By Ann Brady
Cybercrime is on the rise. And as we move deeper into the digital age, the era of the so-called Fourth Industrial Revolution, it is also growing ever more sophisticated and severe, with serious consequences. As cyber criminals become more adroit, an interest in cybersecurity now touches all our lives in one way or another.
Cyberattacks can range from hacking into systems and social media, phishing attacks, malicious software including ransomware, identity theft, social engineering, and denial-of-service attacks. This is painful both personally and financially, causing untold damage and destruction, as well as leaving society and citizens vulnerable. According to McAfee, the computer security software company, the cost of these cyberattacks is increasing, amounting to around $1 trillion US in 2020.
A growing global risk
With Covid having further embedded our growing dependence on digital systems, it is not surprising that the Global Risks Report 2022 has yet again included the threat to cybersecurity as one of the growing risks facing the world. Cybersecurity failures, it says, have worsened significantly and threaten long-term prosperity.
So how do we stay one step ahead? Building a good cyber defense system as well as anticipating threats are key elements in the fight against cybercrime, but neither resilience nor governance is possible without credible and sophisticated cyber risk-management plans.
“Cybercrime is both a national and international occurrence that is spreading with great speed, affecting businesses, governments, and society as a whole,” says cybersecurity expert Dr. Edward Humphreys. “The scale and complexity of this criminal activity has far-reaching and detrimental consequences, and the situation is blurred as cybercriminals operate, using technical infrastructure, across national boundaries.”
As a result, he adds, international collaboration is essential and international standards are indispensable for global protection. Humphreys speaks from his many years of business experience. He is also a senior research fellow specializing in cyber risk, security, and cyber-psychology research and information security management systems (ISMS) innovation studies. He is also the ISO/IEC convenor of the working group responsible for the management, development, and maintenance of ISO/IEC 27000, a family of standards on ISMS.
Solutions and controls
International standards provide solutions, Humphreys says, enabling organizations to establish frameworks and systems to assess and manage the situation—to protect information and to secure applications, services, and national infrastructure.
The first step in tackling cybercrime is knowing the risks you face and then deciding the controls that need to be implemented to mitigate these risks. Humphreys points to standards such as the ISO/IEC 27000 family, developed by ISO and the International Electrotechnical Commission (IEC), as the de facto choice for any organization wishing to build robust solutions against cybercrime. The suite of international standards specifies a management system that goes into the risk management process of assessing the risks and then determining the controls needed to treat them.
“There are a range of standards supporting ISO/IEC 27001, such as ISO/IEC 27005 on information security risk management and the ISO/IEC 27003 implementation guidelines,” says Humphreys. “And there are many other standards that provide technical support for ISO/IEC 27001, for example to secure networks and embed security features into technology, services, and applications.”
Humphreys reiterates the need for companies to be prepared and ready to face these attacks. “Cyberattacks can take place anytime and anywhere… what is certain is that these attacks are sure to happen, but we can never be sure when or where,” he says. “Being ready and prepared is an essential business activity for survival. It involves a business having in place a process to be able to anticipate, identify, detect, and report incidents, and to analyze these incidents to decide how to respond to them.” This all needs to be done in a quick and timely manner to limit the impact the incident could cause.
So how can businesses be better prepared? The sooner a business detects the presence of a malicious code attack or a denial-of-service attack, the faster it can respond with appropriate security measures, and the greater the chance of limiting the spread of these attacks as well as limiting the impact and damage. And, as Humphreys says, there are standards that help businesses to become ready and better prepared to respond, such as the incident management standard ISO/IEC 27035, the standard for business continuity management ISO 22301, and the ICT readiness standard ISO/IEC 27031.
In an already-uncertain world, cybercrime can be financially devastating, disruptive to business operations and national infrastructure, and have a negative effect on citizens and society. For example, an attack on one part of a supply chain may spread to disrupt and damage other parts of the chain. According to Humphreys, the management of a supply chain is a good example of where collective action is needed across all parts of the chain to foster more secure and resilient cybersecurity systems.
“Again,” he says, “there are standards that help with supply chain security, such as ISO 28000 and ISO/IEC 27036. Collective action is also needed in various scenarios that involve business relationships and communications with other organizations. There is a group of management standards that will help with building resilience to counter business disruption and ensure survivability and system of governance. These include ISO 22301 (business continuity management systems) and ISO/IEC 27001 (information security management systems), and ISO/IEC 27014 (information security governance).”
With the growth and dependency on connectivity for business, the infrastructure that supports it, and the use of the Internet and mobile devices, there is an even greater need for system security and resilience. Humphreys acknowledges that standards need to evolve to match the rapid advances in technology. “The third edition of ISO/IEC 27002, for instance, was published in the first quarter of 2022. This high-profile standard deals with information security controls and has been updated to match the advancement in technology, business developments and practices, and new laws and regulations.”
In 2021, he adds, there were many other developments in standardization, including Internet of Things (IoT) security and privacy, big data security and privacy, artificial intelligence security and privacy, and biometric information protection. All these are complemented by recent technical specifications such as ISO/IEC TS 27570, which provides guidance on smart city ecosystem privacy protection, and ISO/IEC TS 27100, which specifies how to create or refine robust cyber systems to protect against cyberattacks. The complete ISO/IEC 27000 family of standards and these technology-focused specifications are the foundation for building and managing a secure future.
About the author