SlideShare a Scribd company logo
1 of 10
Information Security and Bangladesh
Name: Umme Habiba
ID: 142-15-3677,Section: B
Abstract
Information is critical to any business and paramount to the survival of
any organization in today’s globalized digital economy. IT professionals
must have core knowledge of information security management and the
governance requirements involved. This report investigates the evolution
of information security; where it came from, where it is today and the
direction in which it is moving. It is argued that information security is
not about looking at the past in anger of an attack once faced; neither is
it about looking at the present in fear of being attacked; nor about
looking at the future with uncertainty about what might befall us. The
message is that organizations and individuals must be alert at all times.
Furthermore, this report also highlights critical information security
issues that are being overlooked or not being addressed by research
efforts currently undertaken. New research efforts are required that
minimize the gap between regulatory issues and technical
implementations.
Keywords
Information security; Information security topics; Goals; Information
security trends; Security implementation approach.
1. Introduction:
Information security has evolved from addressing minor and harmless
security breaches to managing those with a huge impact on
organizations’ economic growth.
Information security: a “well-informed sense of assurance that the
information risks and controls are in balance.” —James Anderson,
Inovant (2002)
IT professionals must have core knowledge of information security
management and the governance requirements involved. The IT industry
is a relatively new sector in the country's economy. Though it is yet to
make tangible contributions in the national economy, it is an important
growth industry. Comparatively, the information security of Bangladesh
is not as much better as others developed country.
2. Information security:
The protection of information and its critical elements, including
systems and hardware that use, store, and transmit that information. The
best offense is a good defense when it comes to our network’s security.
Security testing and assessments provide organizations with the
knowledge, expertise and efficiency needed to conduct thorough security
and risk evaluations of our environment.
Necessary tools: policy, awareness, training, education, technology
Fig.1: Components of Information Security
3. Goals:
A primary goal of information security is to fulfill the above demands
that clarify how reliable our security is! Controlling access to sensitive
information is crucial to the security of any organization. Information
security can be decomposed into three basic categories:
making sure that those who should not see
information.
making sure that the information has not been changed from
its original.
making sure that the information is available for use
when you need it.
These categories are not mutually exclusive as a loss in confidentiality
can often times lead to a loss in integrity and/or availability. Many
different security models have been proposed to help address the
concerns of confidentiality, integrity and availability.
4. Approaches to Information Security Implementation:
A. Bottom-Up Approach:
Grassroots effort: systems administrators attempt to improve security
of their systems
Key advantage: technical expertise of individual administrators
Seldom works, as it lacks a number of critical features:
Participant support
Organizational staying power
B. Top-Down Approach:
Initiated by upper management
Issue policy, procedures and processes
Dictate goals and expected outcomes of project
Determine accountability for each required action
The most successful also involve formal development strategy referred
to as systems development life cycle.
Fig.2: Approaches to Information Security Implementation.
5.Information security trends in Bangladesh:
Located in South Asia, Bangladesh is an Islamic country with a young
and rapidly growing population of 164 million.
According to the BASIS 2012 survey the ICT industry has consistently
grown in recent years at 20 to 30 percent per annum. Over 800
registered ICT companies generated total revenues of approximately
$250 million. More than 75 percent of companies are involved in
customized application development and maintenance, 50 percent are
dedicated to IT enabled services, and 45 percent offer E-commerce/Web
services. The survey also shows that 60 percent of companies solely
focus on the domestic market.
According to this survey, we can say that our ICT industry has grown up
day by day and plays a vital role on our economy. That’s why our
information security system needs to be modified for our future
betterment and improvement.
In February 2012, Bangladesh Declared Cyber War against India on the
Protest of Unjust Border Killings By Indian BSF and Indian Cyber
Warriors and finally Bangladesh defeated India. That means our security
system was not bad but it is not satisfactory at all as several time it’s
bank are hacked by outer country’s hacker.
Capitalizing on weaknesses in the security of the Bangladesh Central
Bank, including the possible involvement of some of its employees,[6]
perpetrators attempted to steal $951 million from the Bangladesh central
bank's account with the Federal Reserve Bank of New York sometime
between February 4–5 in 2016 when Bangladesh Bank's offices were
closed. The perpetrators managed to compromise Bangladesh Bank's
computer network, observe how transfers are done, and gain access to
the bank's credentials for payment transfers. They used these credentials
to authorize about three dozen requests to the Federal Reserve Bank of
New York to transfer funds from the account Bangladesh Bank held
there to accounts in Sri Lanka and the Philippines.
Thirty transactions worth $851 million were flagged by the banking
system for staff review, but five requests were granted; $20 million to
Sri Lanka (later recovered[7][8]), and $81 million lost to the Philippines,
entering the Southeast Asian country's banking system on February 5,
2016. This money was laundered through casinos and some later
transferred to Hong Kong.
In 2013, the Sonali Bank of Bangladesh was also successfully targeted
by hackers who were able to cart away US$250,000. In 2015, two other
hacking attempts were recorded, a $12 million theft from Banco del
Austro in Ecuador in January and an attack on Vietnam's Tien Phong
Bank in December that was not successful. In all these cases, the
perpetrators are suspected to have been aided by insiders within the
targeted banks, who assisted in taking advantage of weaknesses within
the SWIFT global payment network.
Investigation
Initially, Bangladesh Bank was uncertain if its system had been
compromised. The governor of the central bank engaged World
Informatics Cyber Security, a US based firm, to lead the security
incident response, vulnerability assessment and remediation. World
Informatics Cyber Security brought in the leading forensic investigation
company Mandiant, a FireEye company, for the investigation. These
cyber security experts found "footprints" and malware of hackers, which
suggested that the system had been breached. The investigators also said
that the hackers were based outside Bangladesh. An internal
investigation has been launched by Bangladesh Bank regarding the case.
The Bangladesh Bank's forensic investigation found out that malware
was installed within the bank's system sometime in January 2016, and
gathered information on the bank's operational procedures for
international payments and fund transfers.
The investigation also looked into an unsolved 2013 hacking incident at
the Sonali Bank, wherein US$250,000 was stolen by still unidentified
hackers. According to reports, just as in the 2016 Central Bank hack, the
theft also used fraudulent fund transfers using the Swift International
Payment Network. The incident was treated by Bangladeshi police
authorities as a cold-case until the suspiciously similar 2016 Bangladesh
Central Bank heist.
Bangladesh Bank chief governor Atiur Rahman resigned from his post
amid the current investigation of the heist and money laundering. He
submitted his resignation letter to Prime Minister Sheikh Hasina on
March 15, 2016. Before the resignation was made public, Rahman stated
that he would resign for the sake of his country.
6. Conclusion:
Information security is a “well-informed sense of assurance that the
information risks and controls are in balance.” Computer security began
immediately after first mainframes were developed. Successful
organizations have multiple layers of security in place: physical,
personal, operations, communications, network, and information.
Security should be considered a balance between protection and
availability. Information security must be managed similar to any major
system implemented in an organization using a methodology like
SecSDLC.
At last, I want to say that information of any country is as like as
backbone of its. So, it’s security protection need to be a great
concerning and sensitive issue of all country for more secure life.
7. References
[1] https://en.wikipedia.org/wiki/Information_security
[2] https://en.wikipedia.org/wiki/2016_Bangladesh_Bank_heist
[3] http://www.sciencedirect.com/science/article/pii/S016740480
8001168
[4] http://newsinfo.inquirer.net/773842/bangladesh-central-bank-
governor-quits-over-81m-heist
[5] http://www.thedailystar.net/news-detail-120615
[6] http://www.journals.elsevier.com/journal-of-information-security-
and-applications/call-for-papers/special-issue-on-security-and-
dependability-of-internet-of-t
[7]http://www.computerweekly.com/feature/How-to-create-a-good-
information-security-policy
[8]Anderson, J. M. (2003). "Why we need a new definition of
information security".Computers & Security, 22(4), 308–313.
doi:10.1016/S0167-4048(03)00407-3.
[9]Jump up^ Venter, H. S., & Eloff, J. H. P. (2003). "A taxonomy for
information security technologies".Computers & Security, 22(4), 299–
307. doi:10.1016/S0167-4048(03)00406-1.
[10] https://www.youtube.com/watch?v=MsCe1x3zLAU
Informationsecurity

More Related Content

What's hot

Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data securityAshish Jhalani
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...Hansa Edirisinghe
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attackerseadeloitte
 
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaWhite Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaRaaj Khanna
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9seadeloitte
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568IJRAT
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraKapil Mehrotra
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and lawsAjnish Rana
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)theijes
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liabilityDFickett
 
Internet is a threat in financial secotr
Internet is a threat in financial secotr Internet is a threat in financial secotr
Internet is a threat in financial secotr khan shamim
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...SafeNet
 
Cyber Fraud - The New Frontiers
Cyber Fraud - The New FrontiersCyber Fraud - The New Frontiers
Cyber Fraud - The New FrontiersAlbert Hui
 
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be Youseadeloitte
 

What's hot (20)

Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018CII Whitepaper India Cyber Risk & Resilience Review 2018
CII Whitepaper India Cyber Risk & Resilience Review 2018
 
India and its wall of data security
India and its wall of data securityIndia and its wall of data security
India and its wall of data security
 
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
INFORMATION SECURITY MANAGEMENT - Critique the employment of ethical hacking ...
 
August 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber AttackerAugust 2017 - Anatomy of a Cyber Attacker
August 2017 - Anatomy of a Cyber Attacker
 
Data security
Data securityData security
Data security
 
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital IndiaWhite Paper on Raising The Cyber Security Bar In The Journey To a Digital India
White Paper on Raising The Cyber Security Bar In The Journey To a Digital India
 
September 2019 part 9
September 2019 part 9September 2019 part 9
September 2019 part 9
 
Cyber fraud in banks
Cyber fraud in banksCyber fraud in banks
Cyber fraud in banks
 
What is data privacy?
What is data privacy?What is data privacy?
What is data privacy?
 
Paper id 35201568
Paper id 35201568Paper id 35201568
Paper id 35201568
 
Cyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil MehrotraCyber Security work shop by Kapil Mehrotra
Cyber Security work shop by Kapil Mehrotra
 
Cyber crime and laws
Cyber crime and lawsCyber crime and laws
Cyber crime and laws
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)The International Journal of Engineering and Science (The IJES)
The International Journal of Engineering and Science (The IJES)
 
Sept 2012 data security & cyber liability
Sept 2012   data security & cyber liabilitySept 2012   data security & cyber liability
Sept 2012 data security & cyber liability
 
Internet is a threat in financial secotr
Internet is a threat in financial secotr Internet is a threat in financial secotr
Internet is a threat in financial secotr
 
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
4 Steps to Financial Data Security Compliance Technologies to Help Your Finan...
 
Cyber Fraud - The New Frontiers
Cyber Fraud - The New FrontiersCyber Fraud - The New Frontiers
Cyber Fraud - The New Frontiers
 
June 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be YouJune 2017 - Your Biggest Risk Could Be You
June 2017 - Your Biggest Risk Could Be You
 

Viewers also liked

62 how to track someone elses line messages
62 how to track someone elses line messages62 how to track someone elses line messages
62 how to track someone elses line messagesCatherineRai
 
The forest around the planet
The forest around the planetThe forest around the planet
The forest around the planetjcco1234
 
how to spy on husbands line messages
how to spy on husbands line messageshow to spy on husbands line messages
how to spy on husbands line messagesCatherineRai
 
how to hack LINE chat of others
how to hack LINE chat of others how to hack LINE chat of others
how to hack LINE chat of others CatherineRai
 
Who Would Be The Audience For Your Media Product?
Who Would Be The Audience For Your Media Product?Who Would Be The Audience For Your Media Product?
Who Would Be The Audience For Your Media Product?HannahO4997
 
how to track husband's line messages
how to track husband's line messageshow to track husband's line messages
how to track husband's line messagesCatherineRai
 
how to spy on LINE from pc
how to spy on LINE from pc how to spy on LINE from pc
how to spy on LINE from pc CatherineRai
 
how to track line messages
how to track line messageshow to track line messages
how to track line messagesCatherineRai
 
how to monitor line messages android
how to monitor line messages androidhow to monitor line messages android
how to monitor line messages androidCatherineRai
 
The forest around the planet
The forest around the planetThe forest around the planet
The forest around the planetjcco1234
 
how to track someones line conversations
how to track someones line conversationshow to track someones line conversations
how to track someones line conversationsCatherineRai
 

Viewers also liked (15)

62 how to track someone elses line messages
62 how to track someone elses line messages62 how to track someone elses line messages
62 how to track someone elses line messages
 
The forest around the planet
The forest around the planetThe forest around the planet
The forest around the planet
 
без инт
без интбез инт
без инт
 
how to spy on husbands line messages
how to spy on husbands line messageshow to spy on husbands line messages
how to spy on husbands line messages
 
بروشور معرفی مرکز دولتی صدور گواهی الکترونیکی ریشه
بروشور معرفی مرکز دولتی صدور گواهی الکترونیکی ریشهبروشور معرفی مرکز دولتی صدور گواهی الکترونیکی ریشه
بروشور معرفی مرکز دولتی صدور گواهی الکترونیکی ریشه
 
how to hack LINE chat of others
how to hack LINE chat of others how to hack LINE chat of others
how to hack LINE chat of others
 
Who Would Be The Audience For Your Media Product?
Who Would Be The Audience For Your Media Product?Who Would Be The Audience For Your Media Product?
Who Would Be The Audience For Your Media Product?
 
how to track husband's line messages
how to track husband's line messageshow to track husband's line messages
how to track husband's line messages
 
how to spy on LINE from pc
how to spy on LINE from pc how to spy on LINE from pc
how to spy on LINE from pc
 
اصالت‌سنجی اسناد الکترونیکی (راهکار جلوگیری از جعل اسناد الکترونیکی)
اصالت‌سنجی اسناد الکترونیکی (راهکار جلوگیری از جعل اسناد الکترونیکی)اصالت‌سنجی اسناد الکترونیکی (راهکار جلوگیری از جعل اسناد الکترونیکی)
اصالت‌سنجی اسناد الکترونیکی (راهکار جلوگیری از جعل اسناد الکترونیکی)
 
معرفی مرکز دولتی صدور گواهی الکترونیکی ریشه
معرفی مرکز دولتی صدور گواهی الکترونیکی ریشهمعرفی مرکز دولتی صدور گواهی الکترونیکی ریشه
معرفی مرکز دولتی صدور گواهی الکترونیکی ریشه
 
how to track line messages
how to track line messageshow to track line messages
how to track line messages
 
how to monitor line messages android
how to monitor line messages androidhow to monitor line messages android
how to monitor line messages android
 
The forest around the planet
The forest around the planetThe forest around the planet
The forest around the planet
 
how to track someones line conversations
how to track someones line conversationshow to track someones line conversations
how to track someones line conversations
 

Similar to Informationsecurity

Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docxhallettfaustina
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCybAnastaciaShadelb
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsisVasuki Kashyap
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurityMark Albala
 
System Security SEC440 System Security.docx
System Security     SEC440 System Security.docxSystem Security     SEC440 System Security.docx
System Security SEC440 System Security.docxmattinsonjanel
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data SecurityeTailing India
 
1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docxblondellchancy
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...TraintechTde
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdframsetl
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEMINSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEMijsc
 
Insider Threat Prevention in the US Banking System
Insider Threat Prevention in the US Banking SystemInsider Threat Prevention in the US Banking System
Insider Threat Prevention in the US Banking Systemijsc
 
Information AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxInformation AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxjaggernaoma
 
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05Daniel Kapellmann Zafra
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268xosap
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In IndiaIRJET Journal
 

Similar to Informationsecurity (20)

Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
Not Prepared for Hacks .docx
                 Not Prepared for Hacks    .docx                 Not Prepared for Hacks    .docx
Not Prepared for Hacks .docx
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
12Cyber Research ProposalCyb
12Cyber Research ProposalCyb12Cyber Research ProposalCyb
12Cyber Research ProposalCyb
 
Our Previous Edition Post event synopsis
Our Previous Edition Post event synopsisOur Previous Edition Post event synopsis
Our Previous Edition Post event synopsis
 
The digital economy and cybersecurity
The digital economy and cybersecurityThe digital economy and cybersecurity
The digital economy and cybersecurity
 
System Security SEC440 System Security.docx
System Security     SEC440 System Security.docxSystem Security     SEC440 System Security.docx
System Security SEC440 System Security.docx
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
CYBERCRIME VICTIMS
CYBERCRIME VICTIMSCYBERCRIME VICTIMS
CYBERCRIME VICTIMS
 
India and Its Wall of Data Security
India and Its Wall of Data SecurityIndia and Its Wall of Data Security
India and Its Wall of Data Security
 
1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx
 
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
 
Insider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdfInsider_Threats_in_Healthcare_1651617236.pdf
Insider_Threats_in_Healthcare_1651617236.pdf
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEMINSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
 
Insider Threat Prevention in the US Banking System
Insider Threat Prevention in the US Banking SystemInsider Threat Prevention in the US Banking System
Insider Threat Prevention in the US Banking System
 
Information AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docxInformation AssuranceChaston Carter041717 Target Corpora.docx
Information AssuranceChaston Carter041717 Target Corpora.docx
 
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05IMT 552-JPMorgan Chase & Co. Risk Assessment v05
IMT 552-JPMorgan Chase & Co. Risk Assessment v05
 
Irjet v5 i1268
Irjet v5 i1268Irjet v5 i1268
Irjet v5 i1268
 
Cyber Security Awareness Challenge: In India
Cyber Security Awareness Challenge:  In IndiaCyber Security Awareness Challenge:  In India
Cyber Security Awareness Challenge: In India
 

More from Umme habiba

Compiler lab final report writing
Compiler lab final report writingCompiler lab final report writing
Compiler lab final report writingUmme habiba
 
online bus ticket booking system
online bus ticket booking systemonline bus ticket booking system
online bus ticket booking systemUmme habiba
 
online bus ticket booking system
online bus ticket booking systemonline bus ticket booking system
online bus ticket booking systemUmme habiba
 
online bus ticket booking system
online bus ticket booking systemonline bus ticket booking system
online bus ticket booking systemUmme habiba
 
Accounting adjusting
Accounting adjustingAccounting adjusting
Accounting adjustingUmme habiba
 
Economic.assignment
Economic.assignmentEconomic.assignment
Economic.assignmentUmme habiba
 
Major economic problems of bangladesh
Major economic problems of bangladeshMajor economic problems of bangladesh
Major economic problems of bangladeshUmme habiba
 
Overview of various types of operating system
Overview of various types of operating systemOverview of various types of operating system
Overview of various types of operating systemUmme habiba
 
Os lab report(shell coding)
Os lab report(shell coding)Os lab report(shell coding)
Os lab report(shell coding)Umme habiba
 
Ecommerce(online Shopping)
Ecommerce(online Shopping)Ecommerce(online Shopping)
Ecommerce(online Shopping)Umme habiba
 
Different types of Addressing.cao
Different types of Addressing.caoDifferent types of Addressing.cao
Different types of Addressing.caoUmme habiba
 
2nd generation of computer
2nd generation of computer2nd generation of computer
2nd generation of computerUmme habiba
 
Art_of_living assignment
Art_of_living assignmentArt_of_living assignment
Art_of_living assignmentUmme habiba
 
SQL Joinning.Database
SQL Joinning.DatabaseSQL Joinning.Database
SQL Joinning.DatabaseUmme habiba
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.pptUmme habiba
 
simpson's in numerical method
simpson's in numerical methodsimpson's in numerical method
simpson's in numerical methodUmme habiba
 
Error detection in Data comunication
 Error detection in Data comunication Error detection in Data comunication
Error detection in Data comunicationUmme habiba
 
microsoft word & powerpoint
 microsoft word & powerpoint microsoft word & powerpoint
microsoft word & powerpointUmme habiba
 
Upmovie review (1)
Upmovie review (1)Upmovie review (1)
Upmovie review (1)Umme habiba
 

More from Umme habiba (20)

Compiler lab final report writing
Compiler lab final report writingCompiler lab final report writing
Compiler lab final report writing
 
online bus ticket booking system
online bus ticket booking systemonline bus ticket booking system
online bus ticket booking system
 
online bus ticket booking system
online bus ticket booking systemonline bus ticket booking system
online bus ticket booking system
 
online bus ticket booking system
online bus ticket booking systemonline bus ticket booking system
online bus ticket booking system
 
Accounting adjusting
Accounting adjustingAccounting adjusting
Accounting adjusting
 
Economic.assignment
Economic.assignmentEconomic.assignment
Economic.assignment
 
Major economic problems of bangladesh
Major economic problems of bangladeshMajor economic problems of bangladesh
Major economic problems of bangladesh
 
Overview of various types of operating system
Overview of various types of operating systemOverview of various types of operating system
Overview of various types of operating system
 
Os lab report(shell coding)
Os lab report(shell coding)Os lab report(shell coding)
Os lab report(shell coding)
 
Ecommerce(online Shopping)
Ecommerce(online Shopping)Ecommerce(online Shopping)
Ecommerce(online Shopping)
 
Different types of Addressing.cao
Different types of Addressing.caoDifferent types of Addressing.cao
Different types of Addressing.cao
 
2nd generation of computer
2nd generation of computer2nd generation of computer
2nd generation of computer
 
Art_of_living assignment
Art_of_living assignmentArt_of_living assignment
Art_of_living assignment
 
Art_of_living
Art_of_livingArt_of_living
Art_of_living
 
SQL Joinning.Database
SQL Joinning.DatabaseSQL Joinning.Database
SQL Joinning.Database
 
WLAN of networking.ppt
WLAN of networking.pptWLAN of networking.ppt
WLAN of networking.ppt
 
simpson's in numerical method
simpson's in numerical methodsimpson's in numerical method
simpson's in numerical method
 
Error detection in Data comunication
 Error detection in Data comunication Error detection in Data comunication
Error detection in Data comunication
 
microsoft word & powerpoint
 microsoft word & powerpoint microsoft word & powerpoint
microsoft word & powerpoint
 
Upmovie review (1)
Upmovie review (1)Upmovie review (1)
Upmovie review (1)
 

Recently uploaded

TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catcherssdickerson1
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitterShivangiSharma879191
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 

Recently uploaded (20)

TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor CatchersTechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
TechTAC® CFD Report Summary: A Comparison of Two Types of Tubing Anchor Catchers
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter8251 universal synchronous asynchronous receiver transmitter
8251 universal synchronous asynchronous receiver transmitter
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 

Informationsecurity

  • 1. Information Security and Bangladesh Name: Umme Habiba ID: 142-15-3677,Section: B Abstract Information is critical to any business and paramount to the survival of any organization in today’s globalized digital economy. IT professionals must have core knowledge of information security management and the governance requirements involved. This report investigates the evolution of information security; where it came from, where it is today and the direction in which it is moving. It is argued that information security is not about looking at the past in anger of an attack once faced; neither is it about looking at the present in fear of being attacked; nor about looking at the future with uncertainty about what might befall us. The message is that organizations and individuals must be alert at all times. Furthermore, this report also highlights critical information security issues that are being overlooked or not being addressed by research efforts currently undertaken. New research efforts are required that minimize the gap between regulatory issues and technical implementations. Keywords Information security; Information security topics; Goals; Information security trends; Security implementation approach.
  • 2. 1. Introduction: Information security has evolved from addressing minor and harmless security breaches to managing those with a huge impact on organizations’ economic growth. Information security: a “well-informed sense of assurance that the information risks and controls are in balance.” —James Anderson, Inovant (2002) IT professionals must have core knowledge of information security management and the governance requirements involved. The IT industry is a relatively new sector in the country's economy. Though it is yet to make tangible contributions in the national economy, it is an important growth industry. Comparatively, the information security of Bangladesh is not as much better as others developed country. 2. Information security: The protection of information and its critical elements, including systems and hardware that use, store, and transmit that information. The best offense is a good defense when it comes to our network’s security. Security testing and assessments provide organizations with the knowledge, expertise and efficiency needed to conduct thorough security and risk evaluations of our environment. Necessary tools: policy, awareness, training, education, technology
  • 3. Fig.1: Components of Information Security 3. Goals: A primary goal of information security is to fulfill the above demands that clarify how reliable our security is! Controlling access to sensitive information is crucial to the security of any organization. Information security can be decomposed into three basic categories: making sure that those who should not see information. making sure that the information has not been changed from its original.
  • 4. making sure that the information is available for use when you need it. These categories are not mutually exclusive as a loss in confidentiality can often times lead to a loss in integrity and/or availability. Many different security models have been proposed to help address the concerns of confidentiality, integrity and availability. 4. Approaches to Information Security Implementation: A. Bottom-Up Approach: Grassroots effort: systems administrators attempt to improve security of their systems Key advantage: technical expertise of individual administrators Seldom works, as it lacks a number of critical features: Participant support Organizational staying power B. Top-Down Approach: Initiated by upper management Issue policy, procedures and processes Dictate goals and expected outcomes of project Determine accountability for each required action The most successful also involve formal development strategy referred to as systems development life cycle.
  • 5. Fig.2: Approaches to Information Security Implementation. 5.Information security trends in Bangladesh: Located in South Asia, Bangladesh is an Islamic country with a young and rapidly growing population of 164 million. According to the BASIS 2012 survey the ICT industry has consistently grown in recent years at 20 to 30 percent per annum. Over 800 registered ICT companies generated total revenues of approximately $250 million. More than 75 percent of companies are involved in customized application development and maintenance, 50 percent are dedicated to IT enabled services, and 45 percent offer E-commerce/Web services. The survey also shows that 60 percent of companies solely focus on the domestic market.
  • 6. According to this survey, we can say that our ICT industry has grown up day by day and plays a vital role on our economy. That’s why our information security system needs to be modified for our future betterment and improvement. In February 2012, Bangladesh Declared Cyber War against India on the Protest of Unjust Border Killings By Indian BSF and Indian Cyber Warriors and finally Bangladesh defeated India. That means our security system was not bad but it is not satisfactory at all as several time it’s bank are hacked by outer country’s hacker. Capitalizing on weaknesses in the security of the Bangladesh Central Bank, including the possible involvement of some of its employees,[6] perpetrators attempted to steal $951 million from the Bangladesh central bank's account with the Federal Reserve Bank of New York sometime between February 4–5 in 2016 when Bangladesh Bank's offices were closed. The perpetrators managed to compromise Bangladesh Bank's computer network, observe how transfers are done, and gain access to the bank's credentials for payment transfers. They used these credentials to authorize about three dozen requests to the Federal Reserve Bank of New York to transfer funds from the account Bangladesh Bank held there to accounts in Sri Lanka and the Philippines. Thirty transactions worth $851 million were flagged by the banking system for staff review, but five requests were granted; $20 million to Sri Lanka (later recovered[7][8]), and $81 million lost to the Philippines, entering the Southeast Asian country's banking system on February 5, 2016. This money was laundered through casinos and some later transferred to Hong Kong. In 2013, the Sonali Bank of Bangladesh was also successfully targeted by hackers who were able to cart away US$250,000. In 2015, two other
  • 7. hacking attempts were recorded, a $12 million theft from Banco del Austro in Ecuador in January and an attack on Vietnam's Tien Phong Bank in December that was not successful. In all these cases, the perpetrators are suspected to have been aided by insiders within the targeted banks, who assisted in taking advantage of weaknesses within the SWIFT global payment network. Investigation Initially, Bangladesh Bank was uncertain if its system had been compromised. The governor of the central bank engaged World Informatics Cyber Security, a US based firm, to lead the security incident response, vulnerability assessment and remediation. World Informatics Cyber Security brought in the leading forensic investigation company Mandiant, a FireEye company, for the investigation. These cyber security experts found "footprints" and malware of hackers, which suggested that the system had been breached. The investigators also said that the hackers were based outside Bangladesh. An internal investigation has been launched by Bangladesh Bank regarding the case. The Bangladesh Bank's forensic investigation found out that malware was installed within the bank's system sometime in January 2016, and gathered information on the bank's operational procedures for international payments and fund transfers. The investigation also looked into an unsolved 2013 hacking incident at the Sonali Bank, wherein US$250,000 was stolen by still unidentified hackers. According to reports, just as in the 2016 Central Bank hack, the
  • 8. theft also used fraudulent fund transfers using the Swift International Payment Network. The incident was treated by Bangladeshi police authorities as a cold-case until the suspiciously similar 2016 Bangladesh Central Bank heist. Bangladesh Bank chief governor Atiur Rahman resigned from his post amid the current investigation of the heist and money laundering. He submitted his resignation letter to Prime Minister Sheikh Hasina on March 15, 2016. Before the resignation was made public, Rahman stated that he would resign for the sake of his country. 6. Conclusion: Information security is a “well-informed sense of assurance that the information risks and controls are in balance.” Computer security began immediately after first mainframes were developed. Successful organizations have multiple layers of security in place: physical, personal, operations, communications, network, and information. Security should be considered a balance between protection and availability. Information security must be managed similar to any major system implemented in an organization using a methodology like SecSDLC. At last, I want to say that information of any country is as like as backbone of its. So, it’s security protection need to be a great concerning and sensitive issue of all country for more secure life. 7. References [1] https://en.wikipedia.org/wiki/Information_security
  • 9. [2] https://en.wikipedia.org/wiki/2016_Bangladesh_Bank_heist [3] http://www.sciencedirect.com/science/article/pii/S016740480 8001168 [4] http://newsinfo.inquirer.net/773842/bangladesh-central-bank- governor-quits-over-81m-heist [5] http://www.thedailystar.net/news-detail-120615 [6] http://www.journals.elsevier.com/journal-of-information-security- and-applications/call-for-papers/special-issue-on-security-and- dependability-of-internet-of-t [7]http://www.computerweekly.com/feature/How-to-create-a-good- information-security-policy [8]Anderson, J. M. (2003). "Why we need a new definition of information security".Computers & Security, 22(4), 308–313. doi:10.1016/S0167-4048(03)00407-3. [9]Jump up^ Venter, H. S., & Eloff, J. H. P. (2003). "A taxonomy for information security technologies".Computers & Security, 22(4), 299– 307. doi:10.1016/S0167-4048(03)00406-1. [10] https://www.youtube.com/watch?v=MsCe1x3zLAU