The Indian Army has claimed that pen drives are a major threat to its defence forces, with pen drives causing 70% of security breaches, despite a ban on their use.
“These pen drives, which are mostly manufactured in China, have emerged as a big threat to our cyber security systems,”
Army officials use pen drives to store top-level data on their PCs, but with many pen drives having malware present on them, the data is often transmitted to hackers. As a result of this, personal computers in the Army have been compromised and spying viruses have been found to be relaying critical data to other computers.
Technology is a vital part to any industry or business area, but it can come with a high number vulnerabilities. Leaking information to non-authorised people has always been an issue but, in the computer age, the speed and effectiveness with which breaches of information security can occur, and the amount of harm potentially caused is disturbing.
Information Security Breaches: Avoidance and Treatment based on ISO27001 provides an insight into how security breaches can be treated. This pocket guide outlines a process and its elements for the treatment of severe breaches, placing them into context with ISO27001 controls (the recommended standard from the Indian Technology Act in protecting your business against cyber crime).
|Information Security Breaches: Avoidance and Treatment based on ISO27001