𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Next-Generation Enterprise Security and Governance (Internal Audit and IT Audit)

✍ Scribed by Mohiuddin Ahmed (editor), Nour Moustafa (editor), Abu Barkat (editor), Paul Haskell-Dowland (editor)


Publisher
CRC Press
Year
2022
Tongue
English
Leaves
265
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


The Internet is making our daily lives as digital as possible, and this new era is called the Internet of Everything (IoE). The key force behind the rapid growth of the Internet is the technological advancement of enterprises. The digital world we live in is facilitated by these enterprises’ advances and business intelligence. These enterprises need to deal with gazillions of bytes of data, and in today’s age of General Data Protection Regulation, enterprises are required to ensure privacy and security of large-scale data collections. However, the increased connectivity and devices used to facilitate IoE are continually creating more room for cybercriminals to find vulnerabilities in enterprise systems and flaws in their corporate governance.

Ensuring cybersecurity and corporate governance for enterprises should not be an afterthought or present a huge challenge. In recent times, the complex diversity of cyber-attacks has been skyrocketing, and zero-day attacks, such as ransomware, botnet, and telecommunication attacks, are happening more frequently than before. New hacking strategies would easily bypass existing enterprise security and governance platforms using advanced, persistent threats. For example, in 2020, the Toll Group firm was exploited by a new crypto-attack family for violating its data privacy, where an advanced ransomware technique was launched to exploit the corporation and request a huge figure of monetary ransom. Even after applying rational governance hygiene, cybersecurity configuration and software updates are often overlooked when they are most needed to fight cyber-crime and ensure data privacy. Therefore, the threat landscape in the context of enterprises has become wider and far more challenging. There is a clear need for collaborative work throughout the entire value chain of this network.

In this context, this book addresses the cybersecurity and cooperate governance challenges associated with enterprises, which will provide a bigger picture of the concepts, intelligent techniques, practices, and open research directions in this area. This book serves as a single source of reference for acquiring the knowledge on the technology, process, and people involved in next-generation privacy and security.

✦ Table of Contents


Cover
Half Title
Series Page
Title Page
Copyright Page
Contents
Preface
Contributors
Chapter 1: Enterprise Threat Intelligence
1.1 Introduction: Security Risk & Intelligence
1.1.1 Chapter Roadmap
1.2 Organized Crime
1.2.1 Identity Theft
1.2.1.1 Countermeasures
1.2.2 Financial & Asset System Targeting
1.2.2.1 Payment Card Attacks
1.2.2.1.1 Countermeasures
1.2.2.2 Business Email Compromise (BEC)
1.2.2.2.1 Countermeasures
1.2.2.3 Direct Financial System Attacks
1.2.2.3.1 Countermeasures
1.2.2.4 Crypto Currency Attacks
1.2.2.4.1 Countermeasures
1.2.3 Extortion
1.2.3.1 Denial of Service (DoS)
1.2.3.1.1 Countermeasures
1.2.3.2 Ransomware
1.2.3.2.1 Countermeasures
1.2.4 Infrastructure Squatting
1.2.4.1 Countermeasures
1.3 Nation States
1.3.1 Espionage
1.3.1.1 Countermeasures
1.3.2 Financial Gain
1.3.2.1 Countermeasures
1.3.3 Sabotage
1.3.3.1 Countermeasures
1.3.4 Influence
1.3.4.1 Countermeasures
1.4 Hacktivists
1.4.1 Countermeasures
1.5 Cyber Terrorism
1.5.1 Countermeasures
1.6 Insider Threats
1.6.1 Countermeasures
1.7 Future Threats
1.7.1 Artificial Intelligence (AI)
1.7.1.1 AI: Cyber Offensive Applications
1.7.1.1.1 Deepfakes (Synthetic Media)
1.7.1.2 AI: Cyber Security Applications
1.7.2 Adversarial Machine Learning
1.7.3 Quantum-Insecure Cryptography
1.7.4 Cyber-Physical Systems
1.8 Conclusion
Notes
References
Chapter 2: Enabling Corporate and Institutional Governance for Effective IT Governance
2.1 Introduction
2.2 Governance and Strategy
2.3 Current IT Governance Frameworks
2.3.1 COBIT
2.3.2 ITIL
2.3.3 ISO/IEC27001
2.4 Business Goals and IT Investment Alignment
2.5 Chapter Summary
References
Chapter 3: The Non-Malicious Risky Behavior in the Enterprise Information System Security
3.1 Introduction
3.2 Fraud Triangle and Dysfunctional Behavior In Information System
3.2.1 Explaining the Psychological Dimensions of Dysfunctional Behavior
3.2.1.1 The Organizational Factors
3.2.1.2 Information System Characteristics
3.3 Methodology
3.3.1 Sample and Instrument
3.3.2 Analysis
3.4 Results and Findings
3.4.1 Behavioral Difference
3.4.2 The Effect of Organizational Factors and Information System Characteristics
3.5 Discussion and Implications
3.5.1 Dysfunctional Behavior
3.5.2 Implications for Organizations
3.6 Conclusion
References
Chapter 4: Cybersecurity Incident Response in the Enterprise
4.1 Introduction to Cybersecurity Incidence Response
4.1.1 Cybersecurity Incidents
4.1.2 Security Events
4.1.3 Responders
4.1.4 Cyber-Resilience
4.1.5 Security Operations Centers (SOCs)
4.1.6 Security Information and Event Management (SIEM)
4.1.7 Security as a Service (SECaaS)
4.2 Understanding Cybersecurity Incidents
4.2.1 Different Types of Cybersecurity Incidents
4.2.2 The Lockheed Martin Cyber Kill Chain
4.2.2.1 Reconnaissance
4.2.2.2 Weaponization
4.2.2.3 Delivery
4.2.2.4 Exploitation
4.2.2.5 Installation
4.2.2.6 Command & Control (C&C or C2)
4.2.2.7 Actions on Objectives
4.2.3 The MITRE ATT&CK Framework
4.2.4 Microsoft STRIDE
4.3 Challenges of Cybersecurity Incidents
4.3.1 Identifying a Suspected Incident
4.3.2 Establishing Objectives
4.3.3 Analyzing All Available Information
4.3.4 Identifying What Has Been Compromised
4.3.5 Identifying What Information Has Been Accessed or Stolen
4.3.6 Cyber-Attribution
4.3.7 Determining Business Impact
4.3.8 Incident Detection and Response Tools
4.3.8.1 Live Detection Tools
4.3.8.1.1 Private SIEMs
4.3.8.1.2 Public SIEMs
4.3.8.2 Intelligence Gathering Tools
4.3.8.3 Forensic Tools
4.3.8.4 Threat Maps
4.3.9 Risk Management
4.4 Preparing for Cybersecurity Incidents
4.4.1 Understanding CSIRTs
4.4.1.1 Criticality Assessment for the Organization
4.4.1.2 Threat Analysis
4.4.1.3 Implications of People, Process, and Technology
4.4.1.4 Create a Controlled Environment
4.4.1.5 Review the State of Readiness in Incidence Response
4.5 Hacking Techniques and Countermeasures
4.5.1 Reconnaissance
4.5.1.1 Active Reconnaissance
4.5.1.2 Passive Reconnaissance
4.5.1.3 Tools for Reconnaissance
4.5.1.4 Detecting Reconnaissance
4.5.2 Scanning
4.5.2.1 Port Scanning
4.5.2.2 Vulnerability Scanning
4.5.2.3 Network Mapping
4.5.3 Gaining Access
4.5.4 Maintaining Access
4.5.5 Covering Tracks
4.6 Detecting Network Events
4.6.1 Endpoint and Network Traffic Monitoring
4.6.2 Anomaly Detection
4.6.2.1 Signature-Based Detection
4.6.2.2 Complex Behavior Matching
4.6.2.3 Anomaly-Based Detection
4.7 Responding to Cybersecurity Incidents
4.7.1 Preparing an Incidence Response Plan
4.7.2 Incident Response Plan (IRP) Phases
4.7.3 Incident Prioritization
4.7.4 Disaster Recovery Plan
4.7.5 Following up a Cybersecurity Incident
4.7.6 Carrying Out a Post-Incident Analysis
4.7.7 Containment and Eradication
4.7.8 Recovery and Post-Incident Measures
4.7.9 Cybersecurity Incident Reports
4.8 Conclusions
Acknowledgments
Notes
References
Chapter 5: Cyber-Enabled Crime as an Enabler in Market Manipulation Schemes
5.1 Introduction
5.2 Literature Review
5.3 Three Market Manipulation Cases
5.3.1 Jonathan Moylan: Market Manipulation as a Protest
5.3.2 Fin7: Organized Crime and Market Manipulation
5.3.3 The Syrian Electronic Army (SEA)
5.3.4 Discussion: The Structure of a Market Manipulation Enabled by Cybercrime
5.4 Conclusion
Acknowledgments
Notes
References
Chapter 6: Data Lakes: A Panacea for Big Data Problems, Cyber Safety Issues, and Enterprise Security
6.1 Introduction
6.1.1 Chapter Roadmap
6.2 Big Data
6.3 Data Warehouse
6.4 Data Lakes
6.4.1 The Concept of a Data Lake
6.4.2 The Architecture of Data Lakes
6.4.3 Data Lake Life Cycle
6.4.4 Data Lakes Technologies
6.4.4.1 Data Ingestion
6.4.4.2 Data Extraction
6.4.4.3 Data Cleaning
6.4.4.4 Data Storage
6.4.4.5 Data Processing
6.4.4.6 Data Access
6.4.4.7 Data Integration
6.4.4.8 Dataset Discovery
6.4.4.9 Dataset Versioning
6.4.4.10 Metadata Management
6.5 Challenges of Data Lakes and Big Data
6.5.1 Challenges Ahead for Data Experts
6.5.2 Challenges with Big Data Storing and Processing
6.5.2.1 Heterogeneity
6.5.2.2 Scalability
6.5.2.3 Fidelity
6.5.2.4 Security and Privacy
6.6 Enterprise Security
6.7 Conclusion
Notes
References
Chapter 7: The Battle for Cloud Supremacy and the Remaking of Enterprise Security
7.1 Introduction
7.2 Research Limitations
7.3 Prologue to the Cloud
7.4 The Genesis of Cloud
7.4.1 Cloud Shortfalls
7.5 Inside the Enterprise
7.5.1 Profit versus Overhead
7.5.2 Governance and Regulation
7.5.3 Resourcing Challenges
7.6 Cloud Security
7.6.1 Strategic Compatibility
7.6.2 Visibility and Clarity
7.7 Engineering Solutions
7.7.1 Mutable to Immutable Infrastructure
7.7.2 Reduced User Functionality
7.7.3 Throttling
7.8 Aggregate of Change
7.9 Conclusion
Note
References
Chapter 8: Security, Privacy, and Trust of Emerging Intelligent Transportation: Cognitive Internet of Vehicles
8.1 Introduction
8.1.1 Chapter Roadmap
8.2 Evolution of Intelligent Transportation System
8.3 Cognitive Internet of Vehicles (C-IoV): Motivation and Framework
8.3.1 Overview of C-IoV
8.3.2 C-IoV Framework
8.3.3 Use Case Analysis
8.3.3.1 Application Scenario 1
8.3.3.2 Application Scenario 2
8.4 What Security, Privacy and Trust Means in ITS?
8.4.1 Attack Surface in Evolved Intelligent Transporation System
8.4.2 Trust in the Evolved C-ITS Framework
8.5 Prospective Countermeasures Enabled by Cognitive Engine in Legacy Security Issues
8.6 Security and Privacy Concerns in C-IoV
8.6.1 Issues Related to the Cloud Computing of the Cognitive Engine
8.6.2 Issues Related to Learning Algorithms in the Cognitive Engine
8.7 Conclusion
References
Chapter 9: IT Governance and Enterprise Security Policy in the 6G Era
9.1 Introduction
9.1.1 Chapter Roadmap
9.2 6G Technologies: Security and Privacy Issues
9.2.1 AI and 6G
9.2.1.1 Adversarial Attacks
9.2.1.2 Access Control
9.2.1.3 Authentication
9.2.1.4 Encryption of Data
9.2.1.5 Perturbation
9.2.1.6 Communication
9.2.2 Molecular Communication and 6G
9.2.3 Quantum Communication
9.2.4 Explainable Artificial Intelligence (XAI) for 6G
9.3 International Cyber Security Strategy
9.4 National Cyber Security Strategy
9.5 Enterprise Security Policy in Organizations
9.5.1 Vulnerability
9.5.2 Infrastructure
9.6 Human Centric Cyber Security View
9.6.1 User
9.6.1.1 Demographics and Culture
9.6.2 Usage
9.6.3 Usability
9.7 Conclusion
References
Index


πŸ“œ SIMILAR VOLUMES


Securing an IT Organization through Gove
✍ Ken E. Sigler, James L. Rainey III πŸ“‚ Library πŸ“… 2016 πŸ› Auerbach Publications 🌐 English

<P>Past events have shed light on the vulnerability of mission-critical computer systems at highly sensitive levels. It has been demonstrated that common hackers can use tools and techniques downloaded from the Internet to attack government and commercial information systems. Although threats may co

Blockchain for Cybersecurity and Privacy
✍ Yassine Maleh (editor) πŸ“‚ Library πŸ“… 2020 πŸ› CRC Press 🌐 English

<p>Blockchain technology is defined as a decentralized system of distributed registers that are used to record data transactions on multiple computers. The reason this technology has gained popularity is that you can put any digital asset or transaction in the blocking chain, the industry does not m

Eauditing fundamentals: virtual communic
✍ Russell, James P.;Wilson, Shauna πŸ“‚ Library πŸ“… 2013 πŸ› ASQ Quality Press 🌐 English

Introduction to the eauditing process -- Virtual communications:; theory and practice -- Technology : interview and record review -- Technology : visual tools -- Audit models to consider -- Validation challenges and eaudit risk.