Vincent_Cooper CYB 250 Stepping Stone One
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
250
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
3
Uploaded by AdmiralMorningCapybara30
CYB 250 Stepping Stone One Template
Vincent Cooper
July 19
th
, 2023
Howard Threat Model
Incident
Target Breach
Sony Breach
OPM Breach
Attackers
Albert Gonzalez (Hacker)
Hacker group: Guardians of the
Peace
Hacker group: X1 & X2
Tools
Phishing scam via email to exploit employee from Fazio Mechanical for credentials by installing citadel trojan
used malware, data destruction and data leaks Maleware named ‘Sakula & PlugX’
Vulnerability
Network was compromised due to lacking good security between target and third-
party vendors which connected to company’s FMS system.
Lack of security due to poor network security design.
Security updates were not rolled out frequently enough.
Action
Installed more maleware which scanned the memory of the point of sales
to read the track information, especially card numbers.
Stole employee information
OPM & Sensitive info was compromised and stolen.
Target
Card numbers
Employee data, IP, documents SF-86 forms (contained
and email
sensitive personal information)
Unauthorized Result
Sold the credit card information.
Employees suing company due
to security breach and stocks dropped.
Investigated by congress and OPM executives resigned.
Objective
Sell the credit card information
on the dark web for money.
To destroy the company’s reputation and as a whole.
Financial gain and access to sensitive info.
Incident Analysis
The incident I chose from the table to analyze is the Sony incident since that was the biggest one I personally heard about when it happened at the time. The CIA triad that is the most applicable to the action category of the Sony incident confidentiality because the hackers were able to access sensitive employee information. You can use an adversarial mindset in analyzing the “Attackers” and “Objective” to inform the response to the attack by first having preventative measures to ensure the information that was stolen could’ve been protected better. I believe if Sony would’ve had an IT department that consists of people who actively try to search for exploits within the company’s network an exploit that led to the hack could have been found much sooner and the incident would’ve probably never happened in the first place. Threat Modeling Extension
If I worked for Sony and used a threat model proactively, I would have made changes to Sony to avoid the incident like ensuring the cyber security department was properly trained and actively kept up-to-date with the security standards. I would convince
my supervisor that threat modeling is worth the time and resources to complete my threat modeling by showing them what happens if
they don’t. I would give them active examples of companies and organizations that were hacked and show them how that was directly linked to them not performing threat modeling. I would also show them examples within our own company by showing them potential
security risks and the results of those risks if they were to be exploited. The organizational advantages beyond security controls that might arise from this threat modeling exercise is the ability to be proactive about security breaches since threat modeling can help prepare the cyber security department and even the employee’s companies on how to handle a security breach, what exploits to look out for like email phishing scams, and what to do after finding an exploit. Threat modeling differs between roles in IT because each role has a specific job when protecting the company’s sensitive information from hackers. Designers are in charge attending to the potential exploits and security threats to determine which ones are the most important and put them in that order as well as coming up with a way to eradicate those threats. Developers track and monitor the flow of data to ensure the information is going where its supposed to go.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help