You are on page 1of 4

An AAXXISS.

COM White Paper

http://www.aaxxiss.com

The Current Threat to Corporate Security: Physical &


Technological

The forecast is not good…!

By George B Tselentis, CISM


Sr. Security Analyst

10/2/2009 1:17:17 PM © Copyright – AAXXISS.COM – George B Tselentis, CISM


Contents Introduction
The Threat is Real …The report issued by The NIC
Introduction (The National Intelligence Council (NIC) is the
Intelligence Community's (IC's) center for midterm
The Issues and long-term strategic thinking). “Cyber attacks will
Comment provide both state and nonstate adversaries new
options for action against the United States beyond
Summary mere words but short of physical attacks ---strategic
options that include the selection of either nonlethal
or lethal damage and the prospect of anonymity”.
Reference The GLOBAL THREATS 2015 Project” NIC, Page 34.

The Continuing Threat is growing …


“Our wired society puts all of us US business, in
particular, because they must maintain an open
exchange with customers at higher risk from
enemies. In general, IT s spread and the growth of
worldwide digital networks mean that we are
challenged to think more broadly about national
security”. Reference Statement for the Record to the Joint
Economic Committee Lawrence K. Gershwin
National Intelligence Officer for Science and Technology 21 June
2001

Issues
The security issues that we face today in the Internet
space are increasing and the threats are becoming
more serious. Hackers, cybercriminals and
mercenaries working for governments and private
entities are scanning those networks, looking to
defraud, disrupt or even destroy the information that
the INTERNET provides to millions of people.
Lawmakers in the United States Congress are
attempting to empower the government to take action
with more than eighteen bills currently being
introduced. The threat is being treated seriously.

Comment on
Real World Security

Summary
The continuing threat of complexity of this problem
is something that all governments and corporations
should be working on with speed and diligence, as a
coordinated effort and with enforcement.

10/2/2009 1:17:17 PM © Copyright – AAXXISS.COM – George B Tselentis, CISM


Challenge – The Continuing (2) Legal (3) Indentifying (4) Enforcement (5)
Technology Security Threat is only Privacy (6) Demilitarization of the INTERNET.
getting worse. One of the current legal definitions “Identity theft is
governed by federal and state criminal statutes. State
It is critical for everyone involved to grasp laws vary, but typically define the crime to include an
and understand that the current threat is intent to use another's identity to commit, aid, or abet
continuing pace that is faster than the any unlawful activity. A person commits the crime of
current authority can effectively manage. identity theft if, without the authorization, consent, or
Legislators and their staffs should be better permission of the victim, and with the intent to
informed on the issues and have an defraud for his or her own benefit or the benefit of a
enhanced understanding of the threat (1) third person…”
What are the current threats? (2) What is Reference http://definitions.uslegal.com/i/identity-theft/
the impact of those threats? (3) How can
these threats be neutralized? Corporations, To add to the confusion and complexity
large and small have prepared for these “ID theft governed by federal and state criminal
threats in a way that is marginal at best. I statutes”, but there are also some cities that have their
have been in meetings with senior own municipal code enforcement. “State laws vary,
management that started and ended with but typically define the crime to include an intent to
questioning the cost factor. Very few use another's identity to commit, aid, or abet any
attending these meetings ever took into unlawful activity.” What about international law?
account the future impact these security What about those types of crimes yet to be
issues have on (1) Reputational loss (2) committed? What if the corporation holding the data
Financial loss of customers, and subsequent did not follow the current security standards to
exposure to the firm of lawsuits (3) Business protect that data? Is that a crime? How will those be
interruption cost and subsequent exposure to classified? How do you educate a jury to understand
the firm of lawsuits. the complexities of technology crime when some of
the legislators do not have a grasp of all the issues
The Complexities and Questions and possible solutions?
The technology we all use today, and at take
for granted is extremely complex…most of Solutions, Maybe?
us will agree that the “help desk” plays a The current corporate solution to these threats
vital role in our daily lives. As a user of includes the self-enforcement of audit and security
technology you only see what you need to standards. These standards and bodies of knowledge
see when you are working, and members of include COBIT (ISACA), PCI, NIST, CIS, BS7799,
the IT team are behind a curtain, so to speak, all fine organizations which allow us to review and
keeping things going. This all worked well work on the issues in a very concise and material
until approximately 1995, when the way. These organizations offer a great deal of value
INTERNET began to give all users even in understanding those issues and translating those
more choices to access various types of data, issues into action. They all offer a body of
and data that we now depend. That knowledge, when reviewed and mapped to each
dependency has a value and that value other, offer some of the best solutions on the planet!
insures that the cyber-criminal can profit. A The criteria for standards are in place. There is one
perfect example is identity theft, which in problem however…and here may be the part most
short could be described as someone who people (consumers) do not really understand…there
takes your identity and adds it to their is no enforcement, which translates to mean the
financial gain, leaving you with financial standards are sometimes performed by the
pain. This are some of the issues that are corporations and sometimes not because there is no
very complex and must be focused These one to enforce at a governmental level.
are just a few of the issues (1) Legislation

10/2/2009 1:17:17 PM © Copyright – AAXXISS.COM – George B Tselentis, CISM


To provide a perspective one needs to read Summary
the following news:
Security professionals can advise large-cap and
*TJ MAX - Sweetbay – Hannaford – Hannaford
small-cap companies how to protect themselves, but
To have a really good grasp of all these
we cannot enforce, as a result the following steps
issues goes well beyond this whitepaper, but
need to be taken:
understand this quick statistic. The
1. Serious discussions to expose all the
perpetrator to the above crime was also
possible technology security issues.
alleged to be involved in separate
2. The US Congress in concert with
conspiracies relating to data breaches at
international counterparts (European Union)
*TJX Companies, Dave & Busters, BJ's
need to address and legislate to provide:
Wholesale Club, OfficeMax, Boston
a. Domestic and International
Market, Barnes & Noble, Sports Authority,
Security Standards
Forever 21 and DSW….to name ones that
b. Domestic and International
law enforcement currently know about.
Security Standards Enforcement.
Again, keep in mind this was one person
doing serious damage to the credibility of
cyber-security. This does not take into Pending US Congressional Legislation
account the hackers, cybercriminals, There are approximately eighteen bills which have
terrorists and mercenaries working for been introduced as Congress works carefully to give
governments and private entities scanning federal authorities the power to protect the country in
those networks looking to defraud, disrupt the event of a massive cyber-attack. Beyond that they
or even destroy the information. not only need to legislate compliance standards used
by corporations, but enforce the legislation to protect
One Key Element to the Solution is all consumers.
 http://www.senate.gov/pagelayout/committees/d_three_
Missing sections_with_teasers/committees_home.htm
 http://www.house.gov/
1. ?
See other white papers that we offer on security
That one key element missing to insure topics including:
security issues are resolved is…enforcement  Non-State Actors (NSA) Terrorist - Mercenaries
and the mechanism for instituting that  The threats to Banking, Financial institutions.
enforcement is legislation.  The threats to senior management.
 The threats to companies that maintain
intellectual material, copyrights, patents and or
special processes that are part of the institutional
knowledge of that firm.
 The threats to Insurance.
 The threats to Law Firms.
 The threats to Utilities.
*Note: Copyrights© where they apply
AAXXISS.COM is a US veteran owned business with more than
thirty years experience in the security space. We have an
international scope that includes professional contemporaries that
have specialized skills and or expertise in areas such as electronic
counter measures (e-sweeps), fraud, internal investigations,
security testing, security assessments in fulfillment and supporting
corporations in meeting governance - compliance (SOX, FINRA,
GLBA, FICEN, AML program, HIPAA, OCC, Red Flag, OMB123
including FISMA, HIPAA, Sarbanes Oxley, SAS70, Personal
Information protection, reputational, and intellectual property.

10/2/2009 1:17:17 PM © Copyright – AAXXISS.COM – George B Tselentis, CISM

You might also like