Counter measures to
Combat Covert e-attacks
e-risk analysis
London, UK, 15:30 GMT 26th October 1999 - On the eve of the mi2g
software event on "How to manage e-risk?" organised in
conjunction with Reuters and First Tuesday, it was revealed that most of the
serious electronic attacks taking place against financial institutions, multi-nationals
and major on-line businesses are highly covert and seldom become public knowledge.
Whilst the headlines are grabbed by publicity seeking hacker attacks on web
sites, where graffiti is splashed across the screen or data is visibly lost,
it is becoming clear that the piracy of intellectual property and internet
based financial fraud is taking place in much more subtle ways and over a
longer period of time. Each incident may cause the target organisation damage
to the tune of £25 to £40 Million.
On 27th October, mi2g software will reveal to an audience of over
100 CEOs, CTOs, COOs and partners of financial institutions, multi-nationals,
major on-line businesses and professional practices, that off-the-shelf technology
solutions are no longer enough to combat sustained electronic attack from
Hacker Activated Code (HAC).
"HAC modules may be embedded and lie undetected in the victim's computer
network for several months before exporting sensitive information to the attacker's
computer system anywhere on the planet", according to DK Matai, Founder
of mi2g software.
Subtle e-attacks, which are normally not detected in time, are not discussed
by the victim organisation for fear of share price collapse or copy cat attacks
that exploit the same vulnerability. In over 55% instances, the organisation's
employees or contractors exposed to sensitive network information have played
a part in sustaining and developing the e-attack.
The e-risk management forum will discuss the integrated 4-way mi2g
matrix to address covert electronic attack on large organisations:
1. Technology dimension including Bespoke Security Architecture
2. Legal dimension including Downstream Liability and Data Protection
3. Human resource dimension including physical issues
4. E-risk insurance cover that protects the revenue stream and e-liabilities
Background:
1. mi2g software presented seminars on e-risk at Richards Butler on
4th August and Hammond Suddards on 8th September. A total of 220 CEOs, FDs
and Partners from USA, Germany, Japan and Britain have attended the events
which highlight the threat to e-commerce systems from Cyber Warfare. We presented
an update on all major e-risk incidents and trends within the escalating threat
to e-commerce businesses, financial institutions and multi-nationals. Future
seminars on e-risk are planned for November 99.
2. Downstream Liability is the real possibility of litigation
arising from customers and businesses that have bought a product or a service
from a vendor in good faith and have surrendered personal and financial information
about themselves for a declared purpose only.
3. The total cost of servicing Cyber Warfare incidents worldwide is
likely to exceed £12.5 Billion in 1999 according to mi2g software.
In the last ten months, there have been three major virus attacks and several
full scale Cyber Attacks. Melissa in March, Chernobyl in April and the fatal
ExploreZip in June cost corporations huge unplanned and unbudgeted resources.
Variants of these three and other lethal viruses have been emerging at a steady
rate to date.
4. mi2g software (www.mi2g.com) is a leading edge London based e-commerce
enterprise specialising in e-risk management and bespoke security architecture.
5. e-risk, e-risk analysis, e-risk management, How to manage
e-risk?, Downstream Liability, e-risk insurance, Bespoke
Security Architecture are trade marks of mi2g software (mi2g.com).