CIS 270 Final Exam Fall 2023

docx

School

Manhattan College *

*We aren’t endorsed by this school

Course

130

Subject

Computer Science

Date

Jan 9, 2024

Type

docx

Pages

10

Uploaded by BailiffTurkeyMaster424

Report
CIS 270 Final Exam Fall 2023 Answer these in your own words (No copy and Paste) – Each section (yellow) to be a minimum of 400 words The Cyber War What is it? The Cyber War" is an all-encompassing term that encapsulates the multifaceted conflicts and activities transpiring in the vast expanse of cyberspace. This digital battleground is marked by a plethora of operations, ranging from sophisticated state-sponsored cyber espionage to financially motivated cybercrime orchestrated by criminal organizations and lone hackers. At its core, The Cyber War represents an ongoing struggle for supremacy and control in the digital realm. This digital theater of war is characterized by a diverse array of tactics, including hacking, phishing, malware attacks, and other cyber threats. The motives driving these activities are equally diverse, spanning from nation-state interests such as intelligence gathering and sabotage to more economically driven objectives like financial theft and extortion. The term acknowledges the dynamic and evolving nature of conflicts in cyberspace, where adversaries continually adapt and innovate to outmaneuver their counterparts. Who is winning and why? Determining a clear victor in The Cyber War is a formidable challenge, as the landscape is marked by a complex interplay of actors with varying capabilities, motivations, and strategies. Major players in this arena include nation-states such as the United States, China, Russia, North Korea, and Iran, each with its own cyber capabilities and objectives. Success in The Cyber War is often measured not in a definitive victory but in achieving specific tactical and strategic objectives. The concept of winning in The Cyber War is fluid, reflecting the ever-changing dynamics of the digital battlefield. The advantage may shift rapidly as actors adapt to emerging technologies and vulnerabilities. The ability to attribute cyber attacks to specific actors is often challenging, adding a layer of complexity to the determination of success or failure. In this dynamic environment, the concept of a decisive winner remains elusive. Why it will never be over? Several factors contribute to the enduring and perpetual nature of The Cyber War, ensuring that a clear endpoint remains elusive: 1. Asymmetry of Power: The varying levels of cyber capabilities among different actors create an ongoing imbalance. Well-equipped and skilled actors can potentially exploit vulnerabilities in less prepared adversaries, perpetuating the asymmetry. 2. Attribution Challenges: One of the defining characteristics of cyberspace is the difficulty in attributing cyber attacks to specific actors. The anonymity and ability to disguise the origin of an attack make it challenging to definitively identify and hold perpetrators accountable. 3. Rapid Technological Advancements: The fast pace of technological advancements means that new
vulnerabilities are constantly emerging. As technology evolves, so do the tools and techniques available to malicious actors, creating a perpetual cycle of innovation and defense. 4. Geopolitical Tensions: The geopolitical landscape is marked by persistent tensions between nations. Cyberspace serves as an additional arena for geopolitical conflicts, and as long as these tensions endure, cyber activities will persist. 5. Economic Motivations: Beyond state-sponsored activities, cyber attacks are driven by economic motives, with criminal organizations and individuals engaging in cybercrime for financial gain. This economic incentive ensures a continuous stream of cyber threats. Given these intricacies, it is unlikely that The Cyber War will culminate in a traditional sense of victory or defeat. Rather, the focus is on managing and mitigating risks, enhancing cybersecurity measures, and establishing international norms and agreements to govern behavior in cyberspace. Ongoing efforts in these areas are crucial for addressing the persistent challenges posed by The Cyber War, ensuring a proactive and adaptive approach to the ever-evolving digital landscape. Endpoint Monitoring What is it and why it is important Endpoint Monitoring refers to the practice of observing and managing the various endpoints or devices within a network. Endpoints are the entry points to a network and include devices such as computers, laptops, smartphones, servers, and any other device that connects to the network. Monitoring these endpoints involves tracking their activities, assessing their security posture, and detecting any potential threats or vulnerabilities. It's a critical component of overall cybersecurity strategies, providing organizations with insights into their digital perimeters and enabling proactive threat detection and response. Endpoint Monitoring plays a pivotal role in cybersecurity for several reasons: 1. Threat Detection and Prevention: Endpoints are often targeted by malicious actors attempting to gain unauthorized access or deploy malware. Monitoring these endpoints allows for the early detection of unusual activities or potential security threats, enabling organizations to respond promptly and prevent potential breaches. 2. Compliance Requirements: Many industries and regulatory bodies have specific compliance requirements regarding data protection and cybersecurity. Endpoint Monitoring helps organizations meet these requirements by ensuring that security policies are enforced and potential vulnerabilities are addressed. 3. Incident Response and Forensics: In the event of a security incident, detailed endpoint monitoring data is invaluable for conducting forensic analyses. It helps security teams understand the nature of the attack, identify its point of entry, and develop strategies to prevent similar incidents in the future.
4. User Behavior Analysis: Monitoring endpoint activities allows organizations to analyze user behavior patterns. This is crucial for identifying anomalous behavior that may indicate a compromised account or insider threat. Understanding normal user behavior aids in distinguishing legitimate activities from potential security risks. 5. Patch Management: Endpoints require regular updates and patches to address known vulnerabilities. Endpoint Monitoring assists in tracking the patch status of devices across the network, ensuring that all systems are up to date and protected against known exploits. Pick a commercial solution -& EXPLAIN Commercial Solution: CrowdStrike Falcon CrowdStrike Falcon is a leading endpoint protection platform that incorporates advanced endpoint monitoring capabilities. It utilizes cloud-native architecture and artificial intelligence to provide real- time protection against a wide range of cyber threats. Key Features: 1. Behavioral Analysis: Falcon employs behavioral analysis to identify and block malicious activities based on deviations from normal behavior. This proactive approach is effective against both known and unknown threats. 2. Endpoint Detection and Response (EDR): Falcon offers EDR capabilities, allowing organizations to investigate and respond to security incidents at the endpoint level. It provides detailed insights into endpoint activities, facilitating swift incident response. 3. Threat Intelligence: CrowdStrike Falcon integrates threat intelligence feeds to stay updated on the latest cyber threats. This enables the platform to proactively defend against emerging threats based on real-time information. 4. Cloud-Native Architecture: The cloud-native architecture of CrowdStrike Falcon enables rapid and scalable deployment. It ensures that organizations can extend protection to all endpoints, regardless of their physical location. 5. Continuous Monitoring: Falcon continuously monitors endpoint activities, providing a comprehensive view of the security posture across the organization. This continuous monitoring is crucial for staying ahead of evolving cyber threats. In conclusion, Endpoint Monitoring, exemplified by solutions like CrowdStrike Falcon, is indispensable for modern cybersecurity strategies. It serves as a vigilant guardian, constantly
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
watching over the digital perimeters of organizations, detecting potential threats, and empowering swift responses to ensure the integrity and security of critical systems and data. Indicators of Compromise What are they Indicators of Compromise (IoC) are artifacts or evidence that suggest a system or network has been breached or compromised. These indicators serve as clues for cybersecurity professionals, helping them identify security incidents, investigate their scope, and mitigate the impact. IoCs encompass a wide range of evidence, including unusual network traffic patterns, suspicious file modifications, unauthorized access logs, and other abnormal activities that may signal a security breach. IoCs are typically categorized into three main types: 1. Technical IoCs: These include artifacts such as malware signatures, unusual network traffic, and anomalous system behavior that indicate a compromise. 2. Behavioral IoCs: These involve patterns of activity that deviate from normal behavior, such as unauthorized access attempts, unusual login times, or unexpected data transfers. 3. Tactical IoCs: These refer to specific tactics, techniques, and procedures (TTPs) used by threat actors, such as the use of specific malware, exploitation methods, or command and control infrastructure. Why are some so easy to detect & some very hard to detect The detectability of IoCs varies based on several factors, and understanding these nuances is crucial for effective cybersecurity: 1. Signature-based Detection: Some IoCs, particularly those associated with known malware or well- defined attack patterns, can be easily detected using signature-based methods. These methods rely on predefined patterns or signatures of known threats. However, they may struggle to identify previously unseen or sophisticated threats. 2. Behavioral Anomalies: IoCs related to unusual or suspicious behavior may be more challenging to detect, as they rely on recognizing deviations from established baselines. Identifying abnormal patterns requires continuous monitoring and analysis of system behavior, which can be resource- intensive. 3. Evasion Techniques: Sophisticated threat actors employ evasion techniques to make IoCs harder to detect. This includes polymorphic malware that changes its signature with each iteration, encryption to conceal malicious activities, and the use of legitimate tools for malicious purposes. These tactics aim to bypass traditional detection methods. 4. IoC Diversity: The wide range of potential IoCs, including technical artifacts, behavioral anomalies,
and tactical indicators, contributes to the complexity of detection. Security teams must employ a diverse set of tools and techniques to effectively identify IoCs across different vectors. 5. Zero-day Exploits: IoCs associated with zero-day exploits, which target vulnerabilities unknown to the vendor, are inherently difficult to detect. Since there are no predefined signatures, behavioral baselines, or known tactics for such exploits, detecting them requires advanced threat intelligence and anomaly detection capabilities. 6. Stealthy Persistence: IoCs related to advanced persistent threats (APTs) often involve subtle and persistent tactics. Threat actors may employ techniques to remain undetected for extended periods, making it challenging to identify IoCs associated with their activities. In conclusion, the detectability of IoCs is influenced by the nature of the indicators, the sophistication of the threat actors, and the capabilities of the detection mechanisms in place. While some IoCs are straightforward to detect using traditional methods, the evolving landscape of cyber threats demands continuous innovation in detection strategies, including the use of advanced analytics, machine learning, and threat intelligence to identify both known and emerging indicators of compromise. SIEM & SOAR & XDR What is SIEM and name a top product Security Information and Event Management (SIEM) is a comprehensive approach to cybersecurity that involves the collection, aggregation, and analysis of log data generated throughout an organization's technology infrastructure. SIEM systems provide real-time monitoring, event correlation, and incident response, enabling security teams to identify and respond to security events effectively. These systems help organizations gain insights into potential threats, monitor user activity, and comply with regulatory requirements. Top SIEM Product: Splunk Enterprise Security Splunk Enterprise Security: Splunk is a widely recognized leader in the SIEM space. Splunk Enterprise Security is a SIEM solution that leverages the power of the Splunk platform to deliver advanced security analytics and threat detection. It enables organizations to correlate data from diverse sources, detect anomalies, and respond to incidents efficiently. Splunk's flexibility and scalability make it suitable for organizations of various sizes, and its integration capabilities with other security tools enhance its effectiveness. What is SOAR and name a top product Security Orchestration, Automation, and Response (SOAR): What is SOAR? Security Orchestration, Automation, and Response (SOAR) is a set of technologies that streamline and automate security operations and incident response. SOAR platforms integrate with various security tools and technologies, allowing organizations to create standardized and automated workflows for responding to security incidents. These platforms help security teams improve
efficiency, reduce response times, and ensure consistent and coordinated responses to security events. Top SOAR Product: Palo Alto Networks Cortex XSOAR Palo Alto Networks Cortex XSOAR: Formerly known as Demisto, Cortex XSOAR is a leading SOAR platform. It offers playbooks for automating and orchestrating responses to incidents, as well as integrations with a wide range of security products. Cortex XSOAR facilitates collaboration among security analysts, automates repetitive tasks, and provides a centralized platform for managing and responding to incidents. Its versatility and adaptability make it a top choice for organizations seeking to enhance their incident response capabilities. What is XDR and name a top product Extended Detection and Response (XDR): What is XDR? Extended Detection and Response (XDR) is an evolution of traditional endpoint detection and response (EDR) solutions. XDR integrates data from various security products, including endpoints, networks, and cloud environments, to provide a holistic view of potential threats. It leverages advanced analytics, machine learning, and threat intelligence to detect and respond to sophisticated cyber threats across multiple vectors, offering a more comprehensive and proactive security approach. Top XDR Product: Trend Micro Vision One Trend Micro Vision One: Trend Micro's Vision One is a notable XDR solution that provides advanced threat detection and response capabilities. It integrates endpoint security, email security, and network security into a unified platform, allowing organizations to correlate and analyze data across these different security domains. Trend Micro Vision One aims to simplify security operations by providing a consolidated view of threats and enabling coordinated responses to mitigate risks effectively. In summary, SIEM, SOAR, and XDR represent critical components of modern cybersecurity strategies. Splunk Enterprise Security excels in SIEM, Palo Alto Networks Cortex XSOAR leads in SOAR, and Trend Micro Vision One is a prominent solution in the XDR space. Organizations often integrate these technologies to create a comprehensive and adaptive security posture in the face of evolving cyber threats. The SOC What is the function of the SOC and how it works A Security Operations Center (SOC) is a centralized unit within an organization responsible for monitoring, detecting, responding to, and mitigating cybersecurity threats. The primary functions of a SOC include: 1. Monitoring: The SOC continuously monitors the organization's IT environment, including
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
networks, systems, applications, and endpoints, for signs of suspicious or anomalous activities. 2. Detection: Using a combination of security tools, technologies, and threat intelligence, the SOC detects security incidents and potential threats in real time. This involves analyzing log data, network traffic, and other indicators of compromise. 3. Incident Response: When a security incident is identified, the SOC initiates an incident response process to contain, eradicate, and recover from the incident. This may involve coordinating with other teams, implementing security controls, and communicating with relevant stakeholders. 4. Threat Intelligence: SOC teams leverage threat intelligence to stay informed about the latest cyber threats, tactics, techniques, and procedures (TTPs). This information enhances the SOC's ability to detect and respond to evolving threats. 5. Continuous Improvement: The SOC engages in continuous improvement by analyzing incidents, assessing the effectiveness of security measures, and updating policies and procedures to enhance the overall security posture. The SOC typically operates 24/7, ensuring constant vigilance against cyber threats. It employs a combination of skilled cybersecurity analysts, advanced technologies, and well-defined processes to protect the organization's assets and sensitive information. What happens to a company when a breach occurs When a company experiences a security breach, the consequences can be significant and wide- ranging. The impact may include: 1. Data Loss or Theft: Breaches often result in the unauthorized access, theft, or loss of sensitive data, including customer information, intellectual property, and proprietary business data. 2. Financial Loss: The costs associated with a data breach can be substantial, including expenses related to incident response, regulatory fines, legal actions, and reputation damage. 3. Reputation Damage: A security breach can severely damage a company's reputation, eroding customer trust and confidence. Negative publicity can lead to customer attrition and loss of business opportunities. 4. Regulatory Compliance Issues: Depending on the nature of the breach and the industry, companies may face regulatory investigations and penalties for failing to safeguard sensitive information. 5. Operational Disruption: Breaches can disrupt normal business operations, leading to downtime, loss of productivity, and the need for extensive remediation efforts.
6. Legal Consequences: Companies may face legal consequences, including lawsuits from affected parties, shareholders, or regulatory bodies seeking damages for the breach. To mitigate these impacts, a well-prepared organization will have an incident response plan in place. The incident response plan outlines the steps to be taken when a breach occurs, including communication protocols, legal considerations, and remediation actions Who are the members of the Incident Response team and their functions An Incident Response (IR) Team is a group of individuals responsible for managing and mitigating the impact of a security incident. Key members of the IR team and their functions include: 1. Incident Response Manager: Coordinates the overall response effort, communicates with stakeholders, and ensures that the incident response plan is followed. 2. Security Analysts: Investigate and analyze the incident, determine the scope and severity, and provide technical expertise to contain and eradicate the threat. 3. Forensic Analysts: Conduct digital forensics to understand the nature of the attack, gather evidence, and support legal and law enforcement investigations. 4. Communications Specialist: Manages internal and external communications, ensuring that stakeholders are informed about the incident, response efforts, and any necessary actions they should take. 5. Legal and Compliance Representatives: Provide guidance on legal considerations, regulatory compliance, and reporting requirements associated with the incident. 6. IT Administrators: Assist with technical aspects of the response, such as isolating affected systems, restoring services, and implementing security measures. 7. Public Relations (PR) Representative: Works on managing the public image of the organization during and after the incident, crafting messages to mitigate reputational damage. 8. External Consultants: In some cases, organizations may engage external cybersecurity experts or consultants to provide additional expertise and insights during the incident response process. Each member of the Incident Response Team plays a crucial role in the coordinated effort to identify, contain, eradicate, and recover from a security incident. The effectiveness of the team relies on clear communication, well-defined roles and responsibilities, and a rapid and well-executed response plan. Business of Cybersecurity
Explain how the Bad Guys make so much money from their attacks. The illicit economy surrounding cyber attacks is multifaceted and lucrative for cybercriminals. Several methods contribute to their financial gains: 1. Ransomware: In ransomware attacks, cybercriminals encrypt a victim's files or systems and demand a ransom for the decryption key. Victims, often individuals or businesses, are compelled to pay to regain access to their data, making ransomware a profitable avenue for attackers. 2. Stolen Data Sales: Cybercriminals frequently steal sensitive data, such as personal information, credit card details, or login credentials, and sell it on the dark web. This information is then used for identity theft, financial fraud, or further exploitation. 3. Cryptocurrency Mining: Malicious actors infect systems with malware that hijacks the computing power to mine cryptocurrencies. The mined coins are sent to the attacker's wallet, providing a steady income without the victim's knowledge. 4. Business Email Compromise (BEC): BEC involves compromising business email accounts to conduct fraudulent activities, such as redirecting funds, altering invoices, or initiating unauthorized transactions. Criminals often target executives or employees with financial authority. 5. Distributed Denial of Service (DDoS) Extortion: Cybercriminals launch DDoS attacks against organizations and demand payment to stop the attack. This can disrupt online services, causing financial losses, and victims may opt to pay to restore normal operations quickly. 6. Credential Stuffing and Account Takeovers: Cybercriminals use stolen username and password combinations obtained from data breaches to gain unauthorized access to various accounts. They may then sell access to these compromised accounts or exploit them for financial gain. You may work for a company that makes a product or service – explain the kinds of jobs that you may do for them. Working for a company that provides cybersecurity products or services involves various roles aimed at developing, implementing, and managing solutions to defend against cyber threats. Here are some key jobs within such a company: 1. Security Analyst: Security analysts play a crucial role in monitoring and analyzing security events, identifying potential threats, and responding to incidents. They may work with SIEM (Security Information and Event Management) tools to detect and mitigate cyber threats. 2. Threat Intelligence Analyst: These analysts focus on gathering, analyzing, and interpreting threat intelligence to understand current and emerging cyber threats. They provide insights that help organizations enhance their security posture. 3. Software Developer/Engineer: Developers create and maintain cybersecurity software, ranging from antivirus programs and firewalls to advanced threat detection and response solutions. They
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
ensure that these products are effective, user-friendly, and continuously updated to address evolving threats. 4. Incident Responder: Incident responders are responsible for managing and coordinating the response to security incidents. They work to contain threats, eradicate malware, and implement measures to prevent future incidents. 5. Sales Engineer: Sales engineers bridge the gap between technical expertise and sales efforts. They assist in understanding customer needs, demonstrate how cybersecurity products meet those needs, and provide technical support during the sales process. 6. Cybersecurity Consultant: Consultants work closely with clients to assess their security posture, identify vulnerabilities, and recommend solutions. They may provide guidance on compliance, risk management, and overall cybersecurity strategy. 7. Security Researcher: Security researchers explore new vulnerabilities, analyze malware, and contribute to the development of threat intelligence. Their work is vital for staying ahead of emerging threats and ensuring that security solutions are effective. 8. Product Manager: Product managers oversee the development and lifecycle of cybersecurity products. They collaborate with various teams, including development, marketing, and sales, to ensure that products meet market needs and are positioned effectively. In summary, working for a cybersecurity product or service company involves diverse roles focused on creating, maintaining, and implementing solutions to protect organizations from cyber threats. These roles collectively contribute to the ongoing effort to stay ahead of cybercriminals and safeguard digital assets.