SlideShare a Scribd company logo
1 of 10
4
Terry Childs Case Review -
Firion Simtray Report -
Standards, Policies, and Guidelines Definition -
Profile Matrix -
Case issues and
Solution
s Template -
Cybersecurity Recommendations Presentation -
Step 1: Review the Terry Childs Case
Before getting started on the presentation, you will want to first
learn about the Terry Childs case. Research the case and write a
one-page summary of your findings. Your summary should
answer the following questions:
· What led to Childs being charged with a crime?
· How did his employer respond to his actions? What did it do
right and/or wrong?
· What could the company have done to better secure its assets?
Your summary should be thorough and include a references
page. The information gathered will be used in your final
presentation. You will use this summary as Appendix A to your
presentation.
Submit the Terry Childs Case Review for feedback.
Step 2: Project Practice - SIMTRAY Firion: Day 1
Now that you have been introduced to an actual case of insider
threats, you will practice handling insiders in a simulated
environment. The world of cybersecurity is populated with
diverse people with a diversity of perspectives. Every now and
then, individuals may violate certain standards of behavior or
ethics. It is in an organization's best interest to identify these
people and address their core issues, either through motivation,
incentives, or by developing a strong relationship with them. In
the event that this course of action fails, organizations must be
prepared to employ graduated adverse personnel actions.
You will learn how to resolve issues and provide a secure
environment by exploring the SIMTRAY titled, "Firion: Find
Your Way in Three Days." SIMTRAY is a simulation that
presents you with scenarios that will provide insight into how
information security management handles various issues. Some
of the issues and topics addressed in this exercise include
hacker profiles, insider threats, laws concerning privacy,
anonymity - definition, and digital rights management.
The SIMTRAY will provide you with scores to give you a sense
on how well you are grasping the concepts. The sections are
timed for 30 minutes; however, you can run the SIMTRAY as
many times as you need. Record your best score and at least one
lesson learned from the exercise to include in your report at the
end of the three-day simulation.
Step 3: Project Practice - SIMTRAY Firion: Day 2
In the previous step, you started to examine the SIMTRAY,
"Firion: Find Your Way in Three Days." In this step, continue
to focus on SIMTRAY, but document the specific issues that
you would like to include in your presentation. You may
encounter the following topics in this exercise: hacker profiles,
insider threats, laws concerning privacy, anonymity - definition,
and digital rights management.
The SIMTRAY will provide you with scores to give you a sense
on how well you are grasping the concepts. The sections are
timed for 30 minutes; however, you can run the SIMTRAY as
many times as you need. Record your best score and at least one
lesson learned from the exercise to include in your report at the
end of the three-day simulation.
Step 4: Project Practice - SIMTRAY Firion: Day 3
In this step, you should continue to explore the scenarios within
SIMTRAY, "Firion: Find Your Way in Three Days." If you have
not already, you will most likely encounter the following topics
in this exercise: hacker profiles, insider threats, laws
concerning privacy, anonymity - definition, and digital rights
management. Document specific issues that you experience in
the exercise that you would like to include in your presentation.
Think about how these issues might be addressed by guidelines
and policy.
The SIMTRAY will provide you with scores to give you a sense
on how well you are grasping the concepts. The sections are
timed for 30 minutes; however, you can run the SIMTRAY as
many times as you need. Compile your recorded scores, lessons
learned, and documented industry issues into a one-page report.
You will use this report as Appendix B to your presentation.
Submit your Firion Simtray Report for feedback.
Step 5: Psychological Factors
In the previous three steps, you completed simulation activities
handling insiders. In the next few steps, you'll examine
intrusion motives / hacker psychology. In order to fully
understand the Terry Childs case, it is important to understand
that one's internal motivations play a significant role in their
actions.
Your next assignment will require you to create a Psychological
Factor Matrix that summarizes types of hackers and actors, their
motivations, and what sort of standards, policies, and guidelines
would be most suitable to mitigate their impact. In order to
prepare for this assignment, you will need to dig deeper into the
psychological factors that affect hackers. Review the hacker
psychology and sociological aspects resource on the hackers and
actors topic page and document the following:
· What psychological factors motivate hackers and actors (e.g.,
addiction, crime, greed, status)?
· Give examples where these motivations were a factor in a
cyberattack.
· What can organizations do to be more proactive in identifying
and addressing these threats?
While you do not need to submit your findings, they will be
essential to the completion of your Profile Matrix in a later
step.
Step 6: Hacking as an Addiction
After considering psychological factors of hackers and actors in
the last step, you will expand your exploration into the concept
of hacking as an addiction.
In examining the psychological factors of hackers, some mental
health and criminal justice professionals contend that hacking is
an "addiction" and causes obsessive, risk-taking behavior in a
manner similar to illegal narcotics—hackers hack to "get high"
from the thrill of breaking into a system and getting away with
it. Examine and document your thoughts on the following
questions:
· Should policy makers look toward treatment, rather than
incarceration, as to the disposition of hackers? Why or why not?
Think about this question in relation to the Childs case and how
it will affect your recommendations.
Post your thoughts to the discussion board for feedback
Step 7: Ethical vs. Unethical Hackers
As the cybersecurity field expands, the larger community
discourse leads to changes in terminology. While some of our
course materials may differentiate between the terms "hackers"
and "crackers" as threat actors, we will use the terms "ethical
hackers" and "nonethical hackers" to make the same
differentiation. Learn about the different types of hackers, or
non-state actors, and document the following:
· How do the profiles for ethical and unethical hackers differ?
· Should these psychological attributes make a difference as to
the amount of, or nature of the punishment meted out to those
who are caught? Why or why not?
· Describe how certain factors can also motivate ethical
hackers, or those who defend against cyberattacks? (e.g.,
revenge, patriotism, fear of government abuse, pride, respect for
the law, ownership, anger, retaliation).
While you do not need to submit your findings, they will be
essential to the completion of your matrix in a later step.
Step 8: Hacker Profiling
In the previous step, you learned about the psychological
factors that motivate hackers. In this step, you will go a bit
further by learning how to profile hackers -- a skill that is
essential to the success of cybersecurity professionals. Read
about hacker profiling hackers and document the following:
· How do profiles of ethical and unethical hackers differ?
· While psychological profiling of criminals is not a new field,
should we attempt to profile cybercriminals?
· What sort of things do we already know about the
personalities of cybercriminals?
· Do we have enough evidence to indicate there is a distinct
psychological pattern that would help in the apprehension of
cybercriminals?
In the next step, you will use all the information you've learned
about hackers to create a matrix.
Step 9: Define Standards, Policies, and Guidelines
Before you can complete the Profile Matrix and develop
solutions for your company, you will need to take a closer look
at how standards, policies, and guidelines affect a company's
security posture. You probably already have questions about
what policies were in place prior to the Childs incident. In this
step, you dig deeper and learn more about the difference
between standards, policies, and guidelines by creating a two-
to three-page comparison report. Your report should answer the
following questions:
· What is the difference between standards, policies, and
guidelines?
· How do they relate to one another?
· How well do they work in securing networks and data within
the organization?
This report is particularly important because it will affect the
recommendations you make to your boss regarding the case.
You will use this report as Appendix C to your presentation.
Submit your Standards, Policies, and Guidelines Definition for
feedback.
Step 10: Profile Matrix
Now that you have familiarized yourself with the concepts of
hackers and standards, policies, and guidelines, it is important
to understand how to match the two in an organization.
For this assignment, prepare a Profile Matrix that lists the
different types of hackers in the first column, and for each, list
the psychological profile, main motivations, threats to the
organization, benefits to the organization, and whether or not a
standard, guideline, or policy best applies to them. Be sure to
identify an example of a standard, guideline, or policy that may
apply. You should identify a minimum of six hacker-type
examples. This will assist you in both helping upper
management identify insider threats and to prevent future
breaches.
Finally, at this point in your assignment, you should have
encountered concerns about using profiles to "watch" employees
and the benefits and dangers of doing so. Include a short
paragraph about your findings to the matrix.
Submit your Profile Matrix for feedback.
Step 11: Insider Threat eLearning Module - Insider Fraud at
Daytona Investment Bank
Now that you've completed your profile matrix, the next step
will be for you to investigate an insider threat scenario.
This exercise discusses a fictitious scenario about Insider Fraud
at Daytona Investment Bank. In the scenario an internal
investigation revealed that Shane Kerry, an arbitrage trader
specializing in Asian stock markets, used his knowledge of the
bank's internal information security controls to disguise
fraudulent transactions. These transactions resulted in a loss of
$2 billion.
After completing the exercise, answer the following question:
· Could specific standards, policies, and guidelines or other
countermeasures have prevented these fraudulent transactions?
Please explain.
Post your answer to the discussion board for feedback
Step 12: Case Issues and
4Terry Childs Case Review - Firion Simtray Report  - Standar.docx

More Related Content

Similar to 4Terry Childs Case Review - Firion Simtray Report - Standar.docx

Paper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docxPaper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docx
honey690131
 
Paper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docxPaper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docx
smile790243
 
For this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docxFor this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docx
shanaeacklam
 
Operational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportOperational CyberSecurity Final Case Report
Operational CyberSecurity Final Case Report
James Konderla
 
Paper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docxPaper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docx
honey690131
 
InstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organInstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organ
lauricesatu
 
Submit by 6am on 16th JuneAs a backlash, the professional mode.docx
Submit by 6am on 16th JuneAs a backlash, the professional mode.docxSubmit by 6am on 16th JuneAs a backlash, the professional mode.docx
Submit by 6am on 16th JuneAs a backlash, the professional mode.docx
picklesvalery
 
This assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docxThis assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docx
howardh5
 
Share with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxShare with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docx
bagotjesusa
 
The first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docxThe first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docx
rhetttrevannion
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docx
briancrawford30935
 
Paper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docxPaper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docx
loganta
 
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docxPaper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
jakeomoore75037
 
InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework
lauricesatu
 
An explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docxAn explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docx
nettletondevon
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
aryan532920
 

Similar to 4Terry Childs Case Review - Firion Simtray Report - Standar.docx (20)

Paper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docxPaper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docx
 
Paper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docxPaper A Application of a decision making framework to an IT-rel.docx
Paper A Application of a decision making framework to an IT-rel.docx
 
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
For this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docxFor this assignment, you are given an opportunity to explore and.docx
For this assignment, you are given an opportunity to explore and.docx
 
SANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLPSANS WhatWorks - Compliance & DLP
SANS WhatWorks - Compliance & DLP
 
Operational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportOperational CyberSecurity Final Case Report
Operational CyberSecurity Final Case Report
 
Paper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docxPaper A Application of a decision making framework to an IT-related.docx
Paper A Application of a decision making framework to an IT-related.docx
 
InstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organInstructionsPaper B1 a matrix mapping of a key IT-related organ
InstructionsPaper B1 a matrix mapping of a key IT-related organ
 
Submit by 6am on 16th JuneAs a backlash, the professional mode.docx
Submit by 6am on 16th JuneAs a backlash, the professional mode.docxSubmit by 6am on 16th JuneAs a backlash, the professional mode.docx
Submit by 6am on 16th JuneAs a backlash, the professional mode.docx
 
This assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docxThis assignment gives you an opportunity to analyze a key IT-r.docx
This assignment gives you an opportunity to analyze a key IT-r.docx
 
Share with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docxShare with the class the most valuable topic or subject area you l.docx
Share with the class the most valuable topic or subject area you l.docx
 
The first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docxThe first step of this assignment is an opportunity to analyze a.docx
The first step of this assignment is an opportunity to analyze a.docx
 
Project DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docxProject DescriptionApply decision-making frameworks to IT-rela.docx
Project DescriptionApply decision-making frameworks to IT-rela.docx
 
Paper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docxPaper Ba matrix mapping of a key IT-related organizational .docx
Paper Ba matrix mapping of a key IT-related organizational .docx
 
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docxPaper B1 a matrix mapping of a key IT-related organizational (or pe.docx
Paper B1 a matrix mapping of a key IT-related organizational (or pe.docx
 
InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework InstructionsPaper A Application of a decision making framework
InstructionsPaper A Application of a decision making framework
 
An explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docxAn explanation of the Doing Ethics Technique Graham R Seach .docx
An explanation of the Doing Ethics Technique Graham R Seach .docx
 
Best practices to mitigate data breach risk
Best practices to mitigate data breach riskBest practices to mitigate data breach risk
Best practices to mitigate data breach risk
 
BBA 3551, Information Systems Management 1 Course Lea.docx
 BBA 3551, Information Systems Management 1 Course Lea.docx BBA 3551, Information Systems Management 1 Course Lea.docx
BBA 3551, Information Systems Management 1 Course Lea.docx
 
Rothke Patchlink
Rothke    PatchlinkRothke    Patchlink
Rothke Patchlink
 

More from blondellchancy

1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx
blondellchancy
 
1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx
blondellchancy
 
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
blondellchancy
 
1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx
blondellchancy
 
1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx
blondellchancy
 
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
blondellchancy
 

More from blondellchancy (20)

1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx1. Report contentThe report should demonstrate your understa.docx
1. Report contentThe report should demonstrate your understa.docx
 
1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx1. Research the assessment process for ELL students in your state. W.docx
1. Research the assessment process for ELL students in your state. W.docx
 
1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx1. Reply:2.Reply:.docx
1. Reply:2.Reply:.docx
 
1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx1. Review the three articles about Inflation that are of any choice..docx
1. Review the three articles about Inflation that are of any choice..docx
 
1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx1. Read the RiskReport to see what requirements are.2. Read the .docx
1. Read the RiskReport to see what requirements are.2. Read the .docx
 
1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx1. Quantitative According to the scoring criteria for the BAI, .docx
1. Quantitative According to the scoring criteria for the BAI, .docx
 
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
1. Prof. Lennart Van der Zeil’s theorem says that any programmin.docx
 
1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx1. Review the results of your assessment using the explanation.docx
1. Review the results of your assessment using the explanation.docx
 
1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx1. Search the internet and learn about the cases of nurses Julie.docx
1. Search the internet and learn about the cases of nurses Julie.docx
 
1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx1. Qualitative or quantitative paperresearch required(Use stati.docx
1. Qualitative or quantitative paperresearch required(Use stati.docx
 
1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx1. Prepare a one page paper on associative analysis. You may researc.docx
1. Prepare a one page paper on associative analysis. You may researc.docx
 
1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx1. Prepare a comparative table in which you contrast the charact.docx
1. Prepare a comparative table in which you contrast the charact.docx
 
1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx1. Portfolio part II a) APRN protocol also known as collab.docx
1. Portfolio part II a) APRN protocol also known as collab.docx
 
1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx1. Post the link to one news article, preferably a piece of rece.docx
1. Post the link to one news article, preferably a piece of rece.docx
 
1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx1. Please explain fixed and flexible budgeting. Provide an examp.docx
1. Please explain fixed and flexible budgeting. Provide an examp.docx
 
1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx1. Open and print the Week 6 Assignment.2. The assignment .docx
1. Open and print the Week 6 Assignment.2. The assignment .docx
 
1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx1. Plato’s Republic takes as its point of departure the question of .docx
1. Plato’s Republic takes as its point of departure the question of .docx
 
1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx1. Objective Learn why and how to develop a plan that encompasses a.docx
1. Objective Learn why and how to develop a plan that encompasses a.docx
 
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
1. Open the attached Excel Assignment.xlsx” file and name it LastN.docx
 
1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx1. must be a research article from either pubmed or google scholar..docx
1. must be a research article from either pubmed or google scholar..docx
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 

4Terry Childs Case Review - Firion Simtray Report - Standar.docx

  • 1. 4 Terry Childs Case Review - Firion Simtray Report - Standards, Policies, and Guidelines Definition - Profile Matrix - Case issues and Solution s Template - Cybersecurity Recommendations Presentation - Step 1: Review the Terry Childs Case Before getting started on the presentation, you will want to first learn about the Terry Childs case. Research the case and write a one-page summary of your findings. Your summary should answer the following questions: · What led to Childs being charged with a crime? · How did his employer respond to his actions? What did it do right and/or wrong? · What could the company have done to better secure its assets? Your summary should be thorough and include a references page. The information gathered will be used in your final presentation. You will use this summary as Appendix A to your presentation.
  • 2. Submit the Terry Childs Case Review for feedback. Step 2: Project Practice - SIMTRAY Firion: Day 1 Now that you have been introduced to an actual case of insider threats, you will practice handling insiders in a simulated environment. The world of cybersecurity is populated with diverse people with a diversity of perspectives. Every now and then, individuals may violate certain standards of behavior or ethics. It is in an organization's best interest to identify these people and address their core issues, either through motivation, incentives, or by developing a strong relationship with them. In the event that this course of action fails, organizations must be prepared to employ graduated adverse personnel actions. You will learn how to resolve issues and provide a secure environment by exploring the SIMTRAY titled, "Firion: Find Your Way in Three Days." SIMTRAY is a simulation that presents you with scenarios that will provide insight into how information security management handles various issues. Some of the issues and topics addressed in this exercise include hacker profiles, insider threats, laws concerning privacy, anonymity - definition, and digital rights management. The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Record your best score and at least one
  • 3. lesson learned from the exercise to include in your report at the end of the three-day simulation. Step 3: Project Practice - SIMTRAY Firion: Day 2 In the previous step, you started to examine the SIMTRAY, "Firion: Find Your Way in Three Days." In this step, continue to focus on SIMTRAY, but document the specific issues that you would like to include in your presentation. You may encounter the following topics in this exercise: hacker profiles, insider threats, laws concerning privacy, anonymity - definition, and digital rights management. The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Record your best score and at least one lesson learned from the exercise to include in your report at the end of the three-day simulation. Step 4: Project Practice - SIMTRAY Firion: Day 3 In this step, you should continue to explore the scenarios within SIMTRAY, "Firion: Find Your Way in Three Days." If you have not already, you will most likely encounter the following topics in this exercise: hacker profiles, insider threats, laws concerning privacy, anonymity - definition, and digital rights management. Document specific issues that you experience in
  • 4. the exercise that you would like to include in your presentation. Think about how these issues might be addressed by guidelines and policy. The SIMTRAY will provide you with scores to give you a sense on how well you are grasping the concepts. The sections are timed for 30 minutes; however, you can run the SIMTRAY as many times as you need. Compile your recorded scores, lessons learned, and documented industry issues into a one-page report. You will use this report as Appendix B to your presentation. Submit your Firion Simtray Report for feedback. Step 5: Psychological Factors In the previous three steps, you completed simulation activities handling insiders. In the next few steps, you'll examine intrusion motives / hacker psychology. In order to fully understand the Terry Childs case, it is important to understand that one's internal motivations play a significant role in their actions. Your next assignment will require you to create a Psychological Factor Matrix that summarizes types of hackers and actors, their motivations, and what sort of standards, policies, and guidelines would be most suitable to mitigate their impact. In order to prepare for this assignment, you will need to dig deeper into the psychological factors that affect hackers. Review the hacker psychology and sociological aspects resource on the hackers and
  • 5. actors topic page and document the following: · What psychological factors motivate hackers and actors (e.g., addiction, crime, greed, status)? · Give examples where these motivations were a factor in a cyberattack. · What can organizations do to be more proactive in identifying and addressing these threats? While you do not need to submit your findings, they will be essential to the completion of your Profile Matrix in a later step. Step 6: Hacking as an Addiction After considering psychological factors of hackers and actors in the last step, you will expand your exploration into the concept of hacking as an addiction. In examining the psychological factors of hackers, some mental health and criminal justice professionals contend that hacking is an "addiction" and causes obsessive, risk-taking behavior in a manner similar to illegal narcotics—hackers hack to "get high" from the thrill of breaking into a system and getting away with it. Examine and document your thoughts on the following questions: · Should policy makers look toward treatment, rather than incarceration, as to the disposition of hackers? Why or why not? Think about this question in relation to the Childs case and how
  • 6. it will affect your recommendations. Post your thoughts to the discussion board for feedback Step 7: Ethical vs. Unethical Hackers As the cybersecurity field expands, the larger community discourse leads to changes in terminology. While some of our course materials may differentiate between the terms "hackers" and "crackers" as threat actors, we will use the terms "ethical hackers" and "nonethical hackers" to make the same differentiation. Learn about the different types of hackers, or non-state actors, and document the following: · How do the profiles for ethical and unethical hackers differ? · Should these psychological attributes make a difference as to the amount of, or nature of the punishment meted out to those who are caught? Why or why not? · Describe how certain factors can also motivate ethical hackers, or those who defend against cyberattacks? (e.g., revenge, patriotism, fear of government abuse, pride, respect for the law, ownership, anger, retaliation). While you do not need to submit your findings, they will be essential to the completion of your matrix in a later step. Step 8: Hacker Profiling In the previous step, you learned about the psychological factors that motivate hackers. In this step, you will go a bit
  • 7. further by learning how to profile hackers -- a skill that is essential to the success of cybersecurity professionals. Read about hacker profiling hackers and document the following: · How do profiles of ethical and unethical hackers differ? · While psychological profiling of criminals is not a new field, should we attempt to profile cybercriminals? · What sort of things do we already know about the personalities of cybercriminals? · Do we have enough evidence to indicate there is a distinct psychological pattern that would help in the apprehension of cybercriminals? In the next step, you will use all the information you've learned about hackers to create a matrix. Step 9: Define Standards, Policies, and Guidelines Before you can complete the Profile Matrix and develop solutions for your company, you will need to take a closer look at how standards, policies, and guidelines affect a company's security posture. You probably already have questions about what policies were in place prior to the Childs incident. In this step, you dig deeper and learn more about the difference between standards, policies, and guidelines by creating a two- to three-page comparison report. Your report should answer the following questions: · What is the difference between standards, policies, and
  • 8. guidelines? · How do they relate to one another? · How well do they work in securing networks and data within the organization? This report is particularly important because it will affect the recommendations you make to your boss regarding the case. You will use this report as Appendix C to your presentation. Submit your Standards, Policies, and Guidelines Definition for feedback. Step 10: Profile Matrix Now that you have familiarized yourself with the concepts of hackers and standards, policies, and guidelines, it is important to understand how to match the two in an organization. For this assignment, prepare a Profile Matrix that lists the different types of hackers in the first column, and for each, list the psychological profile, main motivations, threats to the organization, benefits to the organization, and whether or not a standard, guideline, or policy best applies to them. Be sure to identify an example of a standard, guideline, or policy that may apply. You should identify a minimum of six hacker-type examples. This will assist you in both helping upper management identify insider threats and to prevent future breaches. Finally, at this point in your assignment, you should have
  • 9. encountered concerns about using profiles to "watch" employees and the benefits and dangers of doing so. Include a short paragraph about your findings to the matrix. Submit your Profile Matrix for feedback. Step 11: Insider Threat eLearning Module - Insider Fraud at Daytona Investment Bank Now that you've completed your profile matrix, the next step will be for you to investigate an insider threat scenario. This exercise discusses a fictitious scenario about Insider Fraud at Daytona Investment Bank. In the scenario an internal investigation revealed that Shane Kerry, an arbitrage trader specializing in Asian stock markets, used his knowledge of the bank's internal information security controls to disguise fraudulent transactions. These transactions resulted in a loss of $2 billion. After completing the exercise, answer the following question: · Could specific standards, policies, and guidelines or other countermeasures have prevented these fraudulent transactions? Please explain. Post your answer to the discussion board for feedback Step 12: Case Issues and