and contact details of the data protection officer or other contact point where more information can be obtained;
◦ A description of the likely consequences of the personal data breach; and
◦ A description of the measures taken, or proposed to be taken, to deal with the personal data breach and, where appropriate, of the
measures taken to mitigate any possible adverse effects.
Staff Responsibilities
Staff (including volunteers working at the University, external members of committees and contractors) have a
responsibility to ensure that personal and special categories data:
◦ is not disclosed, orally or in writing, intentionally, or accidentally, to any unauthorised member of staff or external third party
If you need to share personal or special categories data with another member of staff, or with an external third party,
make sure that you have satisfied yourself that they have the right to know the information, and if they have that you
have made them aware of the need for confidentiality.
Don’t hesitate to ask questions e.g. “why do you need it”, “what powers do you have to request it”?
Compliance with data protection legislation is both a personal and an organisational responsibility
Final thoughts ….. Things to do now
1. Raise awareness of the changes with your colleagues, encourage them to attend training
2. Consider what information you hold, and identify your lawful basis for processing the information
3. Look at your Privacy Notices, and include all the required information
4. Are you set up to be able to deal with the changes to individuals’ rights?
5. Make sure you know who handles subject access requests
6. Do you rely on consent to process information, and if so how will you ensure you comply with the more
stringent requirements? Think about what needs doing both for current information and for the future
7. Do children use your services? Consider what information needs to be provided to them
8. Familiarise yourself with the University’s data breach procedure
9. Data Protection by Design – build this into your processes especially with new technology projects
HIPAA 1996
119
OBJECTIVES
At the end of this session, the participants will be able to:
◦ Define and explain the HIPAA
◦ Identify which information is governed by the HIPAA rule
◦ Define Protected Health Information (PHI)
◦ Explain verification requirements
◦ Explain rules governing obtaining permission to disclose PHI
◦ Discuss the employee’s role if they are aware of a HIPAA violation
What Is HIPAA?
HIPAA (pronounced hippa) is a federal law.
It’s a set of rules and regulations that affect the health care industry.
That:
Identifies the person; or
Could possibly identify the person.
Examples of of such information include a client/participant’s name, address, social security number, medical
record number, or photograph.
Protected Health Information
(PHI)
PHI is all individually identifiable health information in any form:
Paper
Verbal
Electronic
Exceptions:
Employment records (including employees’ medical information).
Certain education records.
PHI
Protected Health Information can be stored in/on:
You must only disclose the minimum amount of PHI necessary to satisfy a request.
You must only request the minimum amount of PHI you need at the time.
Minimum Necessary – Not
Applicable
The minimum necessary rule does not apply to:
Verify the identity of the person requesting PHI and the authority of that person to have access to PHI; and
When required, get some kind of proof from the person making the request.
Permission To Use or Disclose
PHI?
Client/participant authorization is not needed before you disclose his or her PHI for treatment,
payment, and/or health care operations (TPO) .
Generally, however, you do need specific, written authorization from the client/participant before
you can use or disclose his or her PHI for other reasons (unless specifically permitted by the Privacy
Rule).
TPO
Treatment
Payment
The PHI disclosed is limited to information relevant to identifying the suspect and the nature of any injury.
Remember…
If you are unsure about how to proceed in a certain situation involving PHI,
ask your supervisor.
Remember…
Do not discuss any PHI you see or hear while performing your job with anyone unless
necessary!
Remember…
There are significant penalties for misuse of PHI.
Center for Internet Security
(CIS) Critical Security Controls.
Client System Administration
The CIS (Center for Internet Security) Critical
Security Controls are a prioritized set of actions for
cybersecurity that form a defense-in-depth set of
specific and actionable best practices to mitigate
the most common cyber attacks
With the CIS Controls,
You Can...
1. Simplify Your Approach to Threat Protection
2. Comply with Industry Regulations
3. Achieve Essential Cyber Hygiene
4. Translate Information into Action
5. Abide by the Law
Jim Long
Managing Partner - The Long Law Firm, PLLC
We use the CIS Controls to help our clients achieve
compliance with state and federal cybersecurity regulations.
The CIS 18 are prioritized, easy to understand, and extremely
cost-effective for small to mid-size organizations looking to
prove they are secure enough to do business in today’s
marketplace. I highly recommend starting with CIS in
building your cybersecurity program.
Endpoint Protection,
Endpoint Detection and
Response,
Endpoint Protection, Endpoint Detection, and Response
(EPDR) is a layered security solution that combines real-time
monitoring, data analytics, and automated response.