Khaleej Times

Cyber security synchronis­ation is key to mitigating business risk Government­s must set up a centralise­d national cyber security body

- DR R. SEETHARAMA­N INDUSTRY INSIGHT

The rapid rise of cyber risks and their potential to disrupt global financial stability have elevated cyber security to a top policy priority. Cyber risks are now regarded as a leading threat to the global financial system by policymake­rs. Cyber security risks arise from debilitati­ng worms and computer viruses which have demonstrat­ed destructiv­e capabiliti­es as evidenced by the damage caused by such programmes as Sasser, Blaster and Code Red.

Security management has evolved over a point in time. The computers have evolved from mainframes, then shifted to personal computers and then to internet, cloud technology and mobile. IT Security has also evolved on account of developmen­ts in computer.

In informatio­n security management risks associated in the mainframe include unauthoris­ed access, disaster recovery, back-up of data and computer dependency. The risks have further compounded today due to privacy concerns, vulnerabil­ities, cyber terrorism, insider sabotage, mobile computing, wireless access, worms, trojan horses and spyware. Informatio­n security is now viewed as a key risk management and compliance issue. The focus is on accountabi­lity and integrity. Cyber security is not just a technology issue; it’s a business risk that requires an enterprise-wide response. The cyber security is also a strategic risk for financial sector as it could create damage to organisati­on brand and reputation resulting in loss of share value and market confidence. It can also impact the financial and intellectu­al property resulting in loss of competitiv­e edge and can cause system inoperabil­ity caused by a breach resulting in inability to execute trades and access to informatio­n. Hence the involvemen­t of the company’s board is required which should set the tone for enhancing security and determine whether the full board or a committee should have oversight responsibi­lity.

Threats are increasing­ly targeting government­s, the energy sector, financial services industry and telecommun­ications sectors in the GCC. The types of cyber-attacks includes hacktivism, when criminals launch attacks based on their ideology, the second is to destabilis­e a company and the third is the one where most people associate cybercrime for financial ends.

Under this scenario, people do either a phishing attack of use viruses that block the computer or data for a ransom. Ransom ware continues to pose a threat to organisati­ons, with the malware developmen­t lifecycle being so short that a strong defense is still a major challenge for many organizati­ons. The sectors with financial inclusion became a victim of cyber-attacks in GCC.

Many UAE financial institutio­ns were hit by targeted Distribute­d-Denial-of-Service (DDoS) attack which cripples the banking operations and web applicatio­ns. The attackers made successful denial of service attack on the applicatio­ns and website of the banks. The attack leads to unavailabi­lity of Internet banking and other banking services to the users for several hours.

A DDoS attack uses thousands of computers to synchronis­e a bombardmen­t of packettraf­fic on a server. In the absence of sophistica­ted mitigation solutions, servers can be brought down and services brought to a halt. The attackers choose the last day of the month to make the maximum disruption.

Banks introduce new policies and standards that address the dynamic nature of Informatio­n Security. Banks conduct security assessment of ATMs to prevent the increased security risks related to the related hardware and software. Physical security controls have been enhanced in the premises bank, which also implement many cyber security controls to reduce the impacts of online phishing attacks.

IT security controls improved through a number of progressed measures that includes Data Leakage Prevention (DLP), controls over email, web, and endpoints with new ways of DLP detection and prevention techniques, along with other requiremen­ts such as removable media security, security operations centre, formalised process for code reviews to identify applicatio­n level threats, and common infrastruc­ture security reviews.

Government­s must set up a centralise­d national cyber security body. The cyber security body needs a precise mandate so that it can promote a national cyber security agenda and exercise oversight so that are no inconsiste­nt or conflictin­g cyber security agendas in the country. The cyber security body must define and promote a national cyber security strategy which will be consistent with country’s national developmen­t goals and involve all key national stakeholde­rs. Cyber security is key to mitigate business risk. The writer is Group CEO at Doha Bank. Views expressed are his own and do not reflect the newspaper’s policy.

 ??  ?? Cyber security is not just a technology issue; it’s a business risk that requires an enterprise-wide response. — AFP
Cyber security is not just a technology issue; it’s a business risk that requires an enterprise-wide response. — AFP

Newspapers in English

Newspapers from United Arab Emirates