Pertemuan 4 Information at Risk Matakuliah :A0334/Pengendalian Lingkungan Online

advertisement
Matakuliah
Tahun
Versi
:A0334/Pengendalian Lingkungan Online
: 2005
: 1/1
Pertemuan 4
Information at Risk
1
Learning Outcomes
Pada akhir pertemuan ini, diharapkan mahasiswa
akan mampu :
• Mahasiswa dapat menyatakan Resiko
Informasi
2
Outline Materi
• The Marketing Dimension
–
–
–
–
What ‘Marketing Aspects’?
These Marketing Aspects!
The Expectation: Experience Equation
But What Can Happen?
• The ‘Mistake’ (or “I didn’t Mean to destroy Your Livelihood’)
• The ‘Game’ (‘I Wanted to Prove That I Could “Take Someone Out”’)
• The ‘Idiot’ (or someone Who Thinks that They are ‘Above All of
This’)
• The ‘Good Idea’ (or ‘Let’s Do This Using “e”’ – Without Thinking)
• The ‘Unhappy Employee’ (either as A Cause or as A Victim)
– Summary
• Stamping Out The Bugs
3
The Marketing Dimension
• What ‘Marketing Aspects’?
• These Marketing Aspects!
• The Expectation: Experience Equation
4
• But What Can Happen?
– The ‘Mistake’ (or “I didn’t Mean to destroy Your
Livelihood’)
– The ‘Game’ (‘I Wanted to Prove That I Could “Take
Someone Out”’)
– The ‘Idiot’ (or someone Who Thinks that They are
‘Above All of This’)
– The ‘Good Idea’ (or ‘Let’s Do This Using “e”’ – Without
Thinking)
– The ‘Unhappy Employee’ (either as A Cause or as A
Victim)
• Summary
5
What ‘Marketing Aspects’?
• Marketing surrounding the ‘e-world’ should be
simple – everyone will utilise ‘e’, there fore turn
your communications to directing prospects and
clients to the appropriate website and to your
email address and carry on.
• Most of us have computers.
• Suddenly the marketing manager is looking
rather vulnerable, because his/her organisation
is vulnerable, and the fallout will be lack of trust
and reputation. Which leads to brand problems.
We all know that good brand reputation is
difficult to create, easy to damage and problems.
And today, damage is far easier to create.
6
• You were pretty clear about whether or not your
organisation was a ‘target’.
• It is never the other way round: you have to take
the information risk management decisions at
board level and then inform the IT department of
the criteria against which to work. It is madness
to expect the IT people to understand the
relative value of each type of information within
your organisation and its relative importance in
terms of confidentiality, integrity and availability.
7
These Marketing Aspects!
• You are responsible for the protection and
enhancement of your brand.
• Pre-‘e’ your brand was similarly affected
by your reputation.
• What is worse, they often do not realise
what they are doing to you – they do not
understand the consequences of their
actions.
8
• It is too easy to do damage electronically
and it is made too easy by the very fact
that we rely on communicating by a
system that was never designed to be
secure. The internet was originally built to
allow communication amongst academic
groups, now for their preference for
sharing information. It was not supposed
to be the world’s ‘trusted business
backbone’.
9
• The other reason why it is too easy to
create ‘electronic damage’ is that too many
organisations and individuals do not
understand why they must take steps to
protect their ‘e’-base. They think (if they
think about it at all) that ti is ‘someone
else’s responsibility’. It is seen as a
technological issue – even by managers
who should know better.
10
• Trust and confidence affect brands and
marketing has responsibility for the brand.
Therefore marketing has direct responsibility for
ensuring that your organisation promotes and
ensures ‘e-trust’ and ‘e-confidence’.
Furthermore, marketing must also take
responsibility for all internal and external
communications on this issue, otherwise they
will occur in a piecemeal fashion, undertaken by
people who are not trained in communications
skills.
11
The Expectation: Experience Equation
• Whatever we do, we cannot claim to have
‘e-trust’ and ‘e-confidence’ unless we have
genuinely got it. Remember that many socalled ‘hackers’ carry out attacks just to be
able to say that they have got through a
specific organisation’s defences. You may
claim to be secure – they may well try you
out.
12
But What Can Happen?
• Viruses, worms, trojans, deliberate attacks
(external hackers, internal hackers, recent
leaver-hackers, hactivists), random attacks
from the same communities and errors (as
all the above can be ‘let in’ by mistake) an,
in addition, simple human error can, in a
poorly protected system, wreak havoc.
13
The ‘Mistake’ (or “I didn’t Mean to
destroy Your Livelihood’)
• Recently a ‘hactivist’ (someone who
believes that their hacking is ‘ethical’
because they only break into sites and
systems that are owned or run by
organisations that they don’t agree with)
destroyed a company that was totally
innocent, even of the so-called ‘crime’ that
the hactivist was so worked-up about.
14
The ‘Game’ (‘I Wanted to Prove That I
Could “Take Someone Out”’)
• Even more recently an Internet service
Provider (ISP) – not exactly on
organisation without ‘e’-technical nous –
suffered a total ‘distributed denial of
service’ attack. This meant that none of
their customers could use their services
for over a week – they went out of
business as a direct result.
15
The ‘Idiot’ (or someone Who Thinks that
They are ‘Above All of This’)
• A large IT company has a very costly virus
attack; despite the fact that it prides itself
on assisting many areas of ‘UK plc’ to
solve technology challenges.
16
The ‘Good Idea’ (or ‘Let’s Do This Using
“e”’ – Without Thinking)
• A company offered free internet
advertising to clients of another service.
Someone ‘hacked in’ and changed the
prices shown. Apart from the nightmare of
sorting it all out, the reputation of the
company was badly shaken when the
object of the exercise was the complete
opposite!
17
The ‘Unhappy Employee’ (either as A
Cause or as A Victim)
• Consider two scenarios.
• The first involved a person who saw a
pornographic scene on another
employee’s PC screen.
18
• The second involved someone who was,
appropriately, fired from their job. Their
employer was excellent in providing new
employees with passwords etc – but not at
all good at removing them when people
left even in bad circumstances. The exemployee decided to ‘get even’ and logged
into the company system using their
passwords, and altered many detailed
items in areas such as personnel records,
payroll and costing and pricing.
19
Summary
• It is marketing’s job to control communication
about information security, inside and outside
the organisation. A company’s approach to
security will directly affect its marketing
positioning and organisational differentiation.
Security failure can destroy a company’s
reputation – or even the company itself.
• Information security is not a cost, it is a
marketing investment.
• E-business and e-government demand the
electronic exchange of ever-more important
information.
20
• Marketing should identify and promote the
internal and external advantages of having
appropriate information security.
• Marketing should create two
communications plans: one internal, one
external. Finally, marketing must ensure
that al communications are written in
suitable language for each target audience
– internal and external – otherwise the
messages will not be understood.
21
Stamping Out The Bugs
• Tony Neate has spent a total of 27 years
as a detective, 13 years of this working in
commercial fraud and eight years in
computer crime, so he knows all about
crime – cybercrime and other forms.
22
The End
23
Download