CYB 200 Assignment 5
.pdf
keyboard_arrow_up
School
East Carolina University *
*We aren’t endorsed by this school
Course
3556
Subject
Information Systems
Date
Jan 9, 2024
Type
Pages
10
Uploaded by JusticeBravery2669
1
Ahmed Deptto
5-3 Project Three Milestone: Decision Aid
Professor Franklin
CYB-200 Foundation of Cybersecurity
November 8
th
, 2023
1.
Detection
2
a)
Describe the following best practices or methods for detecting a threat actor.
Awareness - Detecting a threat actor before they can cause harm is crucial. Please let me know if you need any further assistance. One practical approach to mitigate risks is to provide awareness training to staff. Educating employees on possible threats and identifying those responsible can help organizations take proactive measures. Awareness is crucial in maintaining vigilance and recognizing potential threats. Therefore, all employees must comprehend security policies and procedures to ensure company safety. (Musthaler, 2008).
Auditing - Auditing is an excellent way for organizations to assess their cybersecurity policies and procedures. It helps them evaluate their security measures and identify areas needing improvement. Companies can use this process to analyze their operations, detect gaps in regulatory compliance, and enhance their overall performance.
Monitoring - Monitoring software tracks all user actions to detect malicious intent from internal users. Management can monitor and keep records of user actions to track work efficacy.
Testing - Controlled testing assesses the effectiveness of information security measures. This ensures that security measures function properly and identifies and addresses weaknesses.
Sandboxing - An isolated environment that allows safe usage of harmful programs.
Citations:
Musthaler, L. (2008, June 2). 13 best practices for preventing and detecting insider threats | Network World. Network World; www.networkworld.com
.
3
https://www.networkworld.com/article/2280365/13-best-practices-for-preventing-and-detecting-
insider-threats.html
Baybeck, B. P. (2018, October 18). Audits: The Missing Layer in Cybersecurity. Dark Reading;
www.darkreading.com. https://www.darkreading.com/endpoint/audits-the-missing-layer-in-
cybersecurity
Sandboxing Definition. (2016, July 8). Sandboxing Definition; techterms.com.
https://techterms.com/definition/sandboxing
2.
Characterization
a)
Briefly define the following threat actors.
Individuals who are “shoulders surfers” – Criminals can steal personal information by shoulder surfing or observing their victims while using their devices, like laptops, phones, or ATMs.
Individuals who do not follow policy – Attackers often target new and inexperienced employees who need to learn about security regulations and the company's structure.
Individuals using others’ credentials – Unauthorized access refers to using someone else's login credentials, password, or PIN without their permission, putting the user, system, and potentially other systems at risk.
Individuals who tailgate – A tailgater follows someone who enters without permission or escort.
4
Individuals who steal assets from company property – If an employee or visitor intentionally takes the company's physical or intellectual property, they are committing theft.
Citations
Fundamentals of Information Systems Security, 3rd Edition. (n.d.). O’Reilly Online Learning; www.oreilly.com
. Retrieved April 29, 2022, from https://www.oreilly.com/library/view/fundamentals-ofinformation/
9781284116465/xhtml/ch03.xhtml
B) Describe the following motivations or desired outcomes of threat actors.
Fraud - Cyberfraud is widely acknowledged as one of the most pervasive and hazardous forms of fraud worldwide. In the 21st century, the internet has increased, and so has the number of cyber criminals constantly searching for new and innovative ways to access unsuspecting victims' personal and financial data. These hackers often use or sell stolen information for identity theft.
Sabotage – Cyber sabotage can be performed through a range of methods, including the manipulation of crucial systems. It can cause severe damage to the targeted entities. It can involve deleting or corrupting data, installing malware, creating system vulnerabilities, or using ransomware. Sabotage can be executed without implementation.
Vandalism – A cyber-attack on a vulnerable website without a clear motive is often done to showcase the hacker's skills.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help