SlideShare a Scribd company logo
1 of 44
Running Head: Personal Reflection 1
Personal Reflection 1
Personal Reflection
By
Anil Kumar Bandi
Professor Dr. Giovanni Silvestri
University of Cumberlands
Emerging Threats & Countermeas (ITS-834-07)
Abstract
This practical connect assignment is based on my learnings and
take-aways from this course. This paper addresses the various
aspects of my learnings and how I can apply the learnings in my
workplace. Further, major learnings and some important
concepts that I have learnt have been discussed. Importance of
security issues of IT systems have been discussed as well.
Information Technology has started to affect all aspects of
human life in various manners. The impact of this is that IT has
become an integral part of the lives of everyone in their
professional as well as personal space. As a professional
working with the development of IT, my job as a software
engineer requires me to have a detailed knowledge of all the
changes that are being introduced in the area of information
technology and the new tools that have been developed for
assisting the professionals in the technical area.
I took up this course for the sake of increasing and expanding
my knowledge in the different areas of implementing IT
services at a workplace. Through the course, I learned about the
different types of security measures that are important for a
company. I learned about some of the basic types of attacks that
can happen on the companies like the one I work for. I also
understood about the ways in which the hackers and cyber
attackers have changed their ways of stealing data and
information and the measures that an IT professional can take in
order to protect the information of their company from such
attacks (Stallings, 2016).
One of the most important concepts that I leaned from this
course is about the details of developing a security unit IT
system. As the nature of the cyber-attacks has become much
diverse than it was a few years back, installing firewalls on the
IT unit cannot guarantee a complete protection from these kinds
of attacks. Apart from this, there are many new kinds of attacks
that have started to be practiced because it is difficult to detect
them for a system administrator like the DDoS attacks. Through
this course, I learned about some of these types of attacks and
the ways in which the effect of such attacks can be mitigated
while ensuring that the threats are reduced for the future as well
(Graham et al., 2016).
Another important aspect of IT that I learned about in the
course that I found very interesting was that of the protection of
National Infrastructure. through the course, I learned that there
are much complicated and sophisticated systems that the various
national departments of the country are using. Considering that
these systems affect the life of the common people due to the
abundance of information stored in them, the security of these
systems be a major challenge. However, in order to overcome
these challenges, experts are continuously working on
techniques like separation, correlation, diversity, commonality
and depth (Bullock et al., 2017).
By learning all these concepts, I believe that I have become a
better informed professional and I can use the information that I
have gained from this course into my personal work space.
Through these methods, I am already contribution to a much
safer security system that s being developed by the IT unit of
my company. I have also learned about the importance of
information and staying updated during the course which I will
continue to do on my own level after it is over (Mingst et al.,
2018).
References
Bullock, J. A., Haddow, G. D., & Coppola, D. P.
(2017). Homeland security: the essentials. Butterworth-
Heinemann.
Graham, J., Olson, R., & Howard, R. (2016). Cyber security
essentials. Auerbach Publications.
Mingst, K. A., McKibben, H. E., & Arreguin-Toft, I. M.
(2018). Essentials of international relations. WW Norton &
Company.
Stallings, W. (2016). Network security essentials: applications
and standards. Pearson.
1
Copyright © 2012, Elsevier Inc.
All Rights Reserved
Chapter 11
Response
Cyber Attacks
Protecting National Infrastructure, 1st ed.
2
• Incident response process is the most familiar
component of any cyber security program
• A cyber security program will contain at least the
following
– Incident trigger
– Expert gathering
– Incident analysis
– Response activities
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Introduction
3
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Fig. 11.1 – General incident response
process schema
4
• There are two fundamental types of triggers
– Tangible, visible effects of an attack
– Early warning and indications information
• Thus, two approaches to incident response processes
– Front-loaded prevention
– Back-loaded recovery
• The two approaches should be combined for
comprehensive response picture
• Protecting national assets is worth suffering a high
number of false positives
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Pre- Versus Post-Attack Response
5
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Fig. 11.2 – Comparison of front-loaded
and back-loaded response processes
6
• Front-loaded prevention critical to national
infrastructure protection
• Taxonomy of early warning process triggers
– Vulnerability information
– Changes in profiled behavioral metrics
– Match on attack metric pattern
– Component anomalies
– External attack information
• Front-loaded prevention have a high sensitivity to
triggers
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Indications and Warning
7
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Fig. 11.3 – Comparison of trigger
intensity threshold for response
8
• Optimal incident response team includes two
components
– A core set of individuals
– A set of subject matter experts
• In complex settings, with multiple incidents,
important for team to not work at cross-purposes
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Incident Response Teams
9
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Fig. 11.4 – Management of
simultaneous response cases
10
• Response teams in a national setting must plan for
multiple concurrent attacks aimed at a company or
agency
• Considerations for proper planning include
– Avoidance of a single point of contact individual
– Case management automation
– Organizational support for expert involvement
– 24/7 operational support
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Incident Response Teams
11
• Questions addressed in the forensic analysis process
include
– Root cause
– Exploits
– State
– Consequences
– Action
• Great care must be taken to protect and preserve
evidence
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Forensic Analysis
12
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Fig. 11.5 – Generic high-level forensic
process schema
13
• Internal expert most likely the best to lead a
company investigation
• Forensic analysts need the following
– Culture of relative freedom
– Access to interesting technology
– Ability to interact externally
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Forensic Analysis
14
• Should law enforcement be involved and called upon
for support?
• Carefully review local, regional, and national laws
regarding when law enforcement must be contacted
• Figure 11.6 outlines a decision process
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Law Enforcement Issues
15
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Fig. 11.6 – Decision process for law
enforcement involvement in forensics
16
• Three Components of a Disaster Recovery Program
– Preparation
– Planning
– Practice
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Disaster Recovery
17
Fig. 11.7 – Disaster recovery exercise
configurations
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
18
• National programs can provide centralized
coordination
– Intrasector coordination should be encouraged
• Currently, coordination is not the main focus of most
national emergency response team programs
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
National Response Program
19
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
1
–
R
e
s
p
o
n
s
e
Fig. 11.8 – National response program
coordination interfaces
1
Copyright © 2012, Elsevier Inc.
All Rights Reserved
Chapter 10
Awareness
Cyber Attacks
Protecting National Infrastructure, 1st ed.
2
• Situational awareness is the real-time understanding
within an organization of its security risk posture
• Awareness of security posture requires consideration
of the following
– Known vulnerabilities
– Security infrastructure
– Network and computing architecture
– Business environment
– Global threats
– Hardware and software profiles
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
Introduction
3
Fig. 10.1 – Optimal period of system
usage for cyber security
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
4
• Factoring in all elements of situational awareness
should create an overview of current security risk
• Descriptors such as high, medium, and low are too
vague to be helpful
• Security risk levels should be linked with actionable
items
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
Introduction
5
Fig. 10.2 – Rough dashboard estimate
of cyber security posture
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
6
Fig. 10.3 – Security posture changes
based on activity and response
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
7
Detecting Infrastructure Attacks
• No security task is more difficult and complex than
the detection of an ongoing attack
• Many tools for detecting attack, yet none
comprehensive or foolproof
• Determination of risk level is a fluid process
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
8
Fig. 10.4 – Attack confidence changes
based on events
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
9
Managing Vulnerability Information
• Situational awareness for national infrastructure
protection requires a degree of attention to daily
trivia around vulnerability information
• Practical heuristics for managing vulnerability
information
– Structured collection
– Worst case assumptions
– Nondefinitive conclusions
– Connection to all sources
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
10
Fig. 10.5 – Vulnerability management
structure
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
11
Managing Vulnerability Information
• Three basic rules for managers
– Always assume adversary knows as much or more about
your infrastructure
– Assume the adversary is always keeping vulnerability-
related secrets from you
– Never assume you know everything relevant to the
security of your infrastructure
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
12
Cyber Security Intelligence Reports
• Daily cyber security intelligence reports are standard
in government agencies
• They would be useful in enterprise settings
• A cyber security intelligence report would include
– Current security posture
– Top and new security risks
– Automated metrics
– Human interpretation
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
13
Cyber Security Intelligence Reports
• Tasks for creating a cyber security intelligence report
– Intelligence gathering
– Interpretation and publication
– Dissemination and archiving
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
14
Fig. 10.6 – Cyber security intelligence
report creation and dissemination
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
15
Risk Management Process
• Security risks must be tracked and prioritized
• Generally agreed upon approach to measuring risk
associated with specific components begins with two
estimations
– Liklihood
– Consequences
• Actual numeric value of risk less important than
overall relative risk
• A useful construct compares security risk against cost
of recommended action
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
16
Fig. 10.7 – Risk versus cost decision
path structure
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
17
Risk Management Process
• Increasing risks likely incur increased costs
• Summary of management considerations
– Maintaining a prioritized list of security risks
– Justifying all decisions
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
18
Security Operations Centers
• The security operations center (SOC) is the most
visible realization of real-time security situational
awareness
• Most SOC designs begin with centralized model – a
facility tied closely to operation
• A global dispersal of SOC resources is an around-the-
clock real-time analysis of security threats
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
19
Fig. 10.8 – Security operations center
(SOC) high-level design
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
20
• A national-level view of security posture will require
consideration of the following
– Commercial versus government information
– Information classification
– Agency politics
– SOC responsibility
Copyright © 2012, Elsevier Inc.
All rights Reserved
C
h
a
p
te
r 1
0
–
A
w
a
re
n
e
s
s
National Awareness Program
Your final research paper assignment is to write a research
paper that explains how defense-in-depth (chapter 6) and
awareness (chapter 10) are complimentary techniques to detect
emerging threats and strengthen countermeasures.
To complete this assignment, upload a Microsoft Word
document (.doc or .docx) that contains your complete paper.
Remember that your list of sources must be in APA format, and
you MUST cite your reference in the body of the paper using
APA in-text citation format. A source is any paper or article
that you will reference in your paper. If you need more
information on APA format (for references list AND in-text
citations), visit this reference:
https://owl.english.purdue.edu/owl/resource/560/01/
This assignment must be YOUR OWN WORK! This is an
individual assignment. Plagiarism detected in your work will
result in a grade of zero for the entire paper. (Originality report
should be at least 35% or less.)
Here are a few details about the overall research paper Please
look at the attached rubric for details on how the paper will be
graded.
You must reference two (2) peer-reviewed articles or papers
that support your thesis statement. One of these papers may be
from your annotated bibliography assignment. The final paper
must be at least 500 words in length. (DO NOT exceed 500
words by a material amount. Excessive words or too many
references will NOT impress me.)
So in summary, here are the research paper requirements:
· 2 peer reviewed resources (articles or papers) (1 may be from
your annotated bibliography assignment)
· Paper MUST address: How defense-in-depth (chapter 6) and
awareness (chapter 10) are complimentary techniques to detect
emerging threats and strengthen countermeasures
· Cited sources must directly support your paper (i.e. not
incidental references)
· At least 500 words in length (but NOT longer than 1000
words)
· Originality report should be at least 35% or less.
Admin Notes:
APA Paper Formatting guidelines
1.Title page
2.Abstract
3.Body
4.Text citation and references
Additionally
-As usual, the text is typed on standard white paper that has
familiar parameters of 8.5" x 11".
-The APA style requires using an easy to read font and
recommends using a 12pt Times New Roman font.
-Double spacing is required on both the title page and
throughout the paper.
-Margins should be 1" concerning all sides of the page.
-Paragraph indentation should be set to one half inch from the
left side of the page.
-The unique aspect is in creating a special page header that
consists of the page number and the running head as typed on
the title page in all capitals.

More Related Content

Similar to Running Head Personal Reflection1Personal Reflection1.docx

End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness PresentationCristian Mihai
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxjenkinsmandie
 
9213A Sampling of SettingsAfter reviewing the basi.docx
9213A Sampling of SettingsAfter reviewing the basi.docx9213A Sampling of SettingsAfter reviewing the basi.docx
9213A Sampling of SettingsAfter reviewing the basi.docxevonnehoggarth79783
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...robbiesamuel
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesIJNSA Journal
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020Jessica Graf
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedTiffany Graham
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas IlyasSundas Kayani
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework helpOlivia Fournier
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber SecurityJohn Gilligan
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...IRJET Journal
 
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docxENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docxgidmanmary
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESIJNSA Journal
 
rp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responserp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responseMaciej Buczkowski
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information SecuritySARJERAO Sarju
 
ISM and its impact on Government Project Delivery
ISM and its impact on Government Project DeliveryISM and its impact on Government Project Delivery
ISM and its impact on Government Project DeliveryKevin Landale
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxmattjtoni51554
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackMekhi Da ‘Quay Daniels
 

Similar to Running Head Personal Reflection1Personal Reflection1.docx (20)

End User Security Awareness Presentation
End User Security Awareness PresentationEnd User Security Awareness Presentation
End User Security Awareness Presentation
 
Essay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docxEssay QuestionsAnswer all questions below in a single document, pr.docx
Essay QuestionsAnswer all questions below in a single document, pr.docx
 
9213A Sampling of SettingsAfter reviewing the basi.docx
9213A Sampling of SettingsAfter reviewing the basi.docx9213A Sampling of SettingsAfter reviewing the basi.docx
9213A Sampling of SettingsAfter reviewing the basi.docx
 
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...Boardroom to War Room:  Practical Application of the NIST Cybersecurity Frame...
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
 
Complete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resourcesComplete network security protection for sme's within limited resources
Complete network security protection for sme's within limited resources
 
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
The Role of Information Security Policy Jessica Graf Assignment 1 Unit 8 IAS5020
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
 
University of maryland infa 620 homework help
University of maryland infa 620 homework helpUniversity of maryland infa 620 homework help
University of maryland infa 620 homework help
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
 
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
An Effective Cybersecurity Awareness Training Model: First Defense of an Orga...
 
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docxENG 132Evaluation Argument  One Flew Over the Cuckoo’s NestSp.docx
ENG 132Evaluation Argument One Flew Over the Cuckoo’s NestSp.docx
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCESCOMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
COMPLETE NETWORK SECURITY PROTECTION FOR SME’SWITHIN LIMITED RESOURCES
 
rp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-responserp-esg-tackling-attack-detection-incident-response
rp-esg-tackling-attack-detection-incident-response
 
is_1_Introduction to Information Security
is_1_Introduction to Information Securityis_1_Introduction to Information Security
is_1_Introduction to Information Security
 
ISM and its impact on Government Project Delivery
ISM and its impact on Government Project DeliveryISM and its impact on Government Project Delivery
ISM and its impact on Government Project Delivery
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 

More from jeanettehully

250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docxjeanettehully
 
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docxjeanettehully
 
270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docxjeanettehully
 
250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docxjeanettehully
 
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docxjeanettehully
 
2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docxjeanettehully
 
2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docxjeanettehully
 
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docxjeanettehully
 
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docxjeanettehully
 
250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docxjeanettehully
 
2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docxjeanettehully
 
29Answer[removed] That is the house whe.docx
29Answer[removed]                    That is the house whe.docx29Answer[removed]                    That is the house whe.docx
29Answer[removed] That is the house whe.docxjeanettehully
 
250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docxjeanettehully
 
25. For each of the transactions listed below, indicate whether it.docx
25.   For each of the transactions listed below, indicate whether it.docx25.   For each of the transactions listed below, indicate whether it.docx
25. For each of the transactions listed below, indicate whether it.docxjeanettehully
 
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docxjeanettehully
 
250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docxjeanettehully
 
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docxjeanettehully
 
250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docxjeanettehully
 
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docxjeanettehully
 
22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docxjeanettehully
 

More from jeanettehully (20)

250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx250-500  words APA format cite references  Check this scenario out.docx
250-500  words APA format cite references  Check this scenario out.docx
 
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
2 DQ’s need to be answers with Zero plagiarism and 250 word count fo.docx
 
270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx270w3Respond to the followingStress can be the root cause of ps.docx
270w3Respond to the followingStress can be the root cause of ps.docx
 
250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx250 word response. Chicago Style citingAccording to Kluver, what.docx
250 word response. Chicago Style citingAccording to Kluver, what.docx
 
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx250+ Words – Strategic Intelligence CollectionChoose one of th.docx
250+ Words – Strategic Intelligence CollectionChoose one of th.docx
 
2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx2–3 pages; APA formatDetailsThere are several steps to take w.docx
2–3 pages; APA formatDetailsThere are several steps to take w.docx
 
2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx2LeadershipEighth Edition3To Madison.docx
2LeadershipEighth Edition3To Madison.docx
 
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
250 Word Resoponse. Chicago Style Citing.According to Kluver, .docx
 
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
250 word mini essay question.Textbook is Getlein, Mark. Living wi.docx
 
250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx250 word discussion post--today please. Make sure you put in the dq .docx
250 word discussion post--today please. Make sure you put in the dq .docx
 
2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx2By 2015, projections indicate that the largest category of househ.docx
2By 2015, projections indicate that the largest category of househ.docx
 
29Answer[removed] That is the house whe.docx
29Answer[removed]                    That is the house whe.docx29Answer[removed]                    That is the house whe.docx
29Answer[removed] That is the house whe.docx
 
250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx250 words discussion not an assignementThe purpose of this discuss.docx
250 words discussion not an assignementThe purpose of this discuss.docx
 
25. For each of the transactions listed below, indicate whether it.docx
25.   For each of the transactions listed below, indicate whether it.docx25.   For each of the transactions listed below, indicate whether it.docx
25. For each of the transactions listed below, indicate whether it.docx
 
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
250-word minimum. Must use textbook Jandt, Fred E. (editor) Intercu.docx
 
250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx250-500  words APA format cite references  Check this scenario o.docx
250-500  words APA format cite references  Check this scenario o.docx
 
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx250+ Words – Insider Threat Analysis  Penetration AnalysisCho.docx
250+ Words – Insider Threat Analysis Penetration AnalysisCho.docx
 
250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx250 wordsUsing the same company (Bank of America) that you have .docx
250 wordsUsing the same company (Bank of America) that you have .docx
 
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
250 mini essay questiontextbook Getlein, Mark. Living with Art, 9.docx
 
22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx22.¿Saber o conocer…   With a partner, tell what thes.docx
22.¿Saber o conocer…   With a partner, tell what thes.docx
 

Recently uploaded

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Running Head Personal Reflection1Personal Reflection1.docx

  • 1. Running Head: Personal Reflection 1 Personal Reflection 1 Personal Reflection By Anil Kumar Bandi Professor Dr. Giovanni Silvestri University of Cumberlands Emerging Threats & Countermeas (ITS-834-07) Abstract This practical connect assignment is based on my learnings and take-aways from this course. This paper addresses the various aspects of my learnings and how I can apply the learnings in my workplace. Further, major learnings and some important concepts that I have learnt have been discussed. Importance of security issues of IT systems have been discussed as well.
  • 2. Information Technology has started to affect all aspects of human life in various manners. The impact of this is that IT has become an integral part of the lives of everyone in their professional as well as personal space. As a professional working with the development of IT, my job as a software engineer requires me to have a detailed knowledge of all the changes that are being introduced in the area of information technology and the new tools that have been developed for assisting the professionals in the technical area. I took up this course for the sake of increasing and expanding my knowledge in the different areas of implementing IT services at a workplace. Through the course, I learned about the different types of security measures that are important for a company. I learned about some of the basic types of attacks that can happen on the companies like the one I work for. I also understood about the ways in which the hackers and cyber attackers have changed their ways of stealing data and information and the measures that an IT professional can take in order to protect the information of their company from such attacks (Stallings, 2016). One of the most important concepts that I leaned from this course is about the details of developing a security unit IT system. As the nature of the cyber-attacks has become much diverse than it was a few years back, installing firewalls on the IT unit cannot guarantee a complete protection from these kinds of attacks. Apart from this, there are many new kinds of attacks that have started to be practiced because it is difficult to detect them for a system administrator like the DDoS attacks. Through this course, I learned about some of these types of attacks and
  • 3. the ways in which the effect of such attacks can be mitigated while ensuring that the threats are reduced for the future as well (Graham et al., 2016). Another important aspect of IT that I learned about in the course that I found very interesting was that of the protection of National Infrastructure. through the course, I learned that there are much complicated and sophisticated systems that the various national departments of the country are using. Considering that these systems affect the life of the common people due to the abundance of information stored in them, the security of these systems be a major challenge. However, in order to overcome these challenges, experts are continuously working on techniques like separation, correlation, diversity, commonality and depth (Bullock et al., 2017). By learning all these concepts, I believe that I have become a better informed professional and I can use the information that I have gained from this course into my personal work space. Through these methods, I am already contribution to a much safer security system that s being developed by the IT unit of my company. I have also learned about the importance of information and staying updated during the course which I will continue to do on my own level after it is over (Mingst et al., 2018). References Bullock, J. A., Haddow, G. D., & Coppola, D. P. (2017). Homeland security: the essentials. Butterworth- Heinemann. Graham, J., Olson, R., & Howard, R. (2016). Cyber security essentials. Auerbach Publications. Mingst, K. A., McKibben, H. E., & Arreguin-Toft, I. M. (2018). Essentials of international relations. WW Norton & Company. Stallings, W. (2016). Network security essentials: applications and standards. Pearson.
  • 4. 1 Copyright © 2012, Elsevier Inc. All Rights Reserved Chapter 11 Response Cyber Attacks Protecting National Infrastructure, 1st ed. 2 • Incident response process is the most familiar component of any cyber security program • A cyber security program will contain at least the following – Incident trigger – Expert gathering – Incident analysis – Response activities Copyright © 2012, Elsevier Inc.
  • 5. All rights Reserved C h a p te r 1 1 – R e s p o n s e Introduction 3 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te
  • 6. r 1 1 – R e s p o n s e Fig. 11.1 – General incident response process schema 4 • There are two fundamental types of triggers – Tangible, visible effects of an attack – Early warning and indications information • Thus, two approaches to incident response processes – Front-loaded prevention – Back-loaded recovery • The two approaches should be combined for comprehensive response picture • Protecting national assets is worth suffering a high number of false positives
  • 7. Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 1 – R e s p o n s e Pre- Versus Post-Attack Response 5 Copyright © 2012, Elsevier Inc. All rights Reserved C h
  • 8. a p te r 1 1 – R e s p o n s e Fig. 11.2 – Comparison of front-loaded and back-loaded response processes 6 • Front-loaded prevention critical to national infrastructure protection • Taxonomy of early warning process triggers – Vulnerability information – Changes in profiled behavioral metrics – Match on attack metric pattern – Component anomalies
  • 9. – External attack information • Front-loaded prevention have a high sensitivity to triggers Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 1 – R e s p o n s e Indications and Warning 7 Copyright © 2012, Elsevier Inc.
  • 10. All rights Reserved C h a p te r 1 1 – R e s p o n s e Fig. 11.3 – Comparison of trigger intensity threshold for response 8 • Optimal incident response team includes two components – A core set of individuals – A set of subject matter experts • In complex settings, with multiple incidents, important for team to not work at cross-purposes
  • 11. Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 1 – R e s p o n s e Incident Response Teams 9 Copyright © 2012, Elsevier Inc. All rights Reserved C h
  • 12. a p te r 1 1 – R e s p o n s e Fig. 11.4 – Management of simultaneous response cases 10 • Response teams in a national setting must plan for multiple concurrent attacks aimed at a company or agency • Considerations for proper planning include – Avoidance of a single point of contact individual – Case management automation – Organizational support for expert involvement – 24/7 operational support
  • 13. Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 1 – R e s p o n s e Incident Response Teams 11 • Questions addressed in the forensic analysis process include – Root cause – Exploits
  • 14. – State – Consequences – Action • Great care must be taken to protect and preserve evidence Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 1 – R e s p o n s e Forensic Analysis
  • 15. 12 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 1 – R e s p o n s e Fig. 11.5 – Generic high-level forensic process schema 13 • Internal expert most likely the best to lead a company investigation • Forensic analysts need the following
  • 16. – Culture of relative freedom – Access to interesting technology – Ability to interact externally Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 1 – R e s p o n s e Forensic Analysis 14 • Should law enforcement be involved and called upon
  • 17. for support? • Carefully review local, regional, and national laws regarding when law enforcement must be contacted • Figure 11.6 outlines a decision process Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 1 – R e s p o n s e Law Enforcement Issues 15
  • 18. Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 1 – R e s p o n s e Fig. 11.6 – Decision process for law enforcement involvement in forensics 16 • Three Components of a Disaster Recovery Program – Preparation – Planning – Practice
  • 19. Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 1 – R e s p o n s e Disaster Recovery 17 Fig. 11.7 – Disaster recovery exercise configurations Copyright © 2012, Elsevier Inc. All rights Reserved
  • 20. C h a p te r 1 1 – R e s p o n s e 18 • National programs can provide centralized coordination – Intrasector coordination should be encouraged • Currently, coordination is not the main focus of most national emergency response team programs Copyright © 2012, Elsevier Inc. All rights Reserved C
  • 21. h a p te r 1 1 – R e s p o n s e National Response Program 19 Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 1
  • 22. – R e s p o n s e Fig. 11.8 – National response program coordination interfaces 1 Copyright © 2012, Elsevier Inc. All Rights Reserved Chapter 10 Awareness Cyber Attacks Protecting National Infrastructure, 1st ed. 2 • Situational awareness is the real-time understanding within an organization of its security risk posture
  • 23. • Awareness of security posture requires consideration of the following – Known vulnerabilities – Security infrastructure – Network and computing architecture – Business environment – Global threats – Hardware and software profiles Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 0 – A w a re n
  • 24. e s s Introduction 3 Fig. 10.1 – Optimal period of system usage for cyber security Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 0 – A w a re n e s
  • 25. s 4 • Factoring in all elements of situational awareness should create an overview of current security risk • Descriptors such as high, medium, and low are too vague to be helpful • Security risk levels should be linked with actionable items Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 0 – A w a re n
  • 26. e s s Introduction 5 Fig. 10.2 – Rough dashboard estimate of cyber security posture Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 0 – A w a re n e s
  • 27. s 6 Fig. 10.3 – Security posture changes based on activity and response Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 0 – A w a re n e s s
  • 28. 7 Detecting Infrastructure Attacks • No security task is more difficult and complex than the detection of an ongoing attack • Many tools for detecting attack, yet none comprehensive or foolproof • Determination of risk level is a fluid process Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 0 – A w a re n e s s
  • 29. 8 Fig. 10.4 – Attack confidence changes based on events Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 0 – A w a re n e s s 9
  • 30. Managing Vulnerability Information • Situational awareness for national infrastructure protection requires a degree of attention to daily trivia around vulnerability information • Practical heuristics for managing vulnerability information – Structured collection – Worst case assumptions – Nondefinitive conclusions – Connection to all sources Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 0 – A w a re
  • 31. n e s s 10 Fig. 10.5 – Vulnerability management structure Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 0 – A w a re n e s
  • 32. s 11 Managing Vulnerability Information • Three basic rules for managers – Always assume adversary knows as much or more about your infrastructure – Assume the adversary is always keeping vulnerability- related secrets from you – Never assume you know everything relevant to the security of your infrastructure Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 0 – A w
  • 33. a re n e s s 12 Cyber Security Intelligence Reports • Daily cyber security intelligence reports are standard in government agencies • They would be useful in enterprise settings • A cyber security intelligence report would include – Current security posture – Top and new security risks – Automated metrics – Human interpretation Copyright © 2012, Elsevier Inc. All rights Reserved C h a p
  • 34. te r 1 0 – A w a re n e s s 13 Cyber Security Intelligence Reports • Tasks for creating a cyber security intelligence report – Intelligence gathering – Interpretation and publication – Dissemination and archiving Copyright © 2012, Elsevier Inc. All rights Reserved C h
  • 35. a p te r 1 0 – A w a re n e s s 14 Fig. 10.6 – Cyber security intelligence report creation and dissemination Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te
  • 36. r 1 0 – A w a re n e s s 15 Risk Management Process • Security risks must be tracked and prioritized • Generally agreed upon approach to measuring risk associated with specific components begins with two estimations – Liklihood – Consequences • Actual numeric value of risk less important than overall relative risk • A useful construct compares security risk against cost of recommended action
  • 37. Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 0 – A w a re n e s s 16 Fig. 10.7 – Risk versus cost decision path structure Copyright © 2012, Elsevier Inc. All rights Reserved
  • 38. C h a p te r 1 0 – A w a re n e s s 17 Risk Management Process • Increasing risks likely incur increased costs • Summary of management considerations – Maintaining a prioritized list of security risks – Justifying all decisions Copyright © 2012, Elsevier Inc.
  • 39. All rights Reserved C h a p te r 1 0 – A w a re n e s s 18 Security Operations Centers • The security operations center (SOC) is the most visible realization of real-time security situational awareness • Most SOC designs begin with centralized model – a facility tied closely to operation
  • 40. • A global dispersal of SOC resources is an around-the- clock real-time analysis of security threats Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 0 – A w a re n e s s 19 Fig. 10.8 – Security operations center (SOC) high-level design Copyright © 2012, Elsevier Inc.
  • 41. All rights Reserved C h a p te r 1 0 – A w a re n e s s 20 • A national-level view of security posture will require consideration of the following – Commercial versus government information – Information classification – Agency politics
  • 42. – SOC responsibility Copyright © 2012, Elsevier Inc. All rights Reserved C h a p te r 1 0 – A w a re n e s s National Awareness Program Your final research paper assignment is to write a research paper that explains how defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures. To complete this assignment, upload a Microsoft Word document (.doc or .docx) that contains your complete paper.
  • 43. Remember that your list of sources must be in APA format, and you MUST cite your reference in the body of the paper using APA in-text citation format. A source is any paper or article that you will reference in your paper. If you need more information on APA format (for references list AND in-text citations), visit this reference: https://owl.english.purdue.edu/owl/resource/560/01/ This assignment must be YOUR OWN WORK! This is an individual assignment. Plagiarism detected in your work will result in a grade of zero for the entire paper. (Originality report should be at least 35% or less.) Here are a few details about the overall research paper Please look at the attached rubric for details on how the paper will be graded. You must reference two (2) peer-reviewed articles or papers that support your thesis statement. One of these papers may be from your annotated bibliography assignment. The final paper must be at least 500 words in length. (DO NOT exceed 500 words by a material amount. Excessive words or too many references will NOT impress me.) So in summary, here are the research paper requirements: · 2 peer reviewed resources (articles or papers) (1 may be from your annotated bibliography assignment) · Paper MUST address: How defense-in-depth (chapter 6) and awareness (chapter 10) are complimentary techniques to detect emerging threats and strengthen countermeasures · Cited sources must directly support your paper (i.e. not incidental references) · At least 500 words in length (but NOT longer than 1000 words) · Originality report should be at least 35% or less. Admin Notes: APA Paper Formatting guidelines 1.Title page 2.Abstract 3.Body
  • 44. 4.Text citation and references Additionally -As usual, the text is typed on standard white paper that has familiar parameters of 8.5" x 11". -The APA style requires using an easy to read font and recommends using a 12pt Times New Roman font. -Double spacing is required on both the title page and throughout the paper. -Margins should be 1" concerning all sides of the page. -Paragraph indentation should be set to one half inch from the left side of the page. -The unique aspect is in creating a special page header that consists of the page number and the running head as typed on the title page in all capitals.