Week 4 Assignment
docx
keyboard_arrow_up
School
Strayer University *
*We aren’t endorsed by this school
Course
560
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
5
Uploaded by MinisterBravery12894
Fairbanks, Joshua 10/23/2023
CIS560001VA016-1238-001
Week 4 Assignment
The Stages of Cyber Operations. In cyber operations, each stage has specific goals and objectives. The target stage focuses
on selecting the desired target(s) for the operation. In the recognition stage, the objective is to gather information about the target(s) to understand their infrastructure and vulnerabilities. During reconnaissance, the goal is to gather detailed intelligence about the target(s). Gaining access aims to breach the target's defenses and gain unauthorized entry. Hiding involves concealing the attacker's presence and activities. Establishing persistence ensures long-term access and control. In the execution stage, the goal is to carry out the intended actions of the operation. Lastly, assessment involves evaluating the success and impact of the operation. These stages provide a framework for cyber operations, but the specific goals and objectives can vary depending on the attack's nature and objectives.
During the Moonlight Maze incident in 1996, the cyber operation stages were implemented as follows: Target: The attackers aimed to target various U.S. military and government organizations, as well as defense contractors. Their motivation was likely to gain unauthorized access to sensitive information and classified data. Recognition: The attackers conducted reconnaissance to gather information about the targeted organizations' infrastructure,
network topology, and potential vulnerabilities. This stage helped them identify potential entry points and weaknesses to exploit. Reconnaissance: Detailed intelligence was gathered about the targeted organizations, including their systems, networks, and security measures. The attackers aimed to understand the target's defenses and identify any exploitable weaknesses. Gaining Access: The attackers breached the target's defenses using various methods, such as exploiting vulnerabilities in software, using social engineering techniques, or leveraging weak passwords. The motivation behind this stage was to gain unauthorized access to the target's systems and networks. Hiding: The attackers aimed to conceal their presence and activities within the compromised systems. They employed techniques to avoid detection by security measures, such as using rootkits, backdoors, and other stealthy methods. Their motivation was to maintain access and control over the compromised systems without raising suspicion. Establishing Persistence: The attackers aimed to establish a persistent presence within the compromised systems. This involved creating hidden user accounts, modifying system configurations, and installing malware or other tools that allowed them to maintain access even after remediation attempts. Their motivation was to ensure long-term control and continued unauthorized access. Execution and Assessment: The attackers executed their intended actions, which could include data exfiltration, system manipulation, or other malicious activities. Their motivation was likely driven by espionage, theft of sensitive information, or disruption of operations. Throughout the operation, the attackers continuously assessed the success and impact of their activities to refine their approach. It's important to note that the motivations behind the Moonlight Maze incident are not definitively known and may vary depending on the specific attackers involved.
One of the main regulations that was instituted in the US would be one of three necessary
adjustments in countermeasures to keep the law relevant in the digital age. In the Stuxnet incident of 2010, the cyber operation stages were implemented as follows: Target: The attackers aimed to target Iran's nuclear facilities, specifically their uranium enrichment infrastructure. The motivation behind this stage was likely to disrupt Iran's nuclear program. Reconnaissance: The attackers conducted extensive reconnaissance to gather information about the target's infrastructure, including the specific control systems used in the facilities. This stage helped them
understand the target's vulnerabilities and identify potential entry points. Delivery: The attackers used various methods to deliver the Stuxnet malware into the target's systems. This included exploiting vulnerabilities in software, using infected USB drives, or even compromising trusted insiders. The motivation was to gain initial access to the target's control systems. Exploitation: Once inside the target's systems, the attackers exploited multiple zero-day vulnerabilities to gain control over the industrial control systems (ICS) used in the nuclear facilities. This allowed them to manipulate the centrifuges used in uranium enrichment. The motivation here was likely to sabotage the target's nuclear program. Propagation: The Stuxnet malware was designed to spread
within the target's network and even beyond, through removable media and network connections.
This stage aimed to ensure that the malware could reach its intended targets and potentially affect
other systems. The motivation was to maximize the impact of the attack. Concealment: The attackers took steps to conceal the presence of the malware and their activities within the target's systems. This involved using sophisticated techniques to evade detection by security measures and to remain undetected for an extended period. The motivation was to maintain long-term access and control over the compromised systems. Execution and Impact: The Stuxnet malware executed its intended actions, which involved manipulating the speed of the centrifuges to cause
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
physical damage. The motivation behind this stage was to disrupt the target's uranium enrichment process and hinder their nuclear program. It's important to note that the motivations behind the Stuxnet incident are believed to be related to geopolitical factors and national security
concerns. The incident did bring significant attention to the importance of cybersecurity and the potential risks posed by cyberattacks on critical infrastructure. It likely contributed to ongoing efforts to strengthen cybersecurity policies and practices, both in the United States and globally. The world of cyber security is changed due to the potential risk of physical attacks through cyber
security. This attack has raised awareness with the government to protect from future attacks.
Works Cited
https://www.ccdcoe.org/uploads/2018/10/Art-07-Law-of-the-Horse-to-Law-of-the-Submarine-
The-Future-of-State-Behavior-in-Cyberspace.pdf
https://www.computerworld.com/article/2717524/after-stuxnet--the-new-rules-of-cyberwar.html
https://www.eccouncil.org/cybersecurity-exchange/threat-intelligence/cyber-kill-chain-seven-
steps-cyberattack/