SlideShare a Scribd company logo
Topic 1: Advanced and Persistent Threats
One of the biggest risks that companies face is advanced
persistent threats. Discuss the most effective way to implement
policies that mitigate the chance of an insider either taking part
in or facilitating an advanced persistent threat. What policies
can help manage the insider threat for an organization’s supply-
chain companies, or the organization’s off-shore contractors?
Integrate the concept of separation of duties into your
discussion.
Background:
1. Notional Supply Chain Risk Management Practices for
Federal Information Systems [2012, NIST - note that the term
"insider threat" is not used in the document, but multiple
practices are outlined for controlling risks posed by personnel).
2. The Risk of Insider Fraud: Second Annual Study [2013,
Ponemon - not specifically supply-chain related, but a detailed
overview of the current understanding of the risk posed to
enterprises by insider threats generally]
3. Cybersecurity: An Examination of the Communications
Supply Chain [2013 - video / transcript of Congressional
hearing examining multiple aspects of this topic
INSERT References
Topic 2: Mandiant Report
On Feb. 19, 2013 Mandiant released a report alleging that a
specific Chinese military unit is behind one of the largest cyber
espionage and attack campaigns aimed at American
infrastructure and corporations. Public understanding of
Advanced Persistent Threats (APT) is weak, attribution remains
difficult, and cyberattacks are often dismissed as criminal or
peripheral to national security. This carefully-researched report
is significant because it convincingly and publicly assigns
attribution for ongoing cyber espionage to groups supported by
China. By publishing, Mandiant hopes that --
(a) this report will lead to increased understanding and
coordinated action in countering APT network breaches; and
(b) its resulting exposure and discussion may thwart APT
activities.
After reading the article at the link below and perusing the
Mandiant report, discuss whether Mandiant’s two desired
outcomes above are likely to occur.
Background:
NYT summary:
http://ezproxy.umuc.edu/login?url=http://search.proquest.com/d
ocview/1288537806?accountid=14580
NPR audio: http://www.npr.org/2013/02/19/172431535/report-
chinese-government-hackers-behind-dozens-of-attacks-on-u-s-
companies
INSERT References

More Related Content

Similar to Topic 1  Advanced and Persistent ThreatsOne of the biggest risks .docx

Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationrrepko
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
CSCJournals
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
FireEye, Inc.
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
hartrobert670
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
CMR WORLD TECH
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
healdkathaleen
 
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
greendigital
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
greendigital
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Dr Lendy Spires
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Trend Micro
 
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEMINSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
ijsc
 
Insider Threat Prevention in the US Banking System
Insider Threat Prevention in the US Banking SystemInsider Threat Prevention in the US Banking System
Insider Threat Prevention in the US Banking System
ijsc
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportDivya Kothari
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
stilliegeorgiana
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
bagotjesusa
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
felicidaddinwoodie
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
Trend Micro
 
Cyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paperCyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paper
Microsoft
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
sulu98
 

Similar to Topic 1  Advanced and Persistent ThreatsOne of the biggest risks .docx (19)

Improved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperationImproved-Cybersecurity-cooperation
Improved-Cybersecurity-cooperation
 
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
Contemporary Cyber Security Social Engineering Solutions, Measures, Policies,...
 
M-Trends® 2010: The Advanced Persistent Threat
 M-Trends® 2010: The Advanced Persistent Threat M-Trends® 2010: The Advanced Persistent Threat
M-Trends® 2010: The Advanced Persistent Threat
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
 
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
Fortifying the Digital Fortress: A Comprehensive Guide to Cybersecurity Solut...
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
 
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
 
Countering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep DiscoveryCountering the Advanced Persistent Threat Challenge with Deep Discovery
Countering the Advanced Persistent Threat Challenge with Deep Discovery
 
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEMINSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
INSIDER THREAT PREVENTION IN THE US BANKING SYSTEM
 
Insider Threat Prevention in the US Banking System
Insider Threat Prevention in the US Banking SystemInsider Threat Prevention in the US Banking System
Insider Threat Prevention in the US Banking System
 
JPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment ReportJPMorgan Chase & Co. -Risk Assessment Report
JPMorgan Chase & Co. -Risk Assessment Report
 
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docxProject 4 Threat Analysis and ExploitationTranscript (backgroun.docx
Project 4 Threat Analysis and ExploitationTranscript (backgroun.docx
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx1Running head CYBERWARCYBER WAR9Outstanding title.docx
1Running head CYBERWARCYBER WAR9Outstanding title.docx
 
The Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted AttacksThe Custom Defense Against Targeted Attacks
The Custom Defense Against Targeted Attacks
 
Cyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paperCyber Security Conference - Trustworthy computing cybersecurity white paper
Cyber Security Conference - Trustworthy computing cybersecurity white paper
 
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdfControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
ControlsforProtectingCriticalInformationInfrastructurefromCyberattacks (1).pdf
 

More from amit657720

Organizational Analysis  Write a 5-7-page paper on a conflict th.docx
Organizational Analysis  Write a 5-7-page paper on a conflict th.docxOrganizational Analysis  Write a 5-7-page paper on a conflict th.docx
Organizational Analysis  Write a 5-7-page paper on a conflict th.docx
amit657720
 
Organizational BehaviorThe field of organizational behavior ca.docx
Organizational BehaviorThe field of organizational behavior ca.docxOrganizational BehaviorThe field of organizational behavior ca.docx
Organizational BehaviorThe field of organizational behavior ca.docx
amit657720
 
Organizational behavior is the combination of four areas of study—ps.docx
Organizational behavior is the combination of four areas of study—ps.docxOrganizational behavior is the combination of four areas of study—ps.docx
Organizational behavior is the combination of four areas of study—ps.docx
amit657720
 
Organizational CommunicationPeople in this organization don’t.docx
Organizational CommunicationPeople in this organization don’t.docxOrganizational CommunicationPeople in this organization don’t.docx
Organizational CommunicationPeople in this organization don’t.docx
amit657720
 
Organizational Culture Edgar H. Schein I I I I II I II .docx
Organizational Culture Edgar H. Schein I I I I II I II .docxOrganizational Culture Edgar H. Schein I I I I II I II .docx
Organizational Culture Edgar H. Schein I I I I II I II .docx
amit657720
 
Organizational culture is so ubiquitous that it affects all area.docx
Organizational culture is so ubiquitous that it affects all area.docxOrganizational culture is so ubiquitous that it affects all area.docx
Organizational culture is so ubiquitous that it affects all area.docx
amit657720
 
OracleFIT5195-2-Star Schema.pdfWeek 2 – Star SchemaSe.docx
OracleFIT5195-2-Star Schema.pdfWeek 2 – Star SchemaSe.docxOracleFIT5195-2-Star Schema.pdfWeek 2 – Star SchemaSe.docx
OracleFIT5195-2-Star Schema.pdfWeek 2 – Star SchemaSe.docx
amit657720
 
Oral PresentationPlease pick (1) one of the following topics.docx
Oral PresentationPlease pick (1) one of the following topics.docxOral PresentationPlease pick (1) one of the following topics.docx
Oral PresentationPlease pick (1) one of the following topics.docx
amit657720
 
Option A.  You are a student at a New York City college in Septe.docx
Option A.  You are a student at a New York City college in Septe.docxOption A.  You are a student at a New York City college in Septe.docx
Option A.  You are a student at a New York City college in Septe.docx
amit657720
 
Order #12087Type of serviceWriting from ScratchWork type.docx
Order #12087Type of serviceWriting from ScratchWork type.docxOrder #12087Type of serviceWriting from ScratchWork type.docx
Order #12087Type of serviceWriting from ScratchWork type.docx
amit657720
 
ORAL PRESENTATION( POWER POINT ) 12 SLICES . use the Manual of Menta.docx
ORAL PRESENTATION( POWER POINT ) 12 SLICES . use the Manual of Menta.docxORAL PRESENTATION( POWER POINT ) 12 SLICES . use the Manual of Menta.docx
ORAL PRESENTATION( POWER POINT ) 12 SLICES . use the Manual of Menta.docx
amit657720
 
Organizational change initiatives are a team effort. It is the j.docx
Organizational change initiatives are a team effort. It is the j.docxOrganizational change initiatives are a team effort. It is the j.docx
Organizational change initiatives are a team effort. It is the j.docx
amit657720
 
Organizational Behavior OpenStax Rice Univer.docx
Organizational Behavior OpenStax Rice Univer.docxOrganizational Behavior OpenStax Rice Univer.docx
Organizational Behavior OpenStax Rice Univer.docx
amit657720
 
Organisms Causing Systemic MycosesObjectives -.docx
Organisms Causing Systemic MycosesObjectives   -.docxOrganisms Causing Systemic MycosesObjectives   -.docx
Organisms Causing Systemic MycosesObjectives -.docx
amit657720
 
Option 2Several artists created multiple self-portraits. Select.docx
Option 2Several artists created multiple self-portraits. Select.docxOption 2Several artists created multiple self-portraits. Select.docx
Option 2Several artists created multiple self-portraits. Select.docx
amit657720
 
Option 1 Media and Mental IllnessFind a source of informa.docx
Option 1 Media and Mental IllnessFind a source of informa.docxOption 1 Media and Mental IllnessFind a source of informa.docx
Option 1 Media and Mental IllnessFind a source of informa.docx
amit657720
 
Option 1 Thought about a child who is dying. Is a death of a chil.docx
Option 1 Thought about a child who is dying. Is a death of a chil.docxOption 1 Thought about a child who is dying. Is a death of a chil.docx
Option 1 Thought about a child who is dying. Is a death of a chil.docx
amit657720
 
Option One—The Odyssey  For the first option, focused solely on.docx
Option One—The Odyssey  For the first option, focused solely on.docxOption One—The Odyssey  For the first option, focused solely on.docx
Option One—The Odyssey  For the first option, focused solely on.docx
amit657720
 
Option 1Right to Counsel PresentationAnalyze two case.docx
Option 1Right to Counsel PresentationAnalyze two case.docxOption 1Right to Counsel PresentationAnalyze two case.docx
Option 1Right to Counsel PresentationAnalyze two case.docx
amit657720
 
Option 2 Art Select any 2 of works of art about the Hol.docx
Option 2 Art Select any 2 of works of art about the Hol.docxOption 2 Art Select any 2 of works of art about the Hol.docx
Option 2 Art Select any 2 of works of art about the Hol.docx
amit657720
 

More from amit657720 (20)

Organizational Analysis  Write a 5-7-page paper on a conflict th.docx
Organizational Analysis  Write a 5-7-page paper on a conflict th.docxOrganizational Analysis  Write a 5-7-page paper on a conflict th.docx
Organizational Analysis  Write a 5-7-page paper on a conflict th.docx
 
Organizational BehaviorThe field of organizational behavior ca.docx
Organizational BehaviorThe field of organizational behavior ca.docxOrganizational BehaviorThe field of organizational behavior ca.docx
Organizational BehaviorThe field of organizational behavior ca.docx
 
Organizational behavior is the combination of four areas of study—ps.docx
Organizational behavior is the combination of four areas of study—ps.docxOrganizational behavior is the combination of four areas of study—ps.docx
Organizational behavior is the combination of four areas of study—ps.docx
 
Organizational CommunicationPeople in this organization don’t.docx
Organizational CommunicationPeople in this organization don’t.docxOrganizational CommunicationPeople in this organization don’t.docx
Organizational CommunicationPeople in this organization don’t.docx
 
Organizational Culture Edgar H. Schein I I I I II I II .docx
Organizational Culture Edgar H. Schein I I I I II I II .docxOrganizational Culture Edgar H. Schein I I I I II I II .docx
Organizational Culture Edgar H. Schein I I I I II I II .docx
 
Organizational culture is so ubiquitous that it affects all area.docx
Organizational culture is so ubiquitous that it affects all area.docxOrganizational culture is so ubiquitous that it affects all area.docx
Organizational culture is so ubiquitous that it affects all area.docx
 
OracleFIT5195-2-Star Schema.pdfWeek 2 – Star SchemaSe.docx
OracleFIT5195-2-Star Schema.pdfWeek 2 – Star SchemaSe.docxOracleFIT5195-2-Star Schema.pdfWeek 2 – Star SchemaSe.docx
OracleFIT5195-2-Star Schema.pdfWeek 2 – Star SchemaSe.docx
 
Oral PresentationPlease pick (1) one of the following topics.docx
Oral PresentationPlease pick (1) one of the following topics.docxOral PresentationPlease pick (1) one of the following topics.docx
Oral PresentationPlease pick (1) one of the following topics.docx
 
Option A.  You are a student at a New York City college in Septe.docx
Option A.  You are a student at a New York City college in Septe.docxOption A.  You are a student at a New York City college in Septe.docx
Option A.  You are a student at a New York City college in Septe.docx
 
Order #12087Type of serviceWriting from ScratchWork type.docx
Order #12087Type of serviceWriting from ScratchWork type.docxOrder #12087Type of serviceWriting from ScratchWork type.docx
Order #12087Type of serviceWriting from ScratchWork type.docx
 
ORAL PRESENTATION( POWER POINT ) 12 SLICES . use the Manual of Menta.docx
ORAL PRESENTATION( POWER POINT ) 12 SLICES . use the Manual of Menta.docxORAL PRESENTATION( POWER POINT ) 12 SLICES . use the Manual of Menta.docx
ORAL PRESENTATION( POWER POINT ) 12 SLICES . use the Manual of Menta.docx
 
Organizational change initiatives are a team effort. It is the j.docx
Organizational change initiatives are a team effort. It is the j.docxOrganizational change initiatives are a team effort. It is the j.docx
Organizational change initiatives are a team effort. It is the j.docx
 
Organizational Behavior OpenStax Rice Univer.docx
Organizational Behavior OpenStax Rice Univer.docxOrganizational Behavior OpenStax Rice Univer.docx
Organizational Behavior OpenStax Rice Univer.docx
 
Organisms Causing Systemic MycosesObjectives -.docx
Organisms Causing Systemic MycosesObjectives   -.docxOrganisms Causing Systemic MycosesObjectives   -.docx
Organisms Causing Systemic MycosesObjectives -.docx
 
Option 2Several artists created multiple self-portraits. Select.docx
Option 2Several artists created multiple self-portraits. Select.docxOption 2Several artists created multiple self-portraits. Select.docx
Option 2Several artists created multiple self-portraits. Select.docx
 
Option 1 Media and Mental IllnessFind a source of informa.docx
Option 1 Media and Mental IllnessFind a source of informa.docxOption 1 Media and Mental IllnessFind a source of informa.docx
Option 1 Media and Mental IllnessFind a source of informa.docx
 
Option 1 Thought about a child who is dying. Is a death of a chil.docx
Option 1 Thought about a child who is dying. Is a death of a chil.docxOption 1 Thought about a child who is dying. Is a death of a chil.docx
Option 1 Thought about a child who is dying. Is a death of a chil.docx
 
Option One—The Odyssey  For the first option, focused solely on.docx
Option One—The Odyssey  For the first option, focused solely on.docxOption One—The Odyssey  For the first option, focused solely on.docx
Option One—The Odyssey  For the first option, focused solely on.docx
 
Option 1Right to Counsel PresentationAnalyze two case.docx
Option 1Right to Counsel PresentationAnalyze two case.docxOption 1Right to Counsel PresentationAnalyze two case.docx
Option 1Right to Counsel PresentationAnalyze two case.docx
 
Option 2 Art Select any 2 of works of art about the Hol.docx
Option 2 Art Select any 2 of works of art about the Hol.docxOption 2 Art Select any 2 of works of art about the Hol.docx
Option 2 Art Select any 2 of works of art about the Hol.docx
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 

Recently uploaded (20)

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 

Topic 1  Advanced and Persistent ThreatsOne of the biggest risks .docx

  • 1. Topic 1: Advanced and Persistent Threats One of the biggest risks that companies face is advanced persistent threats. Discuss the most effective way to implement policies that mitigate the chance of an insider either taking part in or facilitating an advanced persistent threat. What policies can help manage the insider threat for an organization’s supply- chain companies, or the organization’s off-shore contractors? Integrate the concept of separation of duties into your discussion. Background: 1. Notional Supply Chain Risk Management Practices for Federal Information Systems [2012, NIST - note that the term "insider threat" is not used in the document, but multiple practices are outlined for controlling risks posed by personnel). 2. The Risk of Insider Fraud: Second Annual Study [2013, Ponemon - not specifically supply-chain related, but a detailed overview of the current understanding of the risk posed to enterprises by insider threats generally] 3. Cybersecurity: An Examination of the Communications Supply Chain [2013 - video / transcript of Congressional hearing examining multiple aspects of this topic INSERT References Topic 2: Mandiant Report On Feb. 19, 2013 Mandiant released a report alleging that a specific Chinese military unit is behind one of the largest cyber espionage and attack campaigns aimed at American infrastructure and corporations. Public understanding of Advanced Persistent Threats (APT) is weak, attribution remains difficult, and cyberattacks are often dismissed as criminal or peripheral to national security. This carefully-researched report is significant because it convincingly and publicly assigns attribution for ongoing cyber espionage to groups supported by
  • 2. China. By publishing, Mandiant hopes that -- (a) this report will lead to increased understanding and coordinated action in countering APT network breaches; and (b) its resulting exposure and discussion may thwart APT activities. After reading the article at the link below and perusing the Mandiant report, discuss whether Mandiant’s two desired outcomes above are likely to occur. Background: NYT summary: http://ezproxy.umuc.edu/login?url=http://search.proquest.com/d ocview/1288537806?accountid=14580 NPR audio: http://www.npr.org/2013/02/19/172431535/report- chinese-government-hackers-behind-dozens-of-attacks-on-u-s- companies INSERT References