03.07.2015 Views

third Cyber Security Assessment Netherlands - NCSC

third Cyber Security Assessment Netherlands - NCSC

third Cyber Security Assessment Netherlands - NCSC

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Core assessment » 1 Interests<br />

»<br />

»»»»»<br />

High use of social media<br />

Social media are popular in the <strong>Netherlands</strong>. In relative terms,<br />

[3: CBS 2012]<br />

we are among the biggest social media users in the world.<br />

Figures from Statistics <strong>Netherlands</strong> (CBS) show that predominantly<br />

young people aged between 12 and 25 use social media a lot,<br />

with no less than 95 per cent of them using it. [3: CBS 2012] Usage levels<br />

decrease for older age groups. For example in 2011, just over<br />

one fifth of internet users in the age group 65 to 75 were part of<br />

a social network.<br />

The growth in both the use of social media as well as the information<br />

collated, processed, and exchanged there has meant an increase<br />

in the consequences of successful cyber attacks through social<br />

media. The interests of privacy, intellectual property, and confidential<br />

information concerning the functioning of the organisation are<br />

at stake if information shared on social media falls into the hands<br />

of people for whom it was not intended. One example is the job<br />

applicant who is turned down because the employer came across<br />

some rather frivolous tweets or photos on Facebook.<br />

Reuters’ Twitter and Wordpress accounts hacked<br />

In the summer of 2012, the Syrian Electronic Army repeatedly<br />

took over Twitter [8] and Wordpress accounts from the press<br />

agency Reuters and then posted inaccurate reports about the<br />

conflict in Syria and the welfare of foreign politicians. [9]<br />

Rising cloud use<br />

Cloud services are interesting to both companies and governments<br />

as well as to citizens in terms of flexibility, costs, and ease of use.<br />

Employees use online services on their own initiative, for example<br />

for online file sharing such as Yousendit.com, if the company’s<br />

email system does not allow large attachments, or Dropbox to save<br />

and share files with colleagues or <strong>third</strong> parties outside the organisation.<br />

As a result, both personal and company data are increasingly<br />

being stored in the cloud. Mobile solutions further facilitate this<br />

process by enabling users to exchange data easily between devices<br />

and keep them safe in the cloud where they will not be lost.<br />

Increased use of the cloud is reducing dependency on <strong>third</strong> parties.<br />

After all, attacks on cloud services also affect the people who have<br />

placed their own information in the cloud. On the other hand,<br />

it also offers smaller organisations with less security expertise the<br />

opportunity to achieve a higher level of security at an acceptable<br />

cost by working with a supplier who is better at it.<br />

Given the risks of cloud computing, the Cabinet has elected<br />

to set up and manage its own closed Government cloud as a facility<br />

to provide generic services in the Government. [10]<br />

‘Big data gets bigger’<br />

Big data (for example in consumer marketing, business services,<br />

investigation services, and financial transactions) is the concern<br />

of large information processors and technology suppliers, and the<br />

use of big data technologies is therefore also expected to rise.<br />

Compiling large data collations of personal details can put privacy<br />

at risk. Furthermore, large data files in themselves form a new,<br />

susceptible interest for organisations, and in some cases possibly<br />

for society too. After all, the data file represents value to malicious<br />

people who can use the data to attack <strong>third</strong> parties, such as in the<br />

case of identity fraud. However the question is whether the owner<br />

of the big data is always aware of the risks and prepared to implement<br />

the measures necessary to protect <strong>third</strong>-party interests.<br />

Growth in online transactions by citizens<br />

Citizens are increasingly using the online channel. As a result, the<br />

use of and turnover generated by online shops in the <strong>Netherlands</strong><br />

continues to rise, reaching 9.8 billion euro in 2012 (+ 9 per cent<br />

compared with 2011). [11] The <strong>Netherlands</strong> is one of Europe’s<br />

frontrunners in terms of the percentage of the population that<br />

sometimes shops online. [12] There is growing interest in the online<br />

channel in the gaming industry too (led by young people) and in<br />

terms of turnover this is expected to exceed the worldwide physical<br />

sales during 2013. [13]<br />

In addition, the Dutch are relatively high users of internet banking<br />

(82 per cent of all internet users). The use of internet banking has<br />

risen considerably across all age groups in recent years according<br />

to figures from Statistics <strong>Netherlands</strong> (CBS). [3: CBS 2012] Around seven<br />

out of ten Dutch people aged 12 and above regularly dealt with their<br />

banking matters on the internet last year. The rise in online transactions<br />

is resulting in an increase in the economic impact of<br />

IT disruptions and cyber attacks. Key here is citizens’ trust in the<br />

reliability of online facilities (chain interests).<br />

Digital identity<br />

In part due to the increasing use of online transactions for<br />

shopping, banking, and government services, the digital identity<br />

of citizens and of government and private sector workers has<br />

become an interest in its own right. To anyone with malicious<br />

intentions, this digital identity represents the key to sensitive data,<br />

money, and useful services. If identity cannot be sufficiently<br />

safeguarded, the individual interests of citizens and the interests<br />

of organisations are compromised.<br />

8 http://www.reuters.com/article/2012/08/06/<br />

net-us-reuters-syria-hacking-idUSBRE8721B420120806<br />

9 http://www.bbc.co.uk/news/technology-19280905<br />

10 http://www.rijksoverheid.nl/bestanden/documenten-en-publicaties/kamerstukken/<br />

2011/04/20kamerbrief-over-cloud-computing/kamerbrief-over-cloud-computing.pdf<br />

11 http://www.thuiswinkel.org/groei-online-markt-9-naar-98-miljard-ondanks-recessie<br />

12 TNO 2013, based on 2011 figures from Eurostat.<br />

13 PwC, Global Entertainment & Media Outlook 2012-2016, 2012. Supplemented by the Dutch<br />

situation in http://www.marketingfacts.nl/berichten/<br />

in-2013-meer-online-gamers-dan-console-gamers<br />

19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!