SlideShare a Scribd company logo
1 of 22
Reading and summarizing a research article:
Authors’ last names (year) conducted a study about
________________________. The participants were/the setting
was ___________________________. (New paragraph) The
findings were _____________________________. Discussion.
(Possibly a new paragraph) The authors suggested
_____________________. Discussion.
Students should fill in the blanks with their own words. To copy
directly from the article fails to show comprehension and
considered plagiarism.
To “fill in the blanks”, a student should read the journal article
and pay specific attention to:
Sentence #1- Authors’ last names (year) conducted a study
about _________________.
· Read the Abstract; this will give an overview of the study’s
(article’s) purpose.
· Read the entire article without trying to summarize it.
· Go back and read the Literature Review or Background section
of the article. Toward the end of the section, the authors should
identify gaps in the existing literature and tell the reader how
the current study will fill that gap. The authors will also state
their hypothesis (purpose) at the end of this section.
·
Section #2 - The participants were/the setting was
___________________________.
· Read the Methods section of the paper. In this section, the
authors will describe how the data was collected, who was
included in the sample, and any instruments used.
· A reader might want to consider sample size, demographic
characteristics, or any interesting protocol.
· It is not necessary to report every fact (i.e., 35% of the
participants were male, 71%)
Section #3 - The findings were
_____________________________.
· Read the Findings section of the article.
· Some statistics may be confusing. Pay attention to key words
such as “increased”, “decreased”, “improved”, and “reduced”.
· “No change” may also be considered a significant finding.
· Next, read the Discussion section. The authors will present the
findings in general terms. Section #4 - The authors suggested
_____________________.
· Read the Discussion section and look for comments that the
authors made about the intervention or program such as “Did it
work?” or “Should it be continued?”.
· Look for the author’s critique of why the study did or did not
produce results. Did anything unexpected influence the
findings?
· The author may suggest a future line of research or “next
steps” to improve the body of knowledge.
Additional Considerations:
· A literature review is a summary of what research has been
completed in a topic area; it should be summarized in your own
words.
· Read the entire article first and then go back and take notes.
Jot down notes in your own words. This increases
comprehension as well as decreases the likelihood of
plagiarism.
· The review is written in third person; no “I” or “you”.
· Not every detail or fact needs to be reported. A reader will
obtain a copy of the article if more information is needed.
· Write the literature review in the past tense; the research has
already been completed.
· The article cannot “do”, “find”, or “say” anything. The authors
are the people who conducted the study.
· The above format is a guideline. It may be necessary to change
the verbs or to expand an idea.
On the Top Threats to Cyber Systems
1
The Beacom College of Computer and Cyber Sciences, Dakota
State University, Madison, South Dakota, USA
2
Department of Computing and Information Sciences, Valparaiso
University, Valparaiso, Indiana, USA
e-mail: [email protected], [email protected]
Abstract—The technological innovation of cyber systems and
increase dependence of individuals, societies and nations on
them has brought new, real and everchanging threat
landscapes. In fact, the threats evolving faster than they can be
assessed. The technological innovation that brought ease and
efficiency to our lives, has been met by similar innovation to
take advantage of cyber systems for other gains. More threat
actors are noted to be sponsored by nation-states and the skills
and capabilities of organizations to defend against these
attacks are lagging. This warrants an increase in automation of
threat analysis and response as well as increased adoption of
security measures by at-risk organizations. Thus, to properly
prepare defenses and mitigations to the threats introduced by
cyber, it is necessary to understand these threats. Accordingly,
this paper provides an overview of top cyber security threats in
together with current and emerging trends. The analyses
include general trends in the complexity of attacks, actors, and
the maturity of skills and capabilities of organizations to
defend against attacks. Top threats are discussed with regard
to instances of attacks and strategies for mitigation within the
kill chain. A brief discussion of threat agents and attack
vectors adds context to the threats.
Keywords-cyber security; cyber threats; analysis; kill chain;
mitigation
I. INTRODUCTION
The European Union Agency for Network and
Information Security (ENISA) is a center of expertise in
Europe that was formed in 2004 and is located in Greece
with its seat in Heraklion, Crete and an operational office in
Athens. Within that charge, ENISA seeks to create a culture
of cyber security by assisting the European Union (EU)
member states and organizations to meet security regulations,
through involvement in current and future legislation, and by
analyzing and disseminating cyber threat intelligence (CTI).
To this end, ENISA holds events such as CTI-EU, a
workshop for all European stakeholders in cyber threat
intelligence, and the Cyber Europe Conference. In 2018,
ENISA published the CTI Maturity Model for the purpose of
identifying gaps in Threat Information Sharing (TIS) tools.
The ETL 2018 is the seventh edition of the annual Threat
Landscape report [2]. In addition, ENISA improved
readability and usability of its report and has launched a web
application containing information on the top fifteen cyber
threats encountered in the previous calendar years. The
application is available at [1] and offers intuitive navigation
through relevant information objects.
The ETL 2018 was published for the purpose of
analyzing the top fifteen cyber security threats which
occurred between December 2017 and December 2018. The
document was written in collaboration with the European
Defense Agency (EDA), Computer Emergency Response
Team for EU (CERT-EU), and the European Cyber Crime
Center (EC
3
), and in the context of existing EU policy such
as the Cyber Security Strategy of EU and the Network and
Information Security (NIS) Directive. General trends in the
analysis include an increase in the complexity of attacks.
There was advancement in the hiding of attacks. Attacks
became multipurpose and. Monetization of cyber-crime
through cryptocurrency increased. More actors are noted to
be sponsored by nation-states. The skills and capabilities of
organizations to defend against these attacks are lagging. The
ETL describes the state-of-play in CTI as constantly
evolving with threats evolving faster than they can be
assessed. Further, ENISA notes a maturing in the strategy
and infrastructure of CTI and a need for the sharing of CTI.
Goals include automation of CTI analytics, cyber resilience,
and an increase to CTI skills and capabilities leading to a
multi-layered defense that makes attacks costly and
inefficient [1].
The taxonomy of threats has evolved since the ETL
inception. Earlier editions of the ETL listed targeted attack,
for example, as separate category of threat. Now, a specific
targeted attack might be classified as either phishing or a
Denial of Service (DoS) attack. Cyber espionage did not
appear as a unique threat until the ETL 2015 edition,
coinciding with the increase in state sponsored attacks.
Categories of threat continue to overlap. Ransomware, for
example, is currently evaluated as a separate threat, even
though it is also malware. Mitigation of all cyber threats is
through disruption of the computer security kill chain. The
ETL uses the Lockheed Martin Corporation’s intrusion kill
chain model [7]:
1. Reconnaissance: choose and research target and its
vulnerabilities
2. Weaponization: create a malware weapon tailored
to the vulnerability
3. Delivery: transmit the weapon to the target
4. Exploitation: execute malware code to exploit
vulnerability
5. Installation: access point, “back door” is installed
for use by intruder
6. Command and control: malware allows intruder
access and control of target.
175
2019 IEEE 2nd International Conference on Information and
Computer Technologies
978-1-7281-3322-5/19/$31.00 ©2019 IEEE
Houssain Kettani
1
, Polly Wainwright
1,2
7. Actions on objectives: action is taken to achieve
attack objective
In the next section, we discuss the evolution of the
landscape of cyber threats in this decade and sources of the
threats. In Section III we analyze and explain each of the top
cyber threats per ETL reports and present concluding
remarks in Section IV.
II. EVOLUTIONS IN THE THREAT LANDSCAPE
The top fifteen threats in 2018 were in this order:
Malware, Web-Based Attacks, Web Application Attacks,
Phishing, Denial of Service (DoS), Spam, Botnets, Data
Breaches, Insider Threat, Physical Manipulation/
Damage/Theft/Loss, Information Leakage, Identity Theft,
Cryptojacking, Ransomware and Crypto Espionage. The
annual change in ranking of each cyber threat since 2012 is
summarized in Table I as compiled from the annual ETL
reports [2-6]. In 2018, Cryptojacking was introduced to the
list and exploit kits was dropped [2]. The latter was dropping
constantly in rank each year since it was at the fourth place
in 2012 and 2013. Some of the top cyber threats belong to
same distinct threat category. For example, Ransomware and
Cryptojacking are a specialization of the threat type Malware.
Likewise, Identity Theft is a special category of Data Breach.
Nonetheless, the overlapping threats are handled separately
because the threat is launched by special malicious artefacts.
The top fifteen threats in 2017 have been the same top
fifteen threats since 2014, although some order and trending
have changed [1-6]. The top three threats have remained
consistent since 2012, namely Malware, Web-based and
Web Application Attacks. Insider threat was not recognized
as a distinct type of threat until 2013 while Cyber Espionage
was not recognized until 2014. Position ranking was based
on the number of incidents, impact, and relationship to other
threats. A trend up indicates an increase in incidents but
perhaps not an increase in rank. Table 1 shows the increased
ranks of Phishing and Spam attacks as well as the decreased
rank of Exploit Kit attacks which eventually exited the top
fifteen threat list in 2018. The analyzed threat data are in the
public domain, specifically from the Open Source Threat
Intelligence Platform & Open Standards for Threat
Information Sharing [8].
In addition to analyzing the type of threat, it is important
to understand the source of the threat. The threats begin with
humans and human motivation. The individual or
organization must then gain access to the targeted computer
or network. As pointed out in [1,2], threat sources consist of
two entities:
A. Threat Agents
Threat agents are the actors, individuals or organizations,
who can create a threat. Often threat agents try to mask their
identity and alliances by claiming identification with another
group. This masquerading can be accomplished through fake
news and social media campaigns. In descending order, the
most common categories of threat agents are cyber-criminals,
insiders, nation-states, hacktivists, cyber-fighters, and
terrorist groups.
B. Attack Vectors
Attack vectors are the path or means by which a threat
agent gains access to a computer or network for the purpose
of malicious activity. There is a large taxonomy of attack
vectors. A short list includes the human element, web and
browser attacks, internet exposed threat, mobile app stores,
and malicious USB drives.
TABLE I. ANNUAL CHANGE IN RANKING OF THE TOP
FIFTEEN
THREATS ACCORDING TO ETL
Top Threats
Year
2018 2017 2016 2015 2014 2013 2012
Malware 1 1 1 1 1 2 2
Web-Based Attacks 2 2 2 2 2 1 1
Web Application
Attacks
3 3 3 3 3 3 3
Phishing 4 4 6 8 7 9 7
Denial of Service 5 6 4 5 5 8 6
Spam 6 5 7 9 6 10 10
Botnets 7 8 5 4 4 5 5
Data Breaches 8 11 12 11 9 12 8
Insider Threat 9 9 9 7 11 14 -
Physical
Manipulation/
Damage/Theft/Loss
10 10 10 6 10 6 12
Information
Leakage
11 13 14 13 12 13 14
Identity Theft 12 12 13 12 13 7 13
Cryptojacking 13 - - - - - -
Ransomware 14 7 8 14 15 11 9
Cyber Espionage 15 15 15 15 14 - -
Exploit Kits - 14 11 10 8 4 4
III. TOP CYBER THREATS
An analysis of the top threats shows an increase in the
incidences of attack and attack tactics as well as
advancements in defense. Ransomware attacks were a
dominant threat. There was a massive increase in phishing
attacks. In the sequel we describe each of these cyber threats
in order of their ranking in 2018 and as described in [1,2].
A. Threat 1: Malware
Malware is software with a malicious intent to destroy a
computer, server, or network. It causes harm or acts against
the interests of the user. Common malware are viruses,
worms, Trojan horses, spyware, and ransomware. Malware
remained the top cyber threat since 2014. In 2017, over four
million samples of malware are detected each day by
malware protection firms [3]. An increase in malware attacks
is escaladed by ad wars and hijacked browser sessions.
Click-less infections, which do not depend on user
interaction for deployment, are on the rise. The ETL
176
describes 2017 as being highly mediatized with regard to
leaked exploits. EternalBlue was one of several exploits
attributed to the US National Security Agency (NSA) to be
leaked by hackers. EternalBlue exploits a vulnerability in
older versions of Microsoft Windows operating system and
lead to a number of ransomware outbreaks. EternalBlue also
serves as an example of the upward trending state
intelligence development of malware. Noteworthy malware
attacks of 2017 were WannaCry and NotPetya, both of which
had a ransomware payload and exploited the EternalBlue
vulnerability. The WannaCry ransomware attack lasted only
a few days but is estimated to have resulted in hundreds of
millions of dollars in damage in the US, Japan, and Australia.
WannaCry was attributed to North Korea. Malware’s roles in
the kill chain are installation of the threat, command and
control of the device, and execution of harmMitigation of
malware includes malware detection on all in-bound and out-
bound channels and sufficient security policies for response.
In 2018, the attack vectors for detected malware were 92%
by email compromise and 6% by web and browser.
B. Threat 2: Web-Based Attacks
Web-Based Attacks make use of web-enabled systems
such as browsers, webpages, and content managers. They are
the most common threat for financial attacks and remained
the second top cyber threat since 2014. As a widely used
content manager, WordPress is particularly vulnerable.
Drive-by download attacks involve malicious JavaScript and
do not require action from the user. Malicious URLs use
Blackhat Search Engine Optimization (SEO) to attract
targets. A web-based attack’s roles in the kill chain are the
creation, delivery, and execution of a payload targeted to a
particular vulnerability. Mitigation includes patching
vulnerabilities and web traffic filtering.
C. Threat 3: Web Applicaton Attacks
Web application attacks take advantage of Application
Programming Interfaces (APIs) which are exposed and open.
Government and financial institution apps are particularly
popular targets. SQL injection can be used to retrieve
passwords stored in databases. Web Application Attacks
remained the third top cyber threat since 2012. Kill chain
phases for web application attacks are reconnaissance for
choosing targets and identifying vulnerabilities, exploitation
of the vulnerabilities, and installation of access points which
lead to command and control of the device. Mitigation
includes policies for secure app development and for the
authentication and validation of mechanisms.
D. Threat 4: Phishing
Phishing uses social engineering to lure targets into
revealing sensitive information. Spearfishing targets people
within a specific organization. Often disguised as legitimate
organizations, one million new phishing websites are created
each month. Phishing’s roles in the kill chain are
reconnaissance, weaponization, and delivery. The human
element is the weak link in the Phishing Attack. In fact, in
2018 over 90% of malware infections and 72% of data
breaches in organizations originate from Phishing Attacks
[2]. Mitigation includes the education of potential targets
about fake email, random clicking, and oversharing of
personal information.
E. Threat 5: Denial of Service Attacks
Denial of Service (DoS) attacks occur when machine or
network resources are made unavailable to their intended
users by disrupting service, usually by flooding the network
with requests, often from botnets. The DoS is particularly
damaging to organizations that rely on a web presence.
Distributed Denial of Service (DDoS) attacks strike a target
from many sources and are harder to stop. Pulse wave DDoS
attacks come in short bursts on multiple targets and can last
for days. The DoS attacks can be used to mask other attacks.
In 2017, the Mirai Internet of Things (IoT) botnet was
responsible for the largest DoS attack in history. The attack
lent credence to warnings about IoT vulnerabilities and led to
massive increases in security of IoT devices. These new
measures led to some decrease in botnet activity and in DoS
attacks, but the overall trend of DoS attacks is still increasing.
Kill chain phases for a DoS attack are reconnaissance,
weaponization, command and control of device, and
execution of harm. Mitigation includes a reaction plan,
Internet Service Providers (ISPs) with DoS protection, and
organization specific protections such as firewalls and access
control lists.
F. Threat 6: Spam
Spam is flooding users with unsolicited messages by
email and messaging technologies. It comprised close to half
of total email volume or nearly 300 billion to 450 billion
emails per day in 2018 [2]. Most spam comes from botnets,
80% of which are thought to have been created by a group of
about 100 spam gangs. In spite of the uncovering of several
large botnets, spam attacks are still upwardly trending. Spam
is the main means of malware delivery through attachments
and URLs, although most spam is simply advertisement
without malware. The roles of spam in the kill chain are
weaponization and delivery. Mitigation is through spam
filters and user education.
G. Threat 7: Botnets
Botnets consist of several Internet connected devices,
each device running a bot, or script, that performs a simple
task at high repetition. The IoT botnets were the second most
important threat of 2017, responsible for an enormous DoS
attack. Approximately 8.4 million new devices were added to
the Internet in 2017. A large percentage connected devices
are considered to be vulnerable. When such a device is
compromised, it can become part of a botnet. There is
concern that virtual machines can become part of botnets.
Fewer than expected DoS botnet attacks occurred in 2017,
but the fear is that the focus of botnets has turned to
ransomware. The kill chain phase of botnets is command and
control of the device. Mitigation is through application and
network firewalling and traffic filtering.
177
H. Threat 8: Data Breach
Data Breach is the loss of data that can only be
discovered after the fact. It is not a threat but the result of a
successful attack. Data breaches are likely more prevalent
than known. A high number of breaches result from stolen or
weak passwords and user credentials continue to be sold on
the dark web. Breaches through espionage can be part of a
nation-state cyber-attack; however, 61% of data breach
victims are small companies and 35.4% are in the healthcare
sector. The EU’s General Data Protection Regulation (GDPR)
is intended to have an impact on careless breaches through
repercussions. In the US, Equifax’s breach of nearly 150
million customers’ personal and financial records in 2017
resulted in lawsuits and government investigation. In
addition to penalties, data breaches are avoided by
preventing cyber threats. Mitigation includes encryption and
reduction of access rights.
I. Threat 9: Insider Threat
Insider threat is the harm caused by an organization’s
insider with authorized access. The harm can be
unintentional. This threat is thought to be on the rise but
losses are hard to quantify so the threat is deprioritized.
Breaches are most commonly caused by high level managers
and outside contractors rather than non-managerial
employees. In fact in 2018, 77% of the companies’ data
breaches are caused by insiders. Healthcare is a particular
target with 59% of breached records resulting from insider
threat. Insider threat involves all positions on the kill chain.
User awareness is the most useful mitigation, in addition to
segregation of duties and limiting access to data.
J. Threat 10: Physical Damage and Loss
Physical damage and loss of computers and equipment
can result in data breaches. Encryption would solve the data
breach problem, but only 43% of reporting organizations use
encryption in 2018. Threat is more prevalent with IoT and
mobile devices as device losses count for around half of all
breaches in 2018. Additional examples of physical threat
include Automatic Teller Machine (ATM) drilling in which a
drilled hole near the PIN pad allows for wired access and
control of the machine. Theft of devices for their valuable
components used to be limited to copper wire but now
includes back up batteries in cell towers. In addition to
encryption, mitigation includes asset inventory.
K. Threat 11: Information Leakage
Information Leakage is a breach caused not by a direct
attack but from unsecured data. Mobile devices make such
breaches easier. Information leakage is the usually the result
of human error, often an insider action or failure. However,
information can also be leaked through coding errors,
particularly on mobile devices. In fact, unintended disclosure
is the profound reason for Information Leakage in 2018 and
human error is the most crucial factor for data disclosure [2].
In 2017, a navigation app installed on many Android devices
contained a coding error that allowed hackers to obtain
hardcoded credentials for text messaging. In 2018,
information collected by the mobile fitness tracking and
sharing app Strava has highlighted the locations of secret US
military bases worldwide.
L. Threat 12: Identity Theft
Identity Theft is a cyber threat in which the attacker
obtains information about a person or computer system for
the purpose of impersonating the target. Like a Data Breach,
Identity Theft is the result of a successful attack. In the UK,
identities were stolen at the rate of 500 per day in 2017.
Personal and credit card data sell for as little as $10 on the
black market. Yet most individuals report that they have few
worries about identity theft. Top threats include skimmers on
credit card devices, dumpster diving for hard copy personal
information, phishing, hacking, and telephone impersonators.
Mitigation includes protection of documents, strong privacy
settings on social media, password protection on devices, and
care when using public WiFi.
M. Threat 13: Cryptojacking
Cryptojacking (also known as Cryptomining) is a new
term that refers to the programs that use the victim's device
processing power to mine cryptocurrencies such as Bitcoin,
without the victim's consent. It is a type of Malware and
unlike Ransomware, the attacker is more focused on
assuming the control of the machine’s computational power
and producing currency units indefinitely, than being paid a
ransom amount once. Cryptojacking made it to the top
fifteen cyber threat list in 2018. The number of victims was
around half million per month in 2018.
N. Threat 14: Ransomeware
Ransomware is Malware that encrypts files or locks
down a system until the target pays the actor to remove the
restrictions. In the case of wipeware, the encryption is never
removed. Twenty percent of organizations reported that even
after paying the ransom, they did not get back their data.
Ransomware as a Service (RaaS) allows cybercriminals easy
entry to ransomware attacks by providing a complete set of
launch tools for less than $400 on the dark web.
Ransomware ranking in the ETL Top fifteen cyberthreat list
decreased significantly from seventh place in 2017 to
fourteenth place in 2018 due to the shifting of focus by
attackers to cryptojacking. In the latter, a computer is
invaded in a way similar to ransomware, but instead of
demanding a ransom, a malicious software is installed to
start cryptocurrency mining without the computer owner’s
noticing. However, over 85% of the Malware targeting
medical devices in 2018 was Ransomware [2]. Noteworthy
ransomware attacks of 2017 were Cerber and Jaff. Cerber is
a family of ransomware payloads which are distributed
through email, exploit kits, JavaScript, and Microsoft Word
macros. Variants of Cerber include a Bit-coin wallet stealing
function. Jaff is described as new but vicious. It is spread via
the Necurs botnet and is downloaded in a .pdf file attachment.
Jaff is said to check for the target computer’s language
setting. If the language is set to Russian, the payload
destructs rather than deploying. The kill chain roles of
ransomware are installation, command and control of the
device, and execution of harm. Mitigation is through limited
178
access rights to data which potentially makes fewer data
vulnerable to encryption, and an off-line backup to recover
data as well as an up-to-date and patched software and
operating system.
O. Threat 15: Cyber Espionage
Cyber Espionage involves the use of a computer network
to obtain confidential information. Government, political,
and commercial organizations are the typical targets. Actors
include nation-states and organized crime. Cyber Espionage
made it to the top fifteen list in 2014 but remains at the
bottom of the list. Advanced Persistent Threats (APTs) are a
collection of processes, tools, and resources used to infiltrate
networks over a long period without detection. Even though
cyber-espionage is last on the top fifteen list, it is perceived
as a serious threat, likely due to press coverage. Widely
covered attacks in 2017 include the US Democratic National
Committee breach, and the Ukraine power grid take-down
attributed to Russian cyber-spies. Since espionage is a
composite threat, mitigation is through mitigation of all other
cyber-threats.
P. Threat 16: Exploit Kits
Exploit Kits are a bundle of ready-made exploits used to
infect websites or as part of a malicious advertising
campaign. The kits identify vulnerabilities on web browsers
and web apps then exploit automatically, an example of
click-less attacks. The payload may be ransomware.
Common targets are Java and Adobe Flash add-ons. Exploit
Kits were in fourth place in the top fifteen threat in 2012, and
increased in rank constantly until it exited the list in 2018.
The scaling up of an Exploit Kit attack can lead to its
detection which perhaps explains the trend. Mitigation is the
detection and patching of vulnerabilities.
IV. CONCLUDING REMAKDS
Cyber threats are constantly evolving and one cyber
operation may see multiple avenues of threats taken to fulfill
objectives of the cyber actors. There is a desire for the
implementation of security during development rather than
after, particularly for IoT devices. That is “built-in” versus
“bolt-on” security. The complexity and maturity of malicious
practices will continue to be analyzed. There is a prediction
that data analytics will be used not just to mitigate threats but
to develop attacks. There is concern that state-sponsored and
military cyber weapons will be tested on easy targets already
in crisis through poverty or war. There is also a call for an
increase in cyber threat intelligence capabilities and training
which is currently limited and lagging behind threats. In
conclusion, a good reflection on the cyber threats from an
individual’s standpoint may help educate ordinary users on
prevention techniques to protect themselves, their
organization and their societies.
REFERENCES
[1] European Union Agency For Network and Information
Security
(ENISA). (2019). ENISA threat landscape web portal. Retrieved
from
etl.enisa.europa.eu.
[2] European Union Agency For Network and Information
Security
(ENISA). (2019). ENISA threat landscape report 2018: 15 Top
Cyber-Threats and Trends. Heraklion: ENISA.
https://doi.org/10.2824/622757
[3] European Union Agency for Network and Information
Security
(ENISA). (2017). ENISA threat landscape report 2016: 15 top
cyber-
threats and trends. Heraklion: ENISA.
https://doi.org/10.2824/92184
[4] European Union Agency For Network and Information
Security
(ENISA). (2015). ENISA threat landscape report 2014:
Overview of
current and emerging cyber-thretas. Heraklion: ENISA.
https://doi.org/10.2824/061861
[5] European Union Agency For Network and Information
Security
(ENISA). (2013). ENISA threat landscape report 2013:
Overview of
current and emerging cyber-threats. Heraklion: ENISA.
https://doi.org/10.2824/022950
[6] European Union Agency For Network and Information
Security
(ENISA). (2013). ENISA threat landscape report 2012:
Responding
to the evolving threat environment. Heralion: ENISA. Retrieved
from:
http://www.enisa.europa.eu/
[7] Hutchins, E.M., Cloppert, M.J., & Amin, R.M. (2012).
Intelligence-
Driven Computer Network Defense Informed by Analysis of
Adversary Campaigns and Intrusion Kill Chains. In J. Ryan
(Ed.).
Leading Issues in Information Warfare and Security Research,
Volume 1 (pp. 80-106). Reading: Academic Publishing
International
Limited.
[8] Malware Information Sharing Platform (MISP) Project.
(2018). The
Open Source Threat Intelligence Platform & Open Standards for
Thret Information Sharing. Rerieved from http://www.misp-
project.org/
179

More Related Content

Similar to Reading and summarizing a research article Authors’ last name.docx

An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...CSCJournals
 
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...CSCJournals
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docxhealdkathaleen
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challengesijtsrd
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...Willy Marroquin (WillyDevNET)
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015Andreanne Clarke
 
Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015Marketing Türkiye
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMatthew Rosenquist
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxcargillfilberto
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxdrandy1
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensJeremiah Grossman
 
Methodology of CVE Research - Sajid Amit.pdf
Methodology of CVE Research - Sajid Amit.pdfMethodology of CVE Research - Sajid Amit.pdf
Methodology of CVE Research - Sajid Amit.pdfSajid Amit
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscapegreendigital
 
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdfA Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdfKatie Naple
 
We need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docxWe need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docxcelenarouzie
 
Conduct a research and provide a brief comments to this Wiki pag.docx
Conduct a research and provide a brief comments to this Wiki pag.docxConduct a research and provide a brief comments to this Wiki pag.docx
Conduct a research and provide a brief comments to this Wiki pag.docxpatricke8
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxbartholomeocoombs
 
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...IJCI JOURNAL
 

Similar to Reading and summarizing a research article Authors’ last name.docx (20)

An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
 
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...
 
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docxRunning Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY    .docx
Running Head ANNOTATED BIBLIOGRAPHYANNOTATED BIBLIOGRAPHY .docx
 
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and ChallengesInformation Sharing of Cyber Threat Intelligence with their Issue and Challenges
Information Sharing of Cyber Threat Intelligence with their Issue and Challenges
 
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...The Malicious Use   of Artificial Intelligence: Forecasting, Prevention,  and...
The Malicious Use of Artificial Intelligence: Forecasting, Prevention, and...
 
2015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 
Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015Cisco Yıllık Güvenlik Raporu 2015
Cisco Yıllık Güvenlik Raporu 2015
 
YiR2022-External-Final.pdf
YiR2022-External-Final.pdfYiR2022-External-Final.pdf
YiR2022-External-Final.pdf
 
McAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats PredictionsMcAfee Labs 2017 Threats Predictions
McAfee Labs 2017 Threats Predictions
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
 
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docxCOM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
COM 545 Writing Assignment 2 Scenario UNFO traditionally h.docx
 
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash ScreensExploring the Psychological Mechanisms used in Ransomware Splash Screens
Exploring the Psychological Mechanisms used in Ransomware Splash Screens
 
Methodology of CVE Research - Sajid Amit.pdf
Methodology of CVE Research - Sajid Amit.pdfMethodology of CVE Research - Sajid Amit.pdf
Methodology of CVE Research - Sajid Amit.pdf
 
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital LandscapeUnveiling the Art of Threat Detection: Safeguarding the Digital Landscape
Unveiling the Art of Threat Detection: Safeguarding the Digital Landscape
 
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdfA Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
A Systematic Literature Review on Phishing and Anti-Phishing Techniques.pdf
 
We need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docxWe need Paper on Risk Assessment for the organization (NASA). Th.docx
We need Paper on Risk Assessment for the organization (NASA). Th.docx
 
Conduct a research and provide a brief comments to this Wiki pag.docx
Conduct a research and provide a brief comments to this Wiki pag.docxConduct a research and provide a brief comments to this Wiki pag.docx
Conduct a research and provide a brief comments to this Wiki pag.docx
 
Classmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docxClassmate 1Cybersecurity risk can be characterized as the ris.docx
Classmate 1Cybersecurity risk can be characterized as the ris.docx
 
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
AN EXPERT SYSTEM AS AN AWARENESS TOOL TO PREVENT SOCIAL ENGINEERING ATTACKS I...
 

More from audeleypearl

Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docx
Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docxMr. Bush, a 45-year-old middle school teacher arrives at the emergen.docx
Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docxaudeleypearl
 
Movie Project Presentation Movie TroyInclude Architecture i.docx
Movie Project Presentation Movie TroyInclude Architecture i.docxMovie Project Presentation Movie TroyInclude Architecture i.docx
Movie Project Presentation Movie TroyInclude Architecture i.docxaudeleypearl
 
Motivation and Retention Discuss the specific strategies you pl.docx
Motivation and Retention Discuss the specific strategies you pl.docxMotivation and Retention Discuss the specific strategies you pl.docx
Motivation and Retention Discuss the specific strategies you pl.docxaudeleypearl
 
Mother of the Year In recognition of superlative paren.docx
Mother of the Year         In recognition of superlative paren.docxMother of the Year         In recognition of superlative paren.docx
Mother of the Year In recognition of superlative paren.docxaudeleypearl
 
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docx
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docxMrs. G, a 55 year old Hispanic female, presents to the office for he.docx
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docxaudeleypearl
 
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docx
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docxMr. Rivera is a 72-year-old patient with end stage COPD who is in th.docx
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docxaudeleypearl
 
Mr. B, a 40-year-old avid long-distance runner previously in goo.docx
Mr. B, a 40-year-old avid long-distance runner previously in goo.docxMr. B, a 40-year-old avid long-distance runner previously in goo.docx
Mr. B, a 40-year-old avid long-distance runner previously in goo.docxaudeleypearl
 
Moving members of the organization through the change process ca.docx
Moving members of the organization through the change process ca.docxMoving members of the organization through the change process ca.docx
Moving members of the organization through the change process ca.docxaudeleypearl
 
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxMr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxaudeleypearl
 
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docxMr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docxaudeleypearl
 
Motor Milestones occur in a predictable developmental progression in.docx
Motor Milestones occur in a predictable developmental progression in.docxMotor Milestones occur in a predictable developmental progression in.docx
Motor Milestones occur in a predictable developmental progression in.docxaudeleypearl
 
Most women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docxMost women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docxaudeleypearl
 
Most patients with mental health disorders are not aggressive. Howev.docx
Most patients with mental health disorders are not aggressive. Howev.docxMost patients with mental health disorders are not aggressive. Howev.docx
Most patients with mental health disorders are not aggressive. Howev.docxaudeleypearl
 
Most of our class readings and discussions to date have dealt wi.docx
Most of our class readings and discussions to date have dealt wi.docxMost of our class readings and discussions to date have dealt wi.docx
Most of our class readings and discussions to date have dealt wi.docxaudeleypearl
 
Most people agree we live in stressful times. Does stress and re.docx
Most people agree we live in stressful times. Does stress and re.docxMost people agree we live in stressful times. Does stress and re.docx
Most people agree we live in stressful times. Does stress and re.docxaudeleypearl
 
Most of the ethical prescriptions of normative moral philosophy .docx
Most of the ethical prescriptions of normative moral philosophy .docxMost of the ethical prescriptions of normative moral philosophy .docx
Most of the ethical prescriptions of normative moral philosophy .docxaudeleypearl
 
Most healthcare organizations in the country are implementing qualit.docx
Most healthcare organizations in the country are implementing qualit.docxMost healthcare organizations in the country are implementing qualit.docx
Most healthcare organizations in the country are implementing qualit.docxaudeleypearl
 
More work is necessary on how to efficiently model uncertainty in ML.docx
More work is necessary on how to efficiently model uncertainty in ML.docxMore work is necessary on how to efficiently model uncertainty in ML.docx
More work is necessary on how to efficiently model uncertainty in ML.docxaudeleypearl
 
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docx
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docxMortgage-Backed Securities and the Financial CrisisKelly Finn.docx
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docxaudeleypearl
 
Moral Development  Lawrence Kohlberg developed six stages to mora.docx
Moral Development  Lawrence Kohlberg developed six stages to mora.docxMoral Development  Lawrence Kohlberg developed six stages to mora.docx
Moral Development  Lawrence Kohlberg developed six stages to mora.docxaudeleypearl
 

More from audeleypearl (20)

Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docx
Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docxMr. Bush, a 45-year-old middle school teacher arrives at the emergen.docx
Mr. Bush, a 45-year-old middle school teacher arrives at the emergen.docx
 
Movie Project Presentation Movie TroyInclude Architecture i.docx
Movie Project Presentation Movie TroyInclude Architecture i.docxMovie Project Presentation Movie TroyInclude Architecture i.docx
Movie Project Presentation Movie TroyInclude Architecture i.docx
 
Motivation and Retention Discuss the specific strategies you pl.docx
Motivation and Retention Discuss the specific strategies you pl.docxMotivation and Retention Discuss the specific strategies you pl.docx
Motivation and Retention Discuss the specific strategies you pl.docx
 
Mother of the Year In recognition of superlative paren.docx
Mother of the Year         In recognition of superlative paren.docxMother of the Year         In recognition of superlative paren.docx
Mother of the Year In recognition of superlative paren.docx
 
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docx
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docxMrs. G, a 55 year old Hispanic female, presents to the office for he.docx
Mrs. G, a 55 year old Hispanic female, presents to the office for he.docx
 
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docx
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docxMr. Rivera is a 72-year-old patient with end stage COPD who is in th.docx
Mr. Rivera is a 72-year-old patient with end stage COPD who is in th.docx
 
Mr. B, a 40-year-old avid long-distance runner previously in goo.docx
Mr. B, a 40-year-old avid long-distance runner previously in goo.docxMr. B, a 40-year-old avid long-distance runner previously in goo.docx
Mr. B, a 40-year-old avid long-distance runner previously in goo.docx
 
Moving members of the organization through the change process ca.docx
Moving members of the organization through the change process ca.docxMoving members of the organization through the change process ca.docx
Moving members of the organization through the change process ca.docx
 
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docxMr. Friend is acrime analystwith the SantaCruz, Califo.docx
Mr. Friend is acrime analystwith the SantaCruz, Califo.docx
 
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docxMr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
Mr. E is a pleasant, 70-year-old, black, maleSource Self, rel.docx
 
Motor Milestones occur in a predictable developmental progression in.docx
Motor Milestones occur in a predictable developmental progression in.docxMotor Milestones occur in a predictable developmental progression in.docx
Motor Milestones occur in a predictable developmental progression in.docx
 
Most women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docxMost women experience their closest friendships with those of th.docx
Most women experience their closest friendships with those of th.docx
 
Most patients with mental health disorders are not aggressive. Howev.docx
Most patients with mental health disorders are not aggressive. Howev.docxMost patients with mental health disorders are not aggressive. Howev.docx
Most patients with mental health disorders are not aggressive. Howev.docx
 
Most of our class readings and discussions to date have dealt wi.docx
Most of our class readings and discussions to date have dealt wi.docxMost of our class readings and discussions to date have dealt wi.docx
Most of our class readings and discussions to date have dealt wi.docx
 
Most people agree we live in stressful times. Does stress and re.docx
Most people agree we live in stressful times. Does stress and re.docxMost people agree we live in stressful times. Does stress and re.docx
Most people agree we live in stressful times. Does stress and re.docx
 
Most of the ethical prescriptions of normative moral philosophy .docx
Most of the ethical prescriptions of normative moral philosophy .docxMost of the ethical prescriptions of normative moral philosophy .docx
Most of the ethical prescriptions of normative moral philosophy .docx
 
Most healthcare organizations in the country are implementing qualit.docx
Most healthcare organizations in the country are implementing qualit.docxMost healthcare organizations in the country are implementing qualit.docx
Most healthcare organizations in the country are implementing qualit.docx
 
More work is necessary on how to efficiently model uncertainty in ML.docx
More work is necessary on how to efficiently model uncertainty in ML.docxMore work is necessary on how to efficiently model uncertainty in ML.docx
More work is necessary on how to efficiently model uncertainty in ML.docx
 
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docx
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docxMortgage-Backed Securities and the Financial CrisisKelly Finn.docx
Mortgage-Backed Securities and the Financial CrisisKelly Finn.docx
 
Moral Development  Lawrence Kohlberg developed six stages to mora.docx
Moral Development  Lawrence Kohlberg developed six stages to mora.docxMoral Development  Lawrence Kohlberg developed six stages to mora.docx
Moral Development  Lawrence Kohlberg developed six stages to mora.docx
 

Recently uploaded

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and ModificationsMJDuyan
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentationcamerronhm
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Jisc
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSCeline George
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 

Recently uploaded (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 

Reading and summarizing a research article Authors’ last name.docx

  • 1. Reading and summarizing a research article: Authors’ last names (year) conducted a study about ________________________. The participants were/the setting was ___________________________. (New paragraph) The findings were _____________________________. Discussion. (Possibly a new paragraph) The authors suggested _____________________. Discussion. Students should fill in the blanks with their own words. To copy directly from the article fails to show comprehension and considered plagiarism. To “fill in the blanks”, a student should read the journal article and pay specific attention to: Sentence #1- Authors’ last names (year) conducted a study about _________________. · Read the Abstract; this will give an overview of the study’s (article’s) purpose. · Read the entire article without trying to summarize it. · Go back and read the Literature Review or Background section of the article. Toward the end of the section, the authors should identify gaps in the existing literature and tell the reader how the current study will fill that gap. The authors will also state their hypothesis (purpose) at the end of this section. · Section #2 - The participants were/the setting was ___________________________. · Read the Methods section of the paper. In this section, the authors will describe how the data was collected, who was included in the sample, and any instruments used. · A reader might want to consider sample size, demographic characteristics, or any interesting protocol. · It is not necessary to report every fact (i.e., 35% of the
  • 2. participants were male, 71%) Section #3 - The findings were _____________________________. · Read the Findings section of the article. · Some statistics may be confusing. Pay attention to key words such as “increased”, “decreased”, “improved”, and “reduced”. · “No change” may also be considered a significant finding. · Next, read the Discussion section. The authors will present the findings in general terms. Section #4 - The authors suggested _____________________. · Read the Discussion section and look for comments that the authors made about the intervention or program such as “Did it work?” or “Should it be continued?”. · Look for the author’s critique of why the study did or did not produce results. Did anything unexpected influence the findings? · The author may suggest a future line of research or “next steps” to improve the body of knowledge. Additional Considerations: · A literature review is a summary of what research has been completed in a topic area; it should be summarized in your own words. · Read the entire article first and then go back and take notes. Jot down notes in your own words. This increases comprehension as well as decreases the likelihood of plagiarism. · The review is written in third person; no “I” or “you”. · Not every detail or fact needs to be reported. A reader will obtain a copy of the article if more information is needed. · Write the literature review in the past tense; the research has already been completed. · The article cannot “do”, “find”, or “say” anything. The authors are the people who conducted the study. · The above format is a guideline. It may be necessary to change
  • 3. the verbs or to expand an idea. On the Top Threats to Cyber Systems 1 The Beacom College of Computer and Cyber Sciences, Dakota State University, Madison, South Dakota, USA 2 Department of Computing and Information Sciences, Valparaiso University, Valparaiso, Indiana, USA e-mail: [email protected], [email protected] Abstract—The technological innovation of cyber systems and increase dependence of individuals, societies and nations on them has brought new, real and everchanging threat landscapes. In fact, the threats evolving faster than they can be assessed. The technological innovation that brought ease and efficiency to our lives, has been met by similar innovation to take advantage of cyber systems for other gains. More threat actors are noted to be sponsored by nation-states and the skills and capabilities of organizations to defend against these
  • 4. attacks are lagging. This warrants an increase in automation of threat analysis and response as well as increased adoption of security measures by at-risk organizations. Thus, to properly prepare defenses and mitigations to the threats introduced by cyber, it is necessary to understand these threats. Accordingly, this paper provides an overview of top cyber security threats in together with current and emerging trends. The analyses include general trends in the complexity of attacks, actors, and the maturity of skills and capabilities of organizations to defend against attacks. Top threats are discussed with regard to instances of attacks and strategies for mitigation within the kill chain. A brief discussion of threat agents and attack vectors adds context to the threats. Keywords-cyber security; cyber threats; analysis; kill chain; mitigation I. INTRODUCTION The European Union Agency for Network and Information Security (ENISA) is a center of expertise in Europe that was formed in 2004 and is located in Greece
  • 5. with its seat in Heraklion, Crete and an operational office in Athens. Within that charge, ENISA seeks to create a culture of cyber security by assisting the European Union (EU) member states and organizations to meet security regulations, through involvement in current and future legislation, and by analyzing and disseminating cyber threat intelligence (CTI). To this end, ENISA holds events such as CTI-EU, a workshop for all European stakeholders in cyber threat intelligence, and the Cyber Europe Conference. In 2018, ENISA published the CTI Maturity Model for the purpose of identifying gaps in Threat Information Sharing (TIS) tools. The ETL 2018 is the seventh edition of the annual Threat Landscape report [2]. In addition, ENISA improved readability and usability of its report and has launched a web application containing information on the top fifteen cyber threats encountered in the previous calendar years. The application is available at [1] and offers intuitive navigation through relevant information objects. The ETL 2018 was published for the purpose of analyzing the top fifteen cyber security threats which occurred between December 2017 and December 2018. The document was written in collaboration with the European Defense Agency (EDA), Computer Emergency Response Team for EU (CERT-EU), and the European Cyber Crime Center (EC 3 ), and in the context of existing EU policy such as the Cyber Security Strategy of EU and the Network and Information Security (NIS) Directive. General trends in the analysis include an increase in the complexity of attacks. There was advancement in the hiding of attacks. Attacks became multipurpose and. Monetization of cyber-crime through cryptocurrency increased. More actors are noted to
  • 6. be sponsored by nation-states. The skills and capabilities of organizations to defend against these attacks are lagging. The ETL describes the state-of-play in CTI as constantly evolving with threats evolving faster than they can be assessed. Further, ENISA notes a maturing in the strategy and infrastructure of CTI and a need for the sharing of CTI. Goals include automation of CTI analytics, cyber resilience, and an increase to CTI skills and capabilities leading to a multi-layered defense that makes attacks costly and inefficient [1]. The taxonomy of threats has evolved since the ETL inception. Earlier editions of the ETL listed targeted attack, for example, as separate category of threat. Now, a specific targeted attack might be classified as either phishing or a Denial of Service (DoS) attack. Cyber espionage did not appear as a unique threat until the ETL 2015 edition, coinciding with the increase in state sponsored attacks. Categories of threat continue to overlap. Ransomware, for example, is currently evaluated as a separate threat, even though it is also malware. Mitigation of all cyber threats is through disruption of the computer security kill chain. The ETL uses the Lockheed Martin Corporation’s intrusion kill chain model [7]: 1. Reconnaissance: choose and research target and its vulnerabilities 2. Weaponization: create a malware weapon tailored to the vulnerability 3. Delivery: transmit the weapon to the target 4. Exploitation: execute malware code to exploit vulnerability
  • 7. 5. Installation: access point, “back door” is installed for use by intruder 6. Command and control: malware allows intruder access and control of target. 175 2019 IEEE 2nd International Conference on Information and Computer Technologies 978-1-7281-3322-5/19/$31.00 ©2019 IEEE Houssain Kettani 1 , Polly Wainwright 1,2 7. Actions on objectives: action is taken to achieve attack objective In the next section, we discuss the evolution of the landscape of cyber threats in this decade and sources of the threats. In Section III we analyze and explain each of the top cyber threats per ETL reports and present concluding remarks in Section IV. II. EVOLUTIONS IN THE THREAT LANDSCAPE The top fifteen threats in 2018 were in this order: Malware, Web-Based Attacks, Web Application Attacks, Phishing, Denial of Service (DoS), Spam, Botnets, Data Breaches, Insider Threat, Physical Manipulation/
  • 8. Damage/Theft/Loss, Information Leakage, Identity Theft, Cryptojacking, Ransomware and Crypto Espionage. The annual change in ranking of each cyber threat since 2012 is summarized in Table I as compiled from the annual ETL reports [2-6]. In 2018, Cryptojacking was introduced to the list and exploit kits was dropped [2]. The latter was dropping constantly in rank each year since it was at the fourth place in 2012 and 2013. Some of the top cyber threats belong to same distinct threat category. For example, Ransomware and Cryptojacking are a specialization of the threat type Malware. Likewise, Identity Theft is a special category of Data Breach. Nonetheless, the overlapping threats are handled separately because the threat is launched by special malicious artefacts. The top fifteen threats in 2017 have been the same top fifteen threats since 2014, although some order and trending have changed [1-6]. The top three threats have remained consistent since 2012, namely Malware, Web-based and Web Application Attacks. Insider threat was not recognized as a distinct type of threat until 2013 while Cyber Espionage was not recognized until 2014. Position ranking was based on the number of incidents, impact, and relationship to other threats. A trend up indicates an increase in incidents but perhaps not an increase in rank. Table 1 shows the increased ranks of Phishing and Spam attacks as well as the decreased rank of Exploit Kit attacks which eventually exited the top fifteen threat list in 2018. The analyzed threat data are in the public domain, specifically from the Open Source Threat Intelligence Platform & Open Standards for Threat Information Sharing [8]. In addition to analyzing the type of threat, it is important to understand the source of the threat. The threats begin with humans and human motivation. The individual or organization must then gain access to the targeted computer or network. As pointed out in [1,2], threat sources consist of
  • 9. two entities: A. Threat Agents Threat agents are the actors, individuals or organizations, who can create a threat. Often threat agents try to mask their identity and alliances by claiming identification with another group. This masquerading can be accomplished through fake news and social media campaigns. In descending order, the most common categories of threat agents are cyber-criminals, insiders, nation-states, hacktivists, cyber-fighters, and terrorist groups. B. Attack Vectors Attack vectors are the path or means by which a threat agent gains access to a computer or network for the purpose of malicious activity. There is a large taxonomy of attack vectors. A short list includes the human element, web and browser attacks, internet exposed threat, mobile app stores, and malicious USB drives. TABLE I. ANNUAL CHANGE IN RANKING OF THE TOP FIFTEEN THREATS ACCORDING TO ETL Top Threats Year 2018 2017 2016 2015 2014 2013 2012 Malware 1 1 1 1 1 2 2 Web-Based Attacks 2 2 2 2 2 1 1 Web Application
  • 10. Attacks 3 3 3 3 3 3 3 Phishing 4 4 6 8 7 9 7 Denial of Service 5 6 4 5 5 8 6 Spam 6 5 7 9 6 10 10 Botnets 7 8 5 4 4 5 5 Data Breaches 8 11 12 11 9 12 8 Insider Threat 9 9 9 7 11 14 - Physical Manipulation/ Damage/Theft/Loss 10 10 10 6 10 6 12 Information Leakage 11 13 14 13 12 13 14 Identity Theft 12 12 13 12 13 7 13 Cryptojacking 13 - - - - - - Ransomware 14 7 8 14 15 11 9 Cyber Espionage 15 15 15 15 14 - -
  • 11. Exploit Kits - 14 11 10 8 4 4 III. TOP CYBER THREATS An analysis of the top threats shows an increase in the incidences of attack and attack tactics as well as advancements in defense. Ransomware attacks were a dominant threat. There was a massive increase in phishing attacks. In the sequel we describe each of these cyber threats in order of their ranking in 2018 and as described in [1,2]. A. Threat 1: Malware Malware is software with a malicious intent to destroy a computer, server, or network. It causes harm or acts against the interests of the user. Common malware are viruses, worms, Trojan horses, spyware, and ransomware. Malware remained the top cyber threat since 2014. In 2017, over four million samples of malware are detected each day by malware protection firms [3]. An increase in malware attacks is escaladed by ad wars and hijacked browser sessions. Click-less infections, which do not depend on user interaction for deployment, are on the rise. The ETL 176 describes 2017 as being highly mediatized with regard to leaked exploits. EternalBlue was one of several exploits attributed to the US National Security Agency (NSA) to be leaked by hackers. EternalBlue exploits a vulnerability in older versions of Microsoft Windows operating system and lead to a number of ransomware outbreaks. EternalBlue also serves as an example of the upward trending state
  • 12. intelligence development of malware. Noteworthy malware attacks of 2017 were WannaCry and NotPetya, both of which had a ransomware payload and exploited the EternalBlue vulnerability. The WannaCry ransomware attack lasted only a few days but is estimated to have resulted in hundreds of millions of dollars in damage in the US, Japan, and Australia. WannaCry was attributed to North Korea. Malware’s roles in the kill chain are installation of the threat, command and control of the device, and execution of harmMitigation of malware includes malware detection on all in-bound and out- bound channels and sufficient security policies for response. In 2018, the attack vectors for detected malware were 92% by email compromise and 6% by web and browser. B. Threat 2: Web-Based Attacks Web-Based Attacks make use of web-enabled systems such as browsers, webpages, and content managers. They are the most common threat for financial attacks and remained the second top cyber threat since 2014. As a widely used content manager, WordPress is particularly vulnerable. Drive-by download attacks involve malicious JavaScript and do not require action from the user. Malicious URLs use Blackhat Search Engine Optimization (SEO) to attract targets. A web-based attack’s roles in the kill chain are the creation, delivery, and execution of a payload targeted to a particular vulnerability. Mitigation includes patching vulnerabilities and web traffic filtering. C. Threat 3: Web Applicaton Attacks Web application attacks take advantage of Application Programming Interfaces (APIs) which are exposed and open. Government and financial institution apps are particularly popular targets. SQL injection can be used to retrieve passwords stored in databases. Web Application Attacks
  • 13. remained the third top cyber threat since 2012. Kill chain phases for web application attacks are reconnaissance for choosing targets and identifying vulnerabilities, exploitation of the vulnerabilities, and installation of access points which lead to command and control of the device. Mitigation includes policies for secure app development and for the authentication and validation of mechanisms. D. Threat 4: Phishing Phishing uses social engineering to lure targets into revealing sensitive information. Spearfishing targets people within a specific organization. Often disguised as legitimate organizations, one million new phishing websites are created each month. Phishing’s roles in the kill chain are reconnaissance, weaponization, and delivery. The human element is the weak link in the Phishing Attack. In fact, in 2018 over 90% of malware infections and 72% of data breaches in organizations originate from Phishing Attacks [2]. Mitigation includes the education of potential targets about fake email, random clicking, and oversharing of personal information. E. Threat 5: Denial of Service Attacks Denial of Service (DoS) attacks occur when machine or network resources are made unavailable to their intended users by disrupting service, usually by flooding the network with requests, often from botnets. The DoS is particularly damaging to organizations that rely on a web presence. Distributed Denial of Service (DDoS) attacks strike a target from many sources and are harder to stop. Pulse wave DDoS attacks come in short bursts on multiple targets and can last for days. The DoS attacks can be used to mask other attacks. In 2017, the Mirai Internet of Things (IoT) botnet was
  • 14. responsible for the largest DoS attack in history. The attack lent credence to warnings about IoT vulnerabilities and led to massive increases in security of IoT devices. These new measures led to some decrease in botnet activity and in DoS attacks, but the overall trend of DoS attacks is still increasing. Kill chain phases for a DoS attack are reconnaissance, weaponization, command and control of device, and execution of harm. Mitigation includes a reaction plan, Internet Service Providers (ISPs) with DoS protection, and organization specific protections such as firewalls and access control lists. F. Threat 6: Spam Spam is flooding users with unsolicited messages by email and messaging technologies. It comprised close to half of total email volume or nearly 300 billion to 450 billion emails per day in 2018 [2]. Most spam comes from botnets, 80% of which are thought to have been created by a group of about 100 spam gangs. In spite of the uncovering of several large botnets, spam attacks are still upwardly trending. Spam is the main means of malware delivery through attachments and URLs, although most spam is simply advertisement without malware. The roles of spam in the kill chain are weaponization and delivery. Mitigation is through spam filters and user education. G. Threat 7: Botnets Botnets consist of several Internet connected devices, each device running a bot, or script, that performs a simple task at high repetition. The IoT botnets were the second most important threat of 2017, responsible for an enormous DoS attack. Approximately 8.4 million new devices were added to the Internet in 2017. A large percentage connected devices are considered to be vulnerable. When such a device is
  • 15. compromised, it can become part of a botnet. There is concern that virtual machines can become part of botnets. Fewer than expected DoS botnet attacks occurred in 2017, but the fear is that the focus of botnets has turned to ransomware. The kill chain phase of botnets is command and control of the device. Mitigation is through application and network firewalling and traffic filtering. 177 H. Threat 8: Data Breach Data Breach is the loss of data that can only be discovered after the fact. It is not a threat but the result of a successful attack. Data breaches are likely more prevalent than known. A high number of breaches result from stolen or weak passwords and user credentials continue to be sold on the dark web. Breaches through espionage can be part of a nation-state cyber-attack; however, 61% of data breach victims are small companies and 35.4% are in the healthcare sector. The EU’s General Data Protection Regulation (GDPR) is intended to have an impact on careless breaches through repercussions. In the US, Equifax’s breach of nearly 150 million customers’ personal and financial records in 2017 resulted in lawsuits and government investigation. In addition to penalties, data breaches are avoided by preventing cyber threats. Mitigation includes encryption and reduction of access rights. I. Threat 9: Insider Threat Insider threat is the harm caused by an organization’s insider with authorized access. The harm can be unintentional. This threat is thought to be on the rise but
  • 16. losses are hard to quantify so the threat is deprioritized. Breaches are most commonly caused by high level managers and outside contractors rather than non-managerial employees. In fact in 2018, 77% of the companies’ data breaches are caused by insiders. Healthcare is a particular target with 59% of breached records resulting from insider threat. Insider threat involves all positions on the kill chain. User awareness is the most useful mitigation, in addition to segregation of duties and limiting access to data. J. Threat 10: Physical Damage and Loss Physical damage and loss of computers and equipment can result in data breaches. Encryption would solve the data breach problem, but only 43% of reporting organizations use encryption in 2018. Threat is more prevalent with IoT and mobile devices as device losses count for around half of all breaches in 2018. Additional examples of physical threat include Automatic Teller Machine (ATM) drilling in which a drilled hole near the PIN pad allows for wired access and control of the machine. Theft of devices for their valuable components used to be limited to copper wire but now includes back up batteries in cell towers. In addition to encryption, mitigation includes asset inventory. K. Threat 11: Information Leakage Information Leakage is a breach caused not by a direct attack but from unsecured data. Mobile devices make such breaches easier. Information leakage is the usually the result of human error, often an insider action or failure. However, information can also be leaked through coding errors, particularly on mobile devices. In fact, unintended disclosure is the profound reason for Information Leakage in 2018 and human error is the most crucial factor for data disclosure [2]. In 2017, a navigation app installed on many Android devices
  • 17. contained a coding error that allowed hackers to obtain hardcoded credentials for text messaging. In 2018, information collected by the mobile fitness tracking and sharing app Strava has highlighted the locations of secret US military bases worldwide. L. Threat 12: Identity Theft Identity Theft is a cyber threat in which the attacker obtains information about a person or computer system for the purpose of impersonating the target. Like a Data Breach, Identity Theft is the result of a successful attack. In the UK, identities were stolen at the rate of 500 per day in 2017. Personal and credit card data sell for as little as $10 on the black market. Yet most individuals report that they have few worries about identity theft. Top threats include skimmers on credit card devices, dumpster diving for hard copy personal information, phishing, hacking, and telephone impersonators. Mitigation includes protection of documents, strong privacy settings on social media, password protection on devices, and care when using public WiFi. M. Threat 13: Cryptojacking Cryptojacking (also known as Cryptomining) is a new term that refers to the programs that use the victim's device processing power to mine cryptocurrencies such as Bitcoin, without the victim's consent. It is a type of Malware and unlike Ransomware, the attacker is more focused on assuming the control of the machine’s computational power and producing currency units indefinitely, than being paid a ransom amount once. Cryptojacking made it to the top fifteen cyber threat list in 2018. The number of victims was around half million per month in 2018.
  • 18. N. Threat 14: Ransomeware Ransomware is Malware that encrypts files or locks down a system until the target pays the actor to remove the restrictions. In the case of wipeware, the encryption is never removed. Twenty percent of organizations reported that even after paying the ransom, they did not get back their data. Ransomware as a Service (RaaS) allows cybercriminals easy entry to ransomware attacks by providing a complete set of launch tools for less than $400 on the dark web. Ransomware ranking in the ETL Top fifteen cyberthreat list decreased significantly from seventh place in 2017 to fourteenth place in 2018 due to the shifting of focus by attackers to cryptojacking. In the latter, a computer is invaded in a way similar to ransomware, but instead of demanding a ransom, a malicious software is installed to start cryptocurrency mining without the computer owner’s noticing. However, over 85% of the Malware targeting medical devices in 2018 was Ransomware [2]. Noteworthy ransomware attacks of 2017 were Cerber and Jaff. Cerber is a family of ransomware payloads which are distributed through email, exploit kits, JavaScript, and Microsoft Word macros. Variants of Cerber include a Bit-coin wallet stealing function. Jaff is described as new but vicious. It is spread via the Necurs botnet and is downloaded in a .pdf file attachment. Jaff is said to check for the target computer’s language setting. If the language is set to Russian, the payload destructs rather than deploying. The kill chain roles of ransomware are installation, command and control of the device, and execution of harm. Mitigation is through limited 178 access rights to data which potentially makes fewer data
  • 19. vulnerable to encryption, and an off-line backup to recover data as well as an up-to-date and patched software and operating system. O. Threat 15: Cyber Espionage Cyber Espionage involves the use of a computer network to obtain confidential information. Government, political, and commercial organizations are the typical targets. Actors include nation-states and organized crime. Cyber Espionage made it to the top fifteen list in 2014 but remains at the bottom of the list. Advanced Persistent Threats (APTs) are a collection of processes, tools, and resources used to infiltrate networks over a long period without detection. Even though cyber-espionage is last on the top fifteen list, it is perceived as a serious threat, likely due to press coverage. Widely covered attacks in 2017 include the US Democratic National Committee breach, and the Ukraine power grid take-down attributed to Russian cyber-spies. Since espionage is a composite threat, mitigation is through mitigation of all other cyber-threats. P. Threat 16: Exploit Kits Exploit Kits are a bundle of ready-made exploits used to infect websites or as part of a malicious advertising campaign. The kits identify vulnerabilities on web browsers and web apps then exploit automatically, an example of click-less attacks. The payload may be ransomware. Common targets are Java and Adobe Flash add-ons. Exploit Kits were in fourth place in the top fifteen threat in 2012, and increased in rank constantly until it exited the list in 2018. The scaling up of an Exploit Kit attack can lead to its detection which perhaps explains the trend. Mitigation is the detection and patching of vulnerabilities.
  • 20. IV. CONCLUDING REMAKDS Cyber threats are constantly evolving and one cyber operation may see multiple avenues of threats taken to fulfill objectives of the cyber actors. There is a desire for the implementation of security during development rather than after, particularly for IoT devices. That is “built-in” versus “bolt-on” security. The complexity and maturity of malicious practices will continue to be analyzed. There is a prediction that data analytics will be used not just to mitigate threats but to develop attacks. There is concern that state-sponsored and military cyber weapons will be tested on easy targets already in crisis through poverty or war. There is also a call for an increase in cyber threat intelligence capabilities and training which is currently limited and lagging behind threats. In conclusion, a good reflection on the cyber threats from an individual’s standpoint may help educate ordinary users on prevention techniques to protect themselves, their organization and their societies. REFERENCES [1] European Union Agency For Network and Information Security (ENISA). (2019). ENISA threat landscape web portal. Retrieved from etl.enisa.europa.eu. [2] European Union Agency For Network and Information Security (ENISA). (2019). ENISA threat landscape report 2018: 15 Top Cyber-Threats and Trends. Heraklion: ENISA. https://doi.org/10.2824/622757 [3] European Union Agency for Network and Information
  • 21. Security (ENISA). (2017). ENISA threat landscape report 2016: 15 top cyber- threats and trends. Heraklion: ENISA. https://doi.org/10.2824/92184 [4] European Union Agency For Network and Information Security (ENISA). (2015). ENISA threat landscape report 2014: Overview of current and emerging cyber-thretas. Heraklion: ENISA. https://doi.org/10.2824/061861 [5] European Union Agency For Network and Information Security (ENISA). (2013). ENISA threat landscape report 2013: Overview of current and emerging cyber-threats. Heraklion: ENISA. https://doi.org/10.2824/022950 [6] European Union Agency For Network and Information Security (ENISA). (2013). ENISA threat landscape report 2012: Responding to the evolving threat environment. Heralion: ENISA. Retrieved from: http://www.enisa.europa.eu/ [7] Hutchins, E.M., Cloppert, M.J., & Amin, R.M. (2012). Intelligence- Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. In J. Ryan (Ed.). Leading Issues in Information Warfare and Security Research, Volume 1 (pp. 80-106). Reading: Academic Publishing International
  • 22. Limited. [8] Malware Information Sharing Platform (MISP) Project. (2018). The Open Source Threat Intelligence Platform & Open Standards for Thret Information Sharing. Rerieved from http://www.misp- project.org/ 179