Vincent_Cooper CYB 250 Stepping Stone One

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

250

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

3

Uploaded by AdmiralMorningCapybara30

Report
CYB 250 Stepping Stone One Template Vincent Cooper July 19 th , 2023 Howard Threat Model Incident Target Breach Sony Breach OPM Breach Attackers Albert Gonzalez (Hacker) Hacker group: Guardians of the Peace Hacker group: X1 & X2 Tools Phishing scam via email to exploit employee from Fazio Mechanical for credentials by installing citadel trojan used malware, data destruction and data leaks Maleware named ‘Sakula & PlugX’ Vulnerability Network was compromised due to lacking good security between target and third- party vendors which connected to company’s FMS system. Lack of security due to poor network security design. Security updates were not rolled out frequently enough. Action Installed more maleware which scanned the memory of the point of sales to read the track information, especially card numbers. Stole employee information OPM & Sensitive info was compromised and stolen. Target Card numbers Employee data, IP, documents SF-86 forms (contained
and email sensitive personal information) Unauthorized Result Sold the credit card information. Employees suing company due to security breach and stocks dropped. Investigated by congress and OPM executives resigned. Objective Sell the credit card information on the dark web for money. To destroy the company’s reputation and as a whole. Financial gain and access to sensitive info. Incident Analysis The incident I chose from the table to analyze is the Sony incident since that was the biggest one I personally heard about when it happened at the time. The CIA triad that is the most applicable to the action category of the Sony incident confidentiality because the hackers were able to access sensitive employee information. You can use an adversarial mindset in analyzing the “Attackers” and “Objective” to inform the response to the attack by first having preventative measures to ensure the information that was stolen could’ve been protected better. I believe if Sony would’ve had an IT department that consists of people who actively try to search for exploits within the company’s network an exploit that led to the hack could have been found much sooner and the incident would’ve probably never happened in the first place. Threat Modeling Extension If I worked for Sony and used a threat model proactively, I would have made changes to Sony to avoid the incident like ensuring the cyber security department was properly trained and actively kept up-to-date with the security standards. I would convince my supervisor that threat modeling is worth the time and resources to complete my threat modeling by showing them what happens if
they don’t. I would give them active examples of companies and organizations that were hacked and show them how that was directly linked to them not performing threat modeling. I would also show them examples within our own company by showing them potential security risks and the results of those risks if they were to be exploited. The organizational advantages beyond security controls that might arise from this threat modeling exercise is the ability to be proactive about security breaches since threat modeling can help prepare the cyber security department and even the employee’s companies on how to handle a security breach, what exploits to look out for like email phishing scams, and what to do after finding an exploit. Threat modeling differs between roles in IT because each role has a specific job when protecting the company’s sensitive information from hackers. Designers are in charge attending to the potential exploits and security threats to determine which ones are the most important and put them in that order as well as coming up with a way to eradicate those threats. Developers track and monitor the flow of data to ensure the information is going where its supposed to go.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help