Cyber Security Policy
Cyber Security Policy
Cyber Security Policy
Security Problems
Information and communication technologies are rapidly becoming an integral part of the Bangladeshi society. Through favorable government initiatives and policies ICTs are spreading fast reaching the farthest corners of the country to make a common citizens life easier, efficient and faster. Today more and more people across the country are accessing ICTs to meet various needs of their daily life - getting government information and services online, storing information, processing data, sending and receiving messages, communications, controlling machines, typing, editing, designing, drawing, and so on. But this is only one facet of the information technology; today the other facets are the challenges not for only Bangladesh but for the whole world like cyber crimes and moreover cyber terrorism. There can be no one exhaustive definition of cyber crime. However, any activities which basically offend human sensibilities can also be included in its ambit. On the other hand cyber terrorism is the premeditated use of disruptive activities, or the threat thereof, in cyber space, with the intention to further social, ideological, religious, political or similar objectives, or to intimidate any person in furtherance of such objectives. In the cyber world Bangladesh is not an isolated island. It faces the same sophistication of attacks as that of USA and other developed countries are facing. There is no reason to think that Bangladesh can survive the cyber attacks taking less sophisticated measures than the developed countries. This should also be noted that cyber security is a continuous process and not a one-time solution. As the security practices and solutions are continuously improving so are the attacks. Therefore, it is a continuous process and need to be at par with the international standards. In Bangladesh, several cyber attacks have been observed within the past few years and to prevent further proliferation proper actions need to be in place fast. The hackers and terrorists have caused substantial damages to computer systems including loss of data, disruptions in governments service delivery, privacy and confidentiality, intellectual property crimes, selling illegal articles, pornography etc. In Bangladeshs cyber space these are achieved through many methods such as spoofing, internet phising, wire transfer etc. Disrupting government services through coordinated attack of government systems cause damages to citizens and government. In recent years there have been several cases of violation of privacy and confidentiality through pornography where many citizens are victimized and threatened by the abuser to pay extortion money to
A Policy Note on
keep their sensitive information intact to avoid social damages. All of these caused a greater damage to the society and government and often corrupted the young minds that are vulnerable. With time cyber crime is becoming more and more common and also becoming more sophisticated. Cyber terrorists prefer using the cyber attack method because of its many advantages i.e. it is cheaper than traditional methods, very difficult to be traced, can hide the attakers personality and location information and there is no physical barriers. Using this method the attackers can target a large number of people easily. The type of attack Bangladesh is facing can be categorized as the following; (1) Privacy violation: violating a citizens or an organizations non-public information assets. (2) Secret information appropriation and data theft: unauthorized access and/or distribution of information assets. (3) Intentional corruption of e-governance information systems: deliberate damage to information systems of government organizations (4) Distributed denial of services: Intentional overloading of an information system so that it cannot provide its intended services to its customers. (5) Network damage and disruptions: Involves a combination of computer tampering, virus attacks, hacking, etc. (6) Sexually explicit material: involves materials that are unlawful and unethical by national standards This document will not cover defamatory material because that is a matter of a larger ongoing social debate. The intention of a cyber terrorism attack could range from economic and social disruptions of financial benefits. Although cyber attacks have caused billions of dollars in damage around the world and affected the lives of millions, security experts believe this world have yet to witness the implications of a truly catastrophic cyber terrorism attack. Since Bangladesh is just entering the cyber world so far the damages are minimum. Some of the affects are the disruption of governments service delivery, network delays, information access for citizens, costs of forensics for recovery, loss of critical communications in time of emergency. These are the direct damages caused by cyber attacks. However, there are indirect damages involved, for example, loss of confidence and credibility in government systems, tarnished relationships and public image globally and loss of trust in the countrys computer industry.
Like many other governments around the world Bangladesh government may take ISO 27001 as a standard for information security both in organizational level and for the cyberspace. ISO/IEC 27001 is a part of the growing ISO/IEC 27000 family of standards, for Information Security Management System (ISMS) published in October 2005 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). Its full name is ISO/IEC 27001:2005 - Information Technology -- Security Techniques -- Information Security Management Systems -Requirements but it is commonly known as "ISO 27001". ISO/IEC 27001 formally specifies a management system that is intended to bring information security under an explicit management control. Being a formal specification means that it mandates specific requirements. There are several other standards concerning the 27,000 family of standards which were introduced to government bodies for enhance security. Published standards ISO/IEC 27000 Information security management systems Overview and vocabulary ISO/IEC 27001 Information security management systems Requirements ISO/IEC 27002 Code of practice for information security management ISO/IEC 27003 Information security management system implementation guidance
ISO/IEC 27004 Information security management Measurement ISO/IEC 27005 Information security risk management ISO/IEC 27006 Requirements for bodies providing audit and certification of information security management systems ISO/IEC 27011 Information security management guidelines for telecommunications organizations based on ISO/IEC 27002 ISO/IEC 27033-1 - Network security overview and concepts ISO 27799 - Information security management in health using ISO/IEC 27002 [standard produced by the Health Infomatics group within ISO, independently of ISO/IEC JTC1/SC27]
Standards in preparation ISO/IEC 27007 - Guidelines for information security management systems auditing (focused on the management system) ISO/IEC 27008 - Guidance for auditors on ISMS controls (focused on the information security controls) ISO/IEC 27013 - Guideline on the integrated implementation of ISO/IEC 20000-1 and ISO/IEC 27001 ISO/IEC 27014 - Information security governance framework ISO/IEC 27015 - Information security management guidelines for the finance and insurance sectors ISO/IEC 27031 - Guideline for ICT readiness for business continuity (essentially the ICT continuity component within business continuity management) ISO/IEC 27032 - Guideline for cyber security (essentially, 'being a good neighbor' on the Internet) ISO/IEC 27033 - IT network security, a multi-part standard based on ISO/IEC 18028:2006 (part 1 is published already) ISO/IEC 27034 - Guideline for application security ISO/IEC 27035 - Security incident management ISO/IEC 27036 - Guidelines for security of outsourcing ISO/IEC 27037 - Guidelines for identification, collection and/or acquisition and preservation of digital evidence
The government may also adopt Standard of Good Practices (SOGP) for IT security practices. The Standard of Good Practice (SoGP) is a detailed documentation of identified good practices in information security. First released in 1996, the Standard is published and revised every two or three years by the Information Security Forum (ISF), an international association of organizations in financial services, manufacturing, consumer products, telecommunications, government, and other areas. The Standard is available free of charge for non-commercial use from the ISF, whereas other ISF
reports and tools are generally available only to member organizations. The Standard is used as the default governing document for information security behavior by many major organizations around the world, by itself or in conjunction with other standards such as ISO/IEC 27002 or COBIT. Using such systems will force users to consider and assess risks and design security systems based on those risks making application and services more secure. These standards cover security management at enterprise level by securing business applications, web services, computer systems, network, processes and systems.
Protected
Information that is created in the normal course of business that is unlikely to cause harm. Unrestricted information includes information deemed public by legislation or through a policy of routine disclosure and active dissemination. Unrestricted information is available to the public, employees and contractors, sub-contractors and agents working for the government. Information that is sensitive outside the government and could impact service levels or performance, or result in low levels of financial loss to
Classification Description individuals or agencies. Protected information would include personal information, financial information or details concerning the effective operation of the government, ministries and departments. Protected information is available to employees and authorized non-employees (contractors, sub-contractors and agents) possessing a need to know for business-related purposes. Information that is sensitive within the government and could cause serious loss of privacy, competitive advantage, loss of confidence in government programs, damage to partnerships, relationships and reputation. Confidential information includes highly sensitive personal information. Confidential information is available only to a specific function, group or role.
Examples of information assets information Applications Planning documents Documents containing personal information
Confidential
Personal case files such as benefits, program files or personnel files Industrial trade secrets Registration information Personnel files Policy Advice 3rd party business information submitted in confidence Cabinet documents Cabinet deliberations and supporting documents Personal medical records Provincial Budget prior to public release Criminal records
Restricted
Information that is extremely sensitive and could cause extreme damage to the integrity, image or effective service delivery of the government. Extreme damage includes loss of life, risks to public safety, substantial financial loss, social hardship, and major economic impact. Restricted information is available only
Loss of reputation or competitive advantage Loss of confidence in the government program Loss of personal or individual privacy Loss of trade secrets or intellectual property Financial loss High degree of risk if corrupted or modified Loss of public safety Significant financial loss Compromise of the legal system Compromise of Cabinet deliberations Destruction of partnerships and relationships
Implementing information security classification will mean that ministries should consider practices related to: labeling information assets, storing information, transmitting information, disposing of unneeded information, protecting the integrity of information, allowing appropriate access and disclosure and, establishing accountability. These practices have to be standardized and codified.
3.5 Response
The Information Security Incident Response Plan (ISIRP) will provide guidance and documentation on computer security incident response handling and communication efforts. The ISIRP will be activated whenever a computer security incident occurs, and will guide the responses to all incidents whose severity is such that they could affect an organizations ability to do business, or undermine its reputation. The government need to build a proper security response system with the following objectives: Provide timely and relevant information Help mitigate, protect and deliver solution Design information coding and categorization system for interoperability of information exchange and proper understanding of information sets
Strategy for a response system should be the following: Re-build and re-organize BDCERT (Bangladesh Computer Emergency / Response Team) Publish security bulletin Watch, alert and mobilize, asses and stabilize, resolve, maintain information systems Build a response system with the following goals o Quickly gain a thorough understanding of the problem o Provide government bodies with timely, relevant, consistent information
o Deliver tools, security updates and other assistance to restore normal operation o Design and asses the DR practices around the government organization
3.7 Awareness
Cultivate awareness: Enlist all users and decision makers in support for the security standards and objectives. Set organizational direction: Aware the government agencies to establish priorities and objectives, principles, policies, standards, and performance measures within. Certified service providers: Aware the use of security certified service providers to reduce risk of security threats among government agencies. Also measure, review, monitor, supervise, and remediate to ensure coordinated and consistent security implementation across all government organizations and its service providers. Shape capabilities: Continually work with all government organizations, focal points, system administrators, system analysts and communities of practice (i.e. industry, educational institutions), and users to explain security issues and standard practices.
3.8 Training
The government needs to provide a continuum of learning activities from basic literacy to advanced specialties, recruit and retain highly qualified professionals in needed positions, and keep workforce capabilities current in the face of constant change. The following should be done: Educate and train: Partner with academia to train and sustain a workforce with the depth and breadth of skill and expertise to anticipate, engineer for, and defend against sophisticated cyber adversaries. Also train the government focal points of different ministries for information security audits so that they can audit their own information systems. Structure the workforce: Define operational skills and specialties, determine organizational needs and put the right number of jobs in the right places. Put the right people in the right jobs. A professional approach at this is crucial to avoid compromising security in the hands of incompetent people.
Certified auditors: Get some IT friendly government officials trained in security practices and also get them certified with ISO 27001 auditing can be a way forward for security practices within the government organizations and systems hosted outside.
3.9 Partnerships
The unique capabilities of a wide set of partners (non government enterprises, defense, educational institutes, associations etc.) needs to be leveraged to create advanced security capabilities. Partnerships with academic institutions, defense and industry can benefit the development of standard practices and awareness campaigns. Also publicprivate engagement should be seriously considered as it is a key component to most countries strategy to secure cyberspace. This is true for several reasons. Public-private partnerships can usefully confront coordination problems. They can significantly enhance information exchange and cooperation. Public-private engagement will take a variety of forms and will address awareness, training, technological improvements, vulnerability remediation, and recovery operations. The following areas can be addressed through public-private partnerships: Intra-Government: Support and benefit from security-related programs and initiatives throughout the government agencies. Build a knowledge base of security practices, response, DR practices etc. Academia: Help build future generations of security professionals and train existing government officials. Prepare awareness for all information systems stakeholders. Cyber security and IT Industries: Expand technical relationships with critical service providers. Build standards and adopt best practices with the industry. Also build a partnership model for auditing. International: Enhance global cyber security situational awareness and build partner capacity.
Government activities should also support research and technology development that will enable the private sector to better secure privately-owned portions of the nations critical infrastructure.
confidentiality new laws and updating some old ones need to be done. Developing clearer definitions are also important to avoid ambiguity in legal systems. The following needs to be addressed in the legal system: breach of confidentiality and privacy, contracts and SLAs, damages caused by cyber crime, specific performance of the contract, punishment for criminal breach of trust, cheating and dishonestly inducing delivery of property, consumer protection clauses and specific relief clauses.
Consistent with these responsibilities, the authority should become a government center of excellence for cyber and information security and provide a focal point for government and non-government organizations including the private sector, academia, and the public.