8 Cybersecurity in Information Systems

Learning Objectives

  • Define cybersecurity.
  • Identify different cybersecurity threats.
  • Understand information security management systems.
  • Describe risk management and disaster recovery.
  • Recognize ethical and legal issues related to information systems.

Introduction

In the modern age of technology, businesses must safeguard themselves from cyber-attacks that can cause significant harm to their information systems. Cybersecurity is the practice of defending computer systems, networks, servers, mobile devices, and data from malicious attacks, theft, and unauthorized access. It is an essential measure that ensures the confidentiality, integrity, and availability of sensitive data and critical systems.

Suspicious character in black hoodie.Cyber-attacks are becoming more sophisticated and complex with time, forcing businesses to invest more resources in cybersecurity measures. Cybercriminals use advanced techniques such as social engineering, malware, and ransomware attacks, which can cause financial losses, reputational damage, and loss of customer trust. In simple words, cybersecurity is the process of protecting information systems from unauthorized access, compromise, theft, and damage.

The importance of cybersecurity in business information systems cannot be overemphasized. Businesses are built on confidential data, including financial data, trade secrets, customer information, and intellectual property. If these are compromised through a cyber-attack, it could pose a significant threat to the existence of the business. Below are a few reasons to stress the importance of cybersecurity in business information systems.

Financial Losses:  One of the primary reasons why cybersecurity is so important in business information systems is financial losses. Many cyber-attacks result in significant financial losses for businesses. These losses can come from theft of sensitive financial data, system downtime, and business interruption. A company’s financial resources can be depleted if a cyber-attack is successful, leading to bankruptcy.

Reputation Damage: Cyber-attacks also have the potential to damage the reputation of a business. Customer data breaches can cause a loss of public confidence in a business, and the negative publicity can take years to recover from. Once the public’s trust is lost, it is difficult to regain. A breach of customer information can cause a loss of customer trust, resulting in lost revenue and profits.

Compliance Requirement: With increasing regulations such as the GDPR and the CCPA, businesses must comply with regulatory requirements, which include cybersecurity standards, data privacy, and breach notification obligations. Businesses that fail to comply risk hefty fines and legal penalties. Cybersecurity measures are necessary for businesses to meet regulatory requirements and avoid legal complications.

Operational Efficiency: Cyber-attacks can also cause operational inefficiencies, leading to system downtime and business interruption. When a company’s information system is compromised, the system can become slow, leading to reduced productivity, and in some cases, system shutdowns. Additionally, the information system may be manipulated or entirely taken over by attackers, allowing them to access sensitive data such as personal information, financial records, and intellectual property. This can result in significant financial losses, damage to reputation, and legal consequences.

In summary, a compromised information system can have severe and far-reaching consequences for a company, including reduced productivity, financial losses, loss of customer trust, legal consequences, and regulatory non-compliance. Therefore, it is crucial for companies to prioritize information security and take appropriate measures to protect their systems, data, and customers.

Real World Cyber Attacks

The following are real-world cyber-attacks that have caused serious harm:

SolarWinds hack: attackers breached the software company’s systems and compromised numerous government agencies and private companies. Consequences included the theft of sensitive data and the potential for future espionage.

Colonial Pipeline ransomware attack: hackers shutdown a vital US oil pipeline for several days, leading to gas shortages and panic buying. The company eventually paid a ransom of $4.4 million to regain control of its systems. Computer operator in B&W photo

Equifax data breach: attackers exploited a vulnerability in the credit bureau’s systems and stole sensitive information on more than 147 million customers. The breach led to widespread identity theft and financial fraud.

WannaCry ransomware attack: a global campaign targeted vulnerable Windows systems with ransomware that locked users out until they paid a fee. The attack disrupted numerous business operations and caused millions of dollars in damages.

Facebook: Political consulting firm Cambridge Analytica harvested the personal data of millions of Facebook users without their consent to create targeted political ads during the 2016 US presidential election. Facebook was criticized for not protecting its users’ personal data and for allowing third-party apps to access it. The scandal led to investigations by regulators around the world and a huge drop in Facebook’s stock price. Facebook had to pay $5 billion to the US Federal Trade Commission as a settlement and implement stricter data privacy policies.

JP Morgan Chase data breach: attackers gained access to the bank’s systems and stole data on more than 76 million households and 7 million small businesses. The breach led to worries about the security of the financial system and consumer trust in banks.

Marriott International data breach: hackers compromised the hotel group’s systems for several years, stealing the personal information of up to 500 million guests. The breach led to widespread concern over the security of travel and hospitality companies.

Yahoo data breaches: attackers compromised Yahoo’s systems on multiple occasions, stealing user data on billions of accounts. The breaches led to widespread identity theft and reputational damage for the company.

Twitter hack: attackers compromised the accounts of high-profile celebrities and politicians, using them to promote a bitcoin scam. The breach exposed the vulnerability of social media platforms to coordinated attacks.

Travelex ransomware attack: hackers targeted the foreign currency exchange company with ransomware, causing a temporary shutdown of operations across the globe. The incident highlighted the risks of relying on outdated IT systems and the importance of cybersecurity measures.

Cybersecurity Threats: Cybercrime, Malware, and Social Engineering

Cybercrime

Cybersecurity threats have been consistently increasing in the past few years. With the rise of technology and the internet, it is essential for every individual and organization to understand the potential risks and vulnerabilities that come with digital platforms. Cybersecurity threats come in various types and forms:  Hacker photo

Cybercrime: Cybercrime is a criminal activity that primarily occurs online or through electronic means. Cybercriminals use the internet to access personal or organizational data. Cybercrime can take several forms, including identity theft, phishing, fraud, hacking, and cyberstalking. The purpose of cybercrime is to steal, damage, or disrupt personal and organizational data.

Identity Theft: Identity theft occurs when personal information, such as name, social security number, credit card details, or bank account details, is stolen. Cybercriminals use the stolen information to access personal accounts, buy products or services, or obtain credit. Identity theft can have severe consequences on individuals, as it can result in financial loss, damaged credit, and a damaged reputation.

Fraud: Fraud is a criminal activity that involves deceiving individuals for financial gain. Cybercriminals often use the internet to carry out fraudulent activities, such as fake investment opportunities, lottery scams, and employment scams. The ultimate goal of fraud is to obtain personal or organizational assets, such as money or sensitive information.

Hacking:  Hacking refers to the unauthorized access of computer systems or networks. Cybercriminals use various techniques, such as SQL injection, brute force attacks, and phishing attacks, to gain access to personal or organizational data. Hacking can result in the theft of sensitive information, such as credit card details, intellectual property, or personal data.

Cyberstalking:  Cyberstalking is a type of cybercrime in which an individual uses electronic communication to harass or intimidate another person. This is done with the help of email, social media, forums, or other internet-based mechanisms. It can take the form of threats, humiliating messages, or constant annoyance that can cause emotional distress to the victim. The harasser can be someone known to the victim or a complete stranger.

Malware

Malware is a type of software that is designed specifically to harm computer systems and data. There are many different types of malware, each of which is designed to accomplish a specific goal. Some types of malware are designed to steal sensitive user data, while others are designed to disrupt computer systems or cause other types of damage. Malware can enter a computer system in a number of ways, including through email attachments, downloads from unreliable websites, or by exploiting system vulnerabilities.

Computer with red background and black pirate flag.One of the most common types of malware is the ‘Trojan horse’ virus. A Trojan horse is a type of malware that masquerades as a legitimate program, but once installed on a computer, it can carry out malicious actions such as stealing passwords, logging keystrokes, or even taking control of the system. Another common type of malware is the ‘worm’ virus, which is designed to replicate itself and spread throughout a network or computer system, causing damage to system files and applications.

Malware can also include adware and spyware. Adware is software that displays advertisements on a user’s computer, usually in the form of pop-up ads. While adware is not necessarily harmful in and of itself, it can cause annoyance and slow down the performance of a computer system. Spyware, on the other hand, is a type of malware designed to monitor a user’s computer activity without their knowledge or consent. Spyware can track user keystrokes, record passwords, and steal personal information.

Social Engineering

Social engineering is another type of cybersecurity threat that has become increasingly sophisticated in recent years. Social engineering involves using psychological tactics to deceive individuals into divulging sensitive information or performing actions that benefit the attacker. Social engineering can take many different forms, including phishing, pretexting, and baiting.

Phishing is a type of social engineering that involves sending an email or message that appears to be from a legitimate company or organization, but actually redirects the user to a fake website that collects their personal information. Phishing can also involve phone calls or other types of communications that ask for personal information or passwords.

Protecting Yourself Against Cybercrime

Here are ten ways in which individuals and employees can protect themselves against cybercrime:

    1. Use strong passwords: Use complex passwords that include letters, numbers, and symbols. Don’t use easily guessable passwords such as “password123”.
    2. Keep software up to date: Keep software and applications up to date with the latest updates and patches. These updates often include security fixes.Computer keyboard with lock.
    3. Be cautious of suspicious emails: Don’t open suspicious emails or click on links from unknown senders.
    4. Use antivirus software: Install antivirus software on your devices and keep it up to date.
    5. Don’t share personal information: Don’t share personal information online, such as login credentials, social security numbers, or bank account information.
    6. Use two-factor authentication: Use two-factor authentication when available for added security.
    7. Use secure Wi-Fi networks: Avoid using public Wi-Fi for sensitive transactions like online banking or shopping.
    8. Be cautious of phishing scams: Be cautious of phishing scams where criminals try to trick you into giving them your personal information.
    9. Backup your data: Backup your data regularly so that if you become a victim of a cyberattack, you don’t lose all your data.
    10. Cybersecurity training: Attend cybersecurity training, learn about the latest cybersecurity threats and best practices for cybersecurity.

Information Security Management Systems (ISMS)

An information security management system (ISMS) is a framework of policies, procedures, and controls that an organization uses to identify, assess, and manage information security risks. The ISMS helps organizations protect their information assets, such as data, information systems, and technology, against cybersecurity threats.

The main purpose of an ISMS is to ensure that an organization has appropriate security measures in place to protect its information assets from cyberattacks, data breaches, and other security incidents. This may include implementing access controls, encryption, firewalls, intrusion detection and prevention systems, and other security technologies.

The ISMS provides a structured approach to identifying and managing information security risks. It starts with risk assessments, which help organizations identify potential threats and vulnerabilities. Based on the results of the risk assessments, the organization can then prioritize its security controls to focus on areas of highest risk.

The ISMS also includes policies and procedures for incident response, which outline the steps that need to be taken in case of a security incident or breach. These procedures may include steps like reporting the incident to management, conducting an investigation, notifying law enforcement or regulatory authorities, and communicating with customers or other stakeholders.

In addition to risk assessments and incident response procedures, the ISMS also includes policies and procedures for compliance with relevant laws, regulations, and standards. For example, an organization may implement an ISMS that complies with the ISO 27001 standard, which provides a comprehensive framework for information security management.

An ISMS can be an effective tool for protecting organizations from cybersecurity threats. By implementing a structured approach to information security management, organizations can identify and prioritize their security risks, implement appropriate controls and procedures, and effectively respond to incidents or breaches.

Components of an ISMS

Policies and Procedures: A set of documented policies and procedures that define the information security framework.

Operators monitoring system security.Risk Assessment: A comprehensive risk assessment process that identifies all potential vulnerabilities and threats to the information assets of an organization.

Risk Treatment: A process for evaluating and treating identified risks.

Information Security Controls: A set of security controls and measures that are designed to protect the confidentiality, integrity, and availability of information.

Metrics and Monitoring: A system of metrics and monitoring that track the effectiveness of the ISMS, identify areas for improvement, and provide feedback to the organization.

Auditing and Review: Regular auditing and review to ensure that the ISMS remains effective and is aligned with the organization’s business objectives.

Continual Improvement: A process for ongoing, continual improvement of the ISMS to address new threats, vulnerabilities, and risks as they arise.

Risk management:  Risk management for information systems involves a comprehensive process of identifying, assessing, analyzing, and mitigating potential risks that could harm the integrity, confidentiality, and availability of critical information systems.  The following steps are involved in risk management for information systems:

    • Identify assets: Identify critical assets that are most important to the business, including hardware, software, and data.
    • Threat assessment: Determine potential threats to these critical assets, including data breaches, cyber-attacks, natural disasters, etc.
    • Vulnerability analysis: Identify vulnerabilities and weaknesses in the information systems that could be exploited by threats.
    • Risk assessment: After analyzing threats and vulnerabilities, assess the likelihood and impact of risks.
    • Risk mitigation: Develop and implement a plan to mitigate risks. This includes implementing security measures such as encryption, access control, firewalls, and intrusion detection systems.
    • Regular monitoring: Continuously monitor the information systems for any potential risks or vulnerabilities.
    • Incident response: Develop an incident response plan in the event of a security breach or system failure.

Disaster Recovery:  Disaster recovery for information systems is a process designed to ensure the continuity of critical business functions and the timely and effective recovery of key IT systems and applications in the event of a disaster or disruptive event. The goal of disaster recovery for information systems is to minimize downtime, data loss, and the negative impact on business operations, customers, and stakeholders. Some of the common disaster recovery procedures for information systems include:Recovery workers.

    • Backup and restoration of data and applications from storage devices, including cloud services and offsite backups.
    • Replication of data and applications in real-time or near real-time to geographically dispersed locations.
    • High availability solutions, such as redundant hardware and software, to ensure continuous access to critical applications and data.
    • Disaster recovery drills and testing to ensure that the procedures and recovery systems are working as intended.
    • Creation of a disaster recovery plan (DRP) that outlines roles, responsibilities, and actions to be taken during a disaster.

Ethical and Legal Issues in Information Systems

The modern world relies heavily on information systems, which encompass both hardware and software systems that handle, process, and store data. While these systems offer numerous benefits, including improved efficiency, communication, and decision-making capabilities, they also pose significant ethical and legal challenges.

One of the most important ethical issues in information systems is data privacy. In an era of large-scale hacking and data breaches, individuals are becoming increasingly concerned about the safety and security of their  personal information. It is essential for organizations to ensure that they are collecting, storing, and using data in an ethical and transparent manner. Companies must provide effective security measures to safeguard sensitive information and comply with data protection laws such as the European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) in the US. This responsibility extends throughout the information system lifecycle, from the initial collection of data to its eventual disposal.

Scales of justiceAnother key ethical issue is the potential for automation to replace human workers. While digital transformation can create new roles and opportunities, it can also eliminate jobs that were previously done by humans. As artificial intelligence (AI) and robotics continue to advance, many jobs may become redundant, which could result in significant social and economic disruption. Businesses and policymakers must consider the ethical implications of this shift and ensure that workers are protected by appropriate labor laws and social safety nets.

The use of information systems also raises significant legal issues, particularly with regard to intellectual property (IP). IP rights are crucial in the digital age because they protect creators’ and innovators’ interests in their works. However, digital piracy and illegal file sharing have made it difficult to protect such rights. In addition, the ease with which digital content can be copied and distributed via the internet raises questions about who owns the rights to this content and who has the right to distribute it.

Information systems also raise concerns about data quality and accuracy. Given the volume of data generated by these systems, it is critical to ensure that the information being processed is accurate and reliable. Decision-makers must have access to high-quality information to make sound decisions, and inaccuracies or errors can have serious consequences. The ethical issue here is that data errors can be made intentionally, through data manipulation or bias, or unintentionally, through technical glitches or human error.

Another legal issue related to information systems is cybersecurity. Cybercrime has become a significant threat to businesses and individuals, and the costs of cyber attacks are staggering. Companies must safeguard their information systems against hacking and other forms of cybercrime by employing robust security measures like encryption, firewalls, and intrusion detection systems. Failing to prevent or mitigate a cyber-attack can lead to loss of reputation, financial penalties, and lawsuits.

There are also concerns that information systems may perpetuate bias and discrimination. Algorithms and decision-making processes within information systems are only as unbiased as the data they are trained on, which can be problematic if the data itself contains biases or discriminatory patterns. For example, a job-recruitment algorithm may learn to prefer male candidates over female candidates if historical hiring data shows a gender bias within the company. This can result in perpetuating inequality in the workplace.

Be aware that information systems have the potential for significant benefits, but it is important for organizations to address the ethical and legal challenges they present if they hope to avoid negative consequences.

Summary

Cybersecurity and information security have become increasingly important in today’s digital world. These fields focus on protecting digital information from unauthorized access, use, disclosure, disruption, modification or destruction.

One of the most significant cybersecurity threats is malware, which is a type of software that is intentionally designed to cause damage to computer systems or steal sensitive data. Other threats include hacking, phishing, and ransomware attacks. These threats can result in financial losses, intellectual property theft, and reputational damage for individuals, businesses, and governments.

To address these threats and ensure information security, organizations develop an Information Security Management System (ISMS). An ISMS is a framework that provides a systematic approach to managing sensitive information, which includes developing policies and procedures, conducting risk assessments, and implementing controls to protect against cybersecurity threats. ISMS frameworks such as ISO/IEC 27001 provide a standardized approach to information security management for organizations.

In addition to ISMS frameworks, risk and disaster recovery planning are critical components of cybersecurity and information security. Risk management involves identifying potential security threats and vulnerabilities and implementing measures to mitigate those risks. Disaster recovery planning involves developing a plan to restore normal operations in the event of a cyber attack or other significant disruption.

Ethical and legal issues are also critical considerations in cybersecurity and information security. Organizations must comply with relevant laws, regulations, and contractual obligations related to data privacy and security. Ethical considerations include the protection of personal information and ensuring fairness and transparency in the collection and use of data.

In summary, cybersecurity and information security are critical components of modern society. With the increasing reliance on digital information, individuals and organizations must prioritize cybersecurity to protect sensitive information from cybersecurity threats. This includes developing an ISMS framework, implementing risk management and disaster recovery plans, and considering ethical and legal concerns.

Discussion Questions: 

  1. What are the most common cyber threats faced by businesses today and how can they be prevented?
  2. How can individuals protect their personal information from cyber attacks?
  3. How do social engineering attacks work, and how can organizations prevent them?
  4. What is the importance of encryption in cybersecurity and how does it work?
  5. What are the legal and ethical considerations when it comes to cybersecurity and data privacy?
  6. What are the advantages and disadvantages of using third-party security services for organizations?
  7. How can artificial intelligence be used to enhance cybersecurity?
  8. What is the role of government and law enforcement in cybersecurity?
  9. What are the best practices for incident response and disaster recovery in case of a cyber-attack?

License

Icon for the Creative Commons Attribution 4.0 International License

Introduction to Information Systems Management Copyright © 2024 by Roy Wood is licensed under a Creative Commons Attribution 4.0 International License, except where otherwise noted.

Share This Book

Feedback/Errata

Comments are closed.