Premium Essay

Advanced Persistent Threats

In: Computers and Technology

Submitted By keythlee333
Words 1640
Pages 7
Case Study 1: Advanced Persistent Threats
Keyth Lee
Strayer University Online

CIS 502
Dr. Emmanuel Nyeanchi
January 22, 2014

This paper analyzes the 2011 APT Summit findings and the 2012 RSA Security Brief. It summarizes the findings of both of the aforementioned documents, examines several popular cyber attack methodologies, and describes various ways to respond to these attacks. It is interesting that both documents allude to the fact that persistence on the part of humans to “wreak havoc” is the root of most security threats. Additionally, both documents unambiguously assert that the most effective way to combat unwanted activity on networks is to share any data regarding network attacks and/or attempts to hack a system. Apparently, organizations are averse to such collaboration for fear of divulging unrelated, sensitive information or because of legal concerns. Not to mention that organizations are generally unenthusiastic about publicizing a network breech.

Advanced Persistent Threats
If you have ever had a pest infestation in the attic of your home, you will find the concept of “advanced persistent threats” easy to understand. Can you remember how the whole thing started with an intermittent “scratching” noise? Well, that was a persistent pest trying to gain access to your attic. Can you remember how the “scratching noise” gradually morphed into multiple “scratching noises”? Well, that was probably the pest inviting all of his friends after having successfully invading your attic. The same is true of cyber criminals. A patient and persistent cyber will gain access to your network. The question is; how quickly will you notice the intrusion? How will you respond? Firstly, this paper analyzes the 2011 APT Summit findings. Secondly, it examines the 2012 RSA Security Brief. Thirdly, it discusses popular attack methods, protections against…...

Similar Documents

Premium Essay

The Threat Within

...The threat within A study on insider threat by DSCI in collaboration with PwC About Data Security Council of India (DSCI) Data Security Council of India (DSCI) is a focal body on data protection in India, setup as an independent Self-Regulatory Organisation (SRO) by NASSCOM®, to promote data protection, develop security and privacy best practices & standards and encourage the Indian industries to implement the same. DSCI is engaged with the Indian IT/BPO industry, their clients worldwide, Banking and Telecom sectors, industry associations, Data Protection Authorities and other Government agencies in different countries. It conducts industry wide surveys and publishes reports, organizes data protection awareness seminars, workshops, projects, interactions and other necessary initiatives for outreach and public advocacy. DSCI is focused on capacity building of Law Enforcement Agencies for combating cyber crimes in the country and towards this, it operates several Cyber labs across India to train police officers, prosecutors and judicial officers in cyber forensics. Public Advocacy, Thought Leadership, Awareness and Outreach and Capacity Building are the key words to continue to promote and enhance trust in India as a secure global sourcing hub, and also to promote data protection in the country. For more information about DSCI or this report, please contact: Data Security Council of India Niryat Bhawan, 3rd Floor Rao Tula Ram Marg New Delhi –......

Words: 7525 - Pages: 31

Free Essay

Stereotype Threat

...Stereotype threat affects many people in many different ways. Social Psychology defines Stereotype threat “is a disruptive concern, when facing a negative stereotype, that one will be evaluated based on a negative stereotype. Unlike self-fulfilling prophecies that hammer one’s self –concept, stereotype threat situations have immediate effects ” The effects of stereotype threat are advanced because of the self-fulfilling prophecies that many different races, sexes or even religions fall into the effects of. Stereotype threat plays amongst different groups, and the effects that may cause a different reaction otherwise if not being associated with that group, self -fulfilling prophecies can be the consequence. In some situations Stereotype threat can be a subconscious thought, but for some situations or people if they believe a stereotype and circum to it simply without even trying, that is the self -fulfilling prophecy that is placed on oneself. Stereotype threat can be implanted in us by certain words and attitudes that are associated with certain groups of people. It has been studied more over the years of the different ways that stereotype threat plays a role in certain groups and the consequences that it has. Research was originally centered on race and how it has caused underachievement among African Americans. In recent research it has been broadened to show this threat in many different areas that can affect almost all people in some way. Options that can be used to......

Words: 1474 - Pages: 6

Premium Essay

Trusted Computing: Real Security for Today’s Advanced Threats

...TRUSTED COMPUTING: REAL SECURITY FOR TODAY’S ADVANCED THREATS DEMONSTRATION OVERVIEW Compliance-Grade Endpoint Encryption at a Fraction of the Cost Organizations, both large and small, understand that centralized encryption management is a critical component to their security architecture. Wave’s software provides the policy-based access controls, comprehensive reporting, directory services integration, centralized control and end-user access recovery that companies require to cost effectively implement and manage data encryption and most importantly prove that data is protected in the event that a computer (or its hard drive) is lost or stolen. Self-encrypting drives (SEDs) are the most secure, best performing and most transparent encryption option for protecting data on laptop computers. Wave provides the most comprehensive SED management solution available and was the first one to support Opal –based, proprietary and solid state SEDs. This demonstration will show you how, in minutes, to set up a self-encrypting drive and use your Common Access Card for drive-level authentication. Further, you will see how Wave’s user recovery, Windows synchronization, single-sign-on and reporting make a Wave-managed SED solution the best option for protecting data-at-rest. Mobile Security: Device Authentication and Health The traditional means of unlocking a self-encrypting drive (SED) on a laptop is via username/password or an alternate credential (token, smartcard, etc.)....

Words: 427 - Pages: 2

Premium Essay

Advanced Language

... Advanced Language Practice with key Michael Vince with Peter Sunderland English Grammar and Vocabulary MACMILLAN Macmillan Education Between Towns Road, Oxford OX4 3PP A division of Macmillan Publishers Limited Companies and representatives throughout the world ISBN 1 405 00762 1 with key ISBN 1 405 00761 3 without key Text © Michael Vince 2003 Design and illustration © Macmillan Publishers Limited 2003 First published 1994 This edition published 2003 All rights reserved; no part of this publication may be reproduced, stored in a retrieval system, transmitted in any form, or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publishers. Designed by Mike Brain Graphic Design Limited Layout and composition by Newton Harris Design Partnership Cover design by Oliver Design Illustrated by: Ed McLachlan pp 109; Julian Mosedale pp 12, 39, 110, 123, 153, 176, 195, 217, 225, 257; David Parkins pp 3, 42, 73; Martin Shovel pp 10, 16, 56, 70, 117, 147, 235, 285; Bill Stott pp 122; Kingsley Wiggin pp 24, 27, 57, 191, 220. Photographs by: Eyewire, Photodisc and Andrew Oliver. The author would like to thank the many schools and teachers who have commented on these materials. Also special thanks to Peter Sunderland and Sarah Curtis. Printed and bound in Italy by G. Canale and C. S.p. A Borgaro, Turin 2007 2006 2005 2004 2003 1 09 8 7 6 5 4 3 2 1 Contents Introduction Vlll Grammar......

Words: 101407 - Pages: 406

Premium Essay

Advanced Persistent Threats Against Rsa Tokens

...Advanced Persistent Threats Against RSA Tokens John Valachovic Dr. Nelson Stewart CIS 502 April 25, 2013 Abstract In this paper I will look at RSA tokens and describe a successful APT attack. I will disclose the attack methods used and explain why they were successful. I will also explain the best methods available to control and prevent these attacks. With new emerging technologies organizations may reduce the APT threat. Advanced Persistent Threats Against RSA Tokens Advance persistent threat has become one of the most dangerous and damaging threat to hit the security arena. APTs are highly adaptable and are usually customized for each attack targeting vulnerabilities, system flaws and even humans with social engineering, spoofing, whaling and spear phishing. APTs are usually an attack against governments, military, political targets, private sector organizations and corporations [ (Curry, et al., 2011) ]. Being able to defend your network and detecting intrusions has become vital. Vulnerabilities APT attacks often use subversive methods to prevent detection. APT attacks are carried out over a long period of time and are planned in advance. Attackers spend a long time planning the attack be it social engineering or searching for access through the supply chain [ (Curry, et al., 2011) ]. Once an attacker gains access to his target network they can go undetected while they snoop around searching for the intended target. Hackers could be after an......

Words: 1430 - Pages: 6

Free Essay

Security Threats

...In 2011 Symantec listed the most significant attacks of 2010; these were targeted attacks, social networking, attack kits, mobile threats, zero-day and rootkits. These targeted attacks are exactly what it says, they target what they are designed to hit, whether it is a company (small or large), and individual or a specific machine. [ (Symantec, 2011) ] Symantec recorded over 3 billion malware attacks but yet Stuxnet stands out more than the others. However, lets us not forget Hydraq. Each one was highly sophisticated and was tailored for specific targets. Although Hydraq was old-fashioned, what made it stand out was what and whom it stole. Of course targeted attacks didn’t begin until 2010, and it won’t end. Once inside, the attack attempts to avoid detection until its objective is met. [ (Symantec, 2011) ] In 2010, the volume and sophistication of malicious activity increased, the Stuxnet worm became the first with the ability to affect physical devices while attempting exploits for an unprecedented number of zero-day vulnerabilities simultaneously. Although unlikely to become commonplace, Stuxnet does show what a skilled group of organized attackers can accomplish. [ (Symantec, 2011) ] Although providing a look at the security threats that are out there on the internet that us as users face on a daily basis, unless we know what we are dealing with, there is no way to defend against it. This is why it is important that we keep our software updated to help prevent......

Words: 340 - Pages: 2

Free Essay

Threats of Terrorism

...Constant threat of terrorism Constant threat of terrorism The terrorist attacks of 11 September 2001 on the World Trade Center (WTC) in New York and the Pentagon in Washington, showed the power of a terrorist network. International Network of Global Salafi Jihad and its department al-Qaeda unit al-Sulbah (Al-Qa'idah al-Sulbah) - the main organizers of large-scale terror attacks of the last fifteen years - are the most powerful terrorist and public organizations whose purpose is to establish a true Islamic government and the revival of Islam. The emergence of organizations such as the Global Salafi Jihad (Salafist movement) and the international terrorist network al - Qaeda - the International Islamic Front for Jihad against Jews and Christians – is a consequence of a single trend prevailing in the contemporary Muslim world - namely, rise of radical and militant Islamism. International terrorist organizations seek to acquire weapons of mass destruction and sabotage plans in the areas of oil and gas. In addition, according to some researchers, operating in Russia's North Caucasus militants are closely linked to the international terrorist network “Al Qaeda”. “Al-Qaeda” has transformed into a movement that brings together independent terrorist cells in the world on an ideological basis. It has established strong contacts with regional extremist organizations in the Islamic Maghreb, in south-east Asia - with a "JI", in Russia - the “Caucasus Emirate” (Bergen, 2006). In......

Words: 2431 - Pages: 10

Free Essay

Is Cyber Crime a Serious and Growing Threat?

...Is Cyber crime a serious and growing threat? 1. INTRODUCTION Cyber crime cannot be clearly defined but all the definitions that are attributed to it basically boil down to the following: “an unlawful act wherein the computer is either a tool or a target or both" (Dubey 2004). On the other hand, ‘threat’, in this context, can be construed as “something likely to cause damage or danger” (Online dictionary 2014). Generally speaking, any unlawful act is expected to cause harm and cyber crime is no exception to this general rule. It has been noted that since the public release of the World Wide Web in 1991, the Internet has known an explosive expansion and continuous upgrading. Unfortunately, cyber crime has also gained in preponderance and sophistication in direct correlation with this Internet revolution. Given its stealth characteristics coupled with its alleged multifaceted implications in terms of both financial loss and security issues, cyber crime has already got the legitimate recognition of a growing and serious threat by the various stakeholders concerned. The only contentious issue is perhaps the monetary quantification ascribed to the resulting damages which is often greeted with much skepticism. 2. CATEGORIES OF CYBER CRIME Indeed, cyber crime does not lend itself to a narrow definition and is generally classified into four categories; that is, crimes committed against the individual, property, organisation and society (Mali 2009). This classification also......

Words: 2796 - Pages: 12

Premium Essay

Secutiry Threats

...Security Threats Computer security is no longer just an organization’s concern but everyone’s who uses their computer to access the internet. Anyone who uses their personal computer to access the internet faces potential security threat. This document will identify all the potential security threats on a personal computer and some techniques an attacker might employ to access information on the file system. Security threats can be broadly classified into outside and inside threats. Organization may be exposed to viruses and worms as a result of employees not following certain practices or procedures. Intruders are also a big security threat—they hack into large networks to steal private information like social security numbers or credit card account information. Closely related to the intruder security threats are the “Insiders” who are more dangerous in many respects than outside intruders. Insiders have the access and knowledge necessary to cause immediate damage to an organization. Most security is designed to protect against outside intruders and thus lies at the boundary between the organization and the rest of the world (Conklin & White). The various techniques an attacker might employ to access file systems are, Trojan horse programs which are a common way for intruders to trick you (sometimes referred to as "social engineering") into installing "back door" programs. These can allow intruders easy access to your computer without your knowledge, change......

Words: 452 - Pages: 2

Premium Essay


...Threats of new entrants The threats of new entrants could recognized low due to several fact: The size of economies of scale and its main competitors,are very large. They have strong market power and capital to maintain their value. For the company, it has more than million servers located around the world to provide searching services to customers and obtain information from customers. Therefore, they understand the customer’s habits. Its main competitors are also not lag behind to improving their searching engines servers. It have high brand loyalty of users and it is famous that one of the strongest brand recognitions in the world. However, the switching cost is low. For users, other search engines were literally one click away. The barrier of entry is high so that if a new entrant would like to earner internet industry and would get successfully, it needs to have Sufficient of capital and technology that provide a better searching engine, and also must overcome the brand loyalty. Threats of exiting rivalry The threats of exiting rivalry have two parts, searching engines and advertising. For searching engines, the threats of exiting rivalry are low. The company have obviously competitive advantage. Its searching engines provide the best searching result and the fastest searching speed in the industry. But the good performance of searching engines is in order to acquire more advertisement that place at its website. It is not a only way for advertiser to place......

Words: 495 - Pages: 2

Premium Essay

Eight Threats

...8 Threats to Portfolio Performance The last decade has been a challenge for many investors, especially those investing for the long term and retirement. Given declines in global stock markets, many investors have seen little to no real growth in their portfolios over this period. For example, $10,000 invested in the S&P 500 Market Index in 2000, was worth just $10,456 at the end of 2010. And this does not take into account inflation, investment fees and taxes.1 This White Paper explains why investors’ portfolios may underperform in both bear and bull markets and incur substantial costs in the process. It also details the impact this chronic underperformance can have on achieving long-term financial goals. Threat 1: The Expenses of Active Management Most us would like to beat the market, but as we’ll explore in this whitepaper, even many professional money managers have had a hard time performing better than the market. To understand why, it is helpful to begin with some definitions. Active investors (and active money managers) attempt to out- perform stock market rates of return by actively trading individual stocks and/or engaging in market timing — deciding when to be in and out of the market. Those investors who simply purchase “the market” through index or asset class mutual funds are called passive or “market” investors. Active mutual fund managers are typically compared to a benchmark index. For example, large cap mutual funds are often compared to the...

Words: 3636 - Pages: 15

Free Essay

Threat Ranking

...Implementing the WWF Project & Programme Standards Step 1.4 Define: Threat Ranking July 2007 Step 1.4 Threat Ranking Contents What Is a Threat Ranking?................................................................................................... 1 Why Is Threat Ranking Important? ..................................................................................... 1 When To Use Threat Rankings ............................................................................................ 1 How To Do a Threat Ranking ............................................................................................... 1 1. Determine the criteria for ranking .................................................................................................2 2. Apply the threat ranking................................................................................................................3 3. Sum up your threats across all targets to get an overall ranking for the site ...............................4 4. Classify each threat ......................................................................................................................4 Other Methods for Threat Ranking...................................................................................... 6 References............................................................................................................................. 6 Annex 1: Other Methods for Threat Ranking......

Words: 4482 - Pages: 18

Premium Essay

Threat Assessment

...Threat Assessment Robert Nassar SEC 440 February 20, 2012 Threat Assessment When conducting an assessment to a company’s information or (computer) security system, the person or personnel must determine all possible risks that may threaten a company’s security. Risk as defined by OHSAS (Occupational Health & Safety Advisory Services) is the product of the probability of a hazard resulting in an adverse event, times the severity of the event the possibility of losing something. With this being said an assessment needs to include the possibility of loss, and how to minimize the risk of loss or the manageable way to contain all possible risks. To determine what types of risks a company maybe associated with is an on going process since in the cyber world new viruses, worms and thousands of different types of spyware are created everyday, the system must be monitored daily. Vulnerability is the potential point of attack, such as a computer without a password to access the system, which makes the system vulnerable to unauthorized access to the system. If a password was installed to the system it can reduce the risk of unauthorized access. While conducting an assessment one can understand the vulnerabilities and the difficulty of exploiting vulnerability, with a result in containment and deterrence of such a threat, with priority of such threats as a guideline. Depending of the level of threat, the vulnerability of access to a company’s information can be analyzed from......

Words: 1457 - Pages: 6

Premium Essay


...20 THREATS 1 Since this is a pioneering, people might find it unusual to use a toothpaste in a chewable form. 2 Another challenge would be convincing the traditional toothbrush users to buy the product. 3 The biggest competitor would be the chewing gum companies. 4 There is a high potential that consumers will not use this product as a substitute product for toothpaste. 5 Possibility of slow market growth. 6 Possibility of product being a “fad” in the market. 7 The challenge of being universally accepted in the marketplace. 8 Once it enters the market, it can be easily duplicated. 9 There could be a low customer demand. 10 It would be difficult to penetrate the competitive market. 11 Doctors may still recommend toothpaste as the number one solution for oral treatment. 12 The need to have the positioning of product in the minds of the consumers would be hard to achieve. 13 Mouthwash companies can also be seen as one of the competitors. 14 Customers might not find the same satisfaction they get from tooth brushing. 15 The changing needs of the consumers are inevitable. 16 As a developing company, it requires a huge amount of effort to market the product. 17 The increasing number of counterfeits. 18 There could be a seldom buying in this product since people are used to brushing teeth. 19 Consumers especially generation X may perceived that it may cause cavity because of being a gum type. 20 It may be difficult for the company to achieve its desired...

Words: 267 - Pages: 2

Free Essay

Ism- Enpowering Persistent Systems

...Enpowering persistent systems | | Contents Acknowledgement 1. Introduction 2. Persistent Systems 3. Green Persistent Movement 4. Business Need 5. Creative Riot 6. Enpower – Plugging the Leak 6.1 Scope Process Flow Sources Client Agent Central Server Mathematical Model Enalytics Advantages over Windows Salient Features Technical Requirements Additional Features Enpower Results Input Documents Output Documents Input Screen Formats Output Screen Formats Reports Application Testing User Training Data Migration Implementation Method Integration with Systems Integration with Partners 6.2 Challenges 6.3 Benefits 6.4 Future 7. Bibliography Page 3 4 6 7 9 10 11 11 11 13 14 14 15 26 27 28 29 31 32 34 36 37 40 47 48 48 49 49 49 50 53 54 55 2 | | Acknowledgement We wish to express our sincere gratitude to Prof. J.M. Shah for providing us an opportunity to work on the project „Enpowering Persistent Systems.‟ It was an extremely enriching learning and we could easily apply the concepts taught in class to our understanding. We would like to thank the library staff and the administrative staff for being extremely cooperative. 3 | | 1. Introduction The world today faces unprecedented problems due to rapid climate change which are now receiving attention from governments and businesses across the globe. As concern for climate change and sustainability continues to grow, and actions now ramp up, businesses are grappling with reducing carbon footprints while......

Words: 8186 - Pages: 33