Download as pdf or txt
Download as pdf or txt
You are on page 1of 4

Cyber Crime Effects to

Businesses in Philippines
Adrian John V. Balarbar Paulo Lorenzo Macaraeg
Taguig City, Philippines Taguig City, Philippines
avbalarbar@student.apc.edu.ph rlmacaraeg@student.apc.edu.ph

Victor Manuel P. Serrano Kyle Rafael F. Sulabo


Taguig City, Philippines Taguig City, Philippines
vpserrano@student.apc.edu.ph kfsulabo@student.apc.edu.ph

Abstract—Recently, there are many issues happening about conduct of the Philippine government towards cybercrime
cybercrime in which causes a lot of loss of data. Usually, business contributes to further more problems. The reactive conduct of
companies and political networks experience cyberattacks and the Philippine officials is said to be a matter of concern from
based on the research [3], countries that are vulnerable in investors. [2] Furthermore, while there is a Philippine Computer
cyberattack are the ASEAN countries, especially Philippines which
Emergency Response Team (PHCERT), their services are not
receives continuous threats based on the advanced threat report of
the FireEye Inc. [3] Based on the amount of percentage of APT sufficient as a measure against the problem. A proactive
attacks in 2013, the most vulnerable are government sites and approach towards the problem is needed to ease the concerns of
business process outsourcing firms where the percentage is 19.8. [3] the investors with regards to IT. [2] In this paper, the focus would
Foreign companies and investors became ambiguous because the be about the effects of cyber terrorism/crime onto the businesses
country’s reputation decreases slowly as it goes and may lead to in the Philippines.
lower sales and mistrust [4]. One of the bank in the Philippines is
which is the Rizal Commercial Banking Corporation popularly The research aims to identify the sources of such attacks, means
known as RCBC has the right to store money of people and
and motives. Additionally, the researchers limit the scope of the
business for savings and lending money and is licensed by Bangko
Sentral ng Pilipinas (BSP), last February 2016, with the use of document towards the Philippines and the businesses present at
SWIFT, hackers had heisted dangling 81 million US Dollars from the country that incorporate IT with its process.
a Bangladesh’s bank account in the Federal Reserve Bank of New
York [5].
Any analysis derived from the research can be helpful for
Keywords: Cybercrime, Data, Threats, Attack, APT, Business, other researchers looking for information about what common
Government approaches a malicious groups or persons do perform against
businesses, what preventive or diminution maneuvers should be
I. INTRODUCTION performed.
The Philippine government encourages further development II. PROBLEM STATEMENT
of Information Technology (IT) related services within the
Cybercrime is a method of attacking that comprises of any
country, since it was regarded as the next haven of economic
illegal pursuit with use of any technology [10] such as hacking,
opportunities. It is said that the growth rate of the Information
theft, child solicitation and identity theft. [11] Cyberterrorism
Technology and Business Process Management (IT-BPM) and
can be also classified as cybercrime. Its main goal is to steal or
global in-house center (GIC) are 30 percent annually, more than
expose confidential data and to cause fear [10] to any targeted
the average rate of the global competitors. [1] Throughout time
individual, property or government. [11] To classify any actions
passed. the industries and services available in the Philippines
or happenings as a cybercrime, it is important to know the
matures and as the growth continues, there is roughly a bold
motive why the incident happened. Cybercrimes could be
estimate of 25 billion US dollars in revenue and 1.5 million
classified into three types: (1) Computer-assisted crime, when
direct hires this 2016 alone. [1] The presented figures clearly
computers are used as a medium to perpetrate a crime. (2)
show the importance of IT to Philippine economic growth.
Computer-targeted crime, whereas criminals commit crime with
computers as prime target. (3) Computer-incidental crime, when
As the IT related sector grows, various problems arise with
the use of computers in perpetrating a crime just happened to be
it. Additionally, complications caused by slow and reactionary
used and not used as main instrument for the crime.
Businesses and political networks are often struck by presents the severity of the situation. The statistical results of
cyberattacks. These attacks are classified as Advanced attacks above present the values of how much businesses with
Persistent Threats (APT). [3] APT is a kind of attack where the relation to IT must endure to perform transactions in the
perpetrators maintain constant access to the targeted system. [17] country. In addition, with loopholes or not, the fact that the
ASEAN countries are known for being vulnerable when it Philippine laws could be easily exploited to serve misdeeds of
comes to cyberattack threats where the Philippines is the most others is a clear message that the Philippine government and all
vulnerable and receives a high number of continuous threats of the affected stakeholders should work together to eliminate
based on FireEye Incorporation’s advanced threat report, a or at least mitigate the damages caused by cybercrime incidents.
United States network security firm. [3] Also, the report [8]

indicated that Hussarini and Page which are malware families


are present and running in the Philippines. The report stated that III. RESULTS AND DISCUSSION
in the industry, APT attacks in 2013 are in 19.8 percent of
business process outsourcing firms which were services, Technology always progresses by leaps and bounds. Though
consulting and value added reselling, 13.5 percent of progress is good in all, the criminals had always caught up with
government sites, 10.2 percent of media and hospitals, 13 technology’s phase better than the Philippine authorities, and
percent of high technology and 9.2 percent of most businesses. The slow adaptation of new technologies by
telecommunications. [3] most businesses and the reactionary approach of the Philippine
government toward incidents have significant effects with the
Based on the percentages, business process outsourcing firms present dilemmas faced by both entities. Businesses in this
and government sites in the Philippines are most vulnerable to digital age should protect itself by limiting any substantial data
APT. Many problems arise because of the threats that creates a that could be exploited for an attack.
major impact. Since the businesses and political networks in the
Philippines are highly known for being the most vulnerable to This study aims to look on measures for how a business
APT [3], the country’s reputation decreases which causes foreign should protect against cybercrime. The results and discussions
companies and investors to be uncertain that may lead to will focus more about businesses. The stance of most solutions
mistrust and lower sales. [4] will emphasize proactive approach to mitigate the threats. A
business must assume that the Philippine government could not
be relied upon in actively protecting their interests with relations
Rizal Commercial Banking Corporation (RCBC) is licensed to IT. Some solutions that can be implemented are Logical
and authorized by the Bangko Sentral ng Pilipinas (BSP) to Access Controls, Acceptable Use Policy, Separation of Duties,
acquire money from people and businesses and to lend money. Due Care and Due Diligence, Employee Treatment, Personnel
In February 2016, 81 million US dollars was heisted by hackers Training.
from Bangladesh’s bank account in the Federal Reserve Bank
of New York with the use of SWIFT [5], an international system In Logical Access Control (LAC), an organization must
of wired cash transfer and can be transferred only from and to properly limit the authority and accessibility of every business
financial establishments. [6] The hackers used multitudes personnel on every file o business resource. The organization
financial pathways to transfer the money. Eventually, the must properly implement an identification and authentication
hackers used its cohorts in the Philippines to create bank system to ensure that access limits thoroughly applied on a
accounts in RCBC and manage the cash movement. [7] Once the personnel level. [9] The identification and authentication scheme
transfer is complete, the money is withdrawn in cash and can complement any existing physical controls for a more rigid
converted I into casino chips as to make the money untraceable security of the protected data. [9] Business administrators could
since Philippine laws against money laundering does not cover designate roles, manage personnel, and create Access Control
casinos therefore making the authorities unable to onto these Lists (ACL) more flexibly using LAC since the responsibilities
gambling institutions. [8] of each employee are limited to the access provisions (the ACL)
placed by the management. [9] Logical Access Control, although
The Bangladesh heist evidently shows the vulnerability of the may sound good, could only be efficiently be applied onto large
existing Philippine laws, money related firms, and the organizations or groups that had a complex hierarchy and
government against highly organized crime. [8] The incident also require a sophisticated management. [9] LAC helps to efficiently
allows us to see that cybercrime could be utilized as one of the designates roles and control the data access of each user in the
processes to create a complex yet grander evil schemes. Thus, system. This management is not recommended to small
the reputation of the Philippines plummets these evil schemes businesses, which such complexity is not need. This
making an unending spiral of distrust which makes business management scheme will only incur losses to the small
opportunists to shy away and make the economy slow down. organization if implemented. [9]

There are still more problems that could be incorporated to An Acceptable Use Policy (AUP) can be used to establish
the paper. However, the problems stated above evidently constraints for a user to agree on to access data, networks and
internet provided by an organization. [12] It is a manifest of what IV. CONCLUSION AND RECOMMENDATION
are conducts that are acceptable when pertaining to the use of
the organization’s resources. With the use of AUP, there is an In safeguarding business, one should have a full grasp of all
assurance for an organization that implements the policy activities happening in the whole organization. This is true, both
because users who agreed with the privilege to access the in past and future to come. However, till now the as the business
network can be tracked, especially when there is a user that becomes more modern and competitive there are always risks
violated the policy. Organizations can detect any malicious acts that businesses could be sabotaged or wrongly manipulated for
that contradict to the rules and policies provided. a lot of reasons. Large or small, all business can be affected from
the misfortune of others. All businesses should be responsible
Separation of Duties refer to the importance of making each to each of its own wellbeing and should proactively think of
process in an organization separate. There should be no one that methods to improve its own Information Security.
could conduct business transactions alone. It can be helpful for
an organization to separate the duties and accesses of employees Information security is not solely about computers, it is
to prevent problems like fraud and exposure of confidential about how you manage to safeguard your organizational against
information since the intellectual property of an organization is internal and external threats that could endanger the stability or
highly prioritized [13] and must not be given to the wrong hands. existence of the business. Threats are always looking for worse
Employees must be reminded what are their tasks and privileges opportunities to strike. In our views, there is always a clouded
depending on their position. line between cybercrime and cyberterrorism. Every cybercrime
should be considered as cyberterrorism since it places many
Due Care is the efforts of an organization to prevent or people, every stakeholder, at risk and terror. The Philippine
mitigate consequences of neglect of any possible risk present authorities could only react when an incident happened. [2]
and indicates the level of judgment, prudence, care, The case study therefore concludes that businesses should
determination while Due Diligence are about upholding proactively improve not only its information security, but also
standards and actions conducting an intensive investigation that towards its organizational security.
are acceptable with the current laws. [16] Prevention or
elimination of risks heightens the security of an organization
The security recommendations that the authors will advise
because it detects risks and problems that needs action. It also depends on the various state and situations that a business have
gives an organization sufficient time to prepare and establish
now or anticipate on future. There are some recommendations
possible actions for a certain risk that may happen. that could be enforced to any type of business: (1) Acceptable
Use Policy, this could be used to enforce security responsibility
Employee Treatment refers to the methods of how the since it could be used as a proof or evidence against the
company would avoid unwanted employee’s outrage. It refers employee if neglected and defense of the company that there is
on how a company can manage all their employees to avoid loss Due Care if an unfortunate incident happened. (2) Separation
of interest in the job and unsatisfaction of the employees. Good of Duties, it is important, and applicable to all kinds of
communication is the key to success. [14] It gives a company an organizations. It can be used to divide work and prevent an
assurance that there will be no conflicts or anomalies because abuse of power or privileges. (3) Due Care and Due Diligence,
the employees do their jobs properly due to the proper treatment it is important to uphold what is required by the law, and be
to them. Employee treatment goes a long way because it can cautious of every move for the effects or consequences of
eliminate a problem like inside jobs because there is no need for whatever action an organization may take. (4) Lastly, Personnel
an employee to access and expose confidential data because the Training, it is important to equip every employee knowledge
company is treating them properly. Briefly, it is not giving the how to deal and prevent security risks that may in turn affect the
employees motives or reasons to perpetrate a crime against the wellbeing of the whole company.
organization.

Personnel Training refers to making the business personnel


more aware of the importance of information security. REFERENCES
Emphasize that the personnel also bear some security [1]
“2012-2016 Philippine IT-BPM road map,” 2011.
responsibilities to the organization they belong. It is the process [Online]. Available: http://dict.gov.ph/2012-2016-
of educating and orienting new employees in the workplace. this philippine-itbpm-road-map/. Accessed: Oct. 29, 2016.
action of training correlates with entry-level education that
helps new employees to prepare for their assigned tasks. [15] [2]
B. P. Corporation, “BusinessWorld | Cybercrimes affect
Organizations benefit when implementing a personnel training business confidence in PHL: Fortinet,” 2015. [Online].
because the personnel have a background on how their tasks Available:
flow and what are their rules and restriction when inside the http://www.bworldonline.com/content.php?section=Tech
workplace. It decreases anomalies since all personnel are nology&title=cybercrimes-affect-business-confidence-
wellinformed and prevents data loss or exposure. inphl-fortinet&id=111924. Accessed: Oct. 29, 2016.
[14]
S. M. Heathfield, "How (and why) to Foster Employee
[3]
A.-C. News, “Philippines most exposed to cyber attack satisfaction," in The Balance, The Balance, 2016. [Online].
threats - report | ABS-CBN news,” in Business, ABS-CBN Available:
News, 2014. [Online]. Available: https://www.thebalance.com/employeesatisfaction-
http://news.abscbn.com/business/08/15/14/philippines- 1918014. Accessed: Oct. 29, 2016.
most-exposedcyber-attack-threats-report. Accessed: Oct. [15]
“What is personnel training?,” wiseGEEK, 2016. [Online].
29, 2016. Available: http://www.wisegeek.com/what-is-
personneltraining.htm. Accessed: Oct. 29, 2016.
[4]
M. Beauchamp and studio D, “The disadvantages of bad [16]
USLegal, "Due care law & legal definition," in USLegal,
publicity,”. [Online]. Available: 2001. [Online]. Available:
http://yourbusiness.azcentral.com/disadvantages- http://definitions.uslegal.com/d/due-care/. Accessed: Oct.
badpublicity-3495.html. Accessed: Oct. 29, 2016. 29, 2016.
[5]
C. D. Paz, “TIMELINE: Tracing the $81-million stolen [17]
Posted and M. Rouse, "What is advanced persistent threat
fund from Bangladesh bank,” Rappler, 2016. [Online]. (APT)? - definition from WhatIs.com," SearchSecurity,
Available: 2010. [Online]. Available:
http://www.rappler.com/business/industries/banking- http://searchsecurity.techtarget.com/definition/advancedpe
andfinancial-services/125999-timeline-money- rsistent-threat-APT. Accessed: Nov. 4, 2016.
launderingbangladesh-bank. Accessed: Oct. 29, 2016.
[6]
S. Seth, “How the SWIFT system works,” Investopedia,
2015. [Online]. Available:
http://www.investopedia.com/articles/personalfinance/05
0515/how-swift-system-works.asp. Accessed: Oct. 29,
2016.
[7]
T. M. Times, “Uncomfortable truths about the RCBC
scandal - the manila times online,” in Business, The Manila
Times Online, 2016. [Online]. Available:
http://www.manilatimes.net/uncomfortable-truths-
aboutthe-rcbc-scandal/251287/. Accessed: Oct. 29, 2016.
[8]
C. Larano, “A hole in the global money-laundering
defense:
Philippine casinos,” wsj.com, 2016. [Online]. Available:
http://www.wsj.com/articles/quest-for-stolenbangladeshi-
funds-leads-to-philippine-casinos1458324994. Accessed:
Oct. 29, 2016.
[9]
“Logical access control,” 1989. [Online]. Available:
http://securityv.isu.edu/isl/hk_acces.html. Accessed: Oct.
29, 2016.
[10]
M. Kurnava, “Cyber-crime v Cyber-terrorism: What is the
difference?”, Linkedin, 2016. [Online]. Available:
https://www.linkedin.com/pulse/cyber-crime-v-
cyberterrorism-what-difference-matthew-kurnava.
Accessed: Oct. 29, 2016.
[11]
“Cyber Crime”, Cross Domain Solutions. [Online].
Available:
http://www.crossdomainsolutions.com/cybercrime/.
Accessed: Oct. 29, 2016.
[12]
“Acceptable Use Policy” WhatIs. Available:
http://whatis.techtarget.com/definition/acceptable-
usepolicy-AUP. Accessed: Oct. 29, 2016.
[13]
“Separation of Duties in Information Technology” SANS.
[Online]. Available:
http://www.sans.edu/research/security-
laboratory/article/it-separation-duties. Accessed: Oct. 29,
2016

You might also like