Вы находитесь на странице: 1из 5

Information Technology for Management

Submitted By: Nayan Nagar Roll No: M17-17

CYBER THREAT

Introduction
Cyber threat is deemed as any malicious act that attempts to gain access to a computer network
without authorization or permission from the owners.in other words we can say that it is a
process in which a persons attempt unauthorized access to a control system device and/or
network using a data communications pathway. This access can be directed from within an
organization by trusted users or from remote locations by unknown persons using the Internet.
Threats to control systems can come from numerous sources, including hostile governments,
terrorist groups, disgruntled employees, and malicious intruders. To protect against these
threats, it is necessary to create a secure cyber-barrier around the Industrial Control System
(ICS)

Pillar oneevolution of the threat

Commoditization of advanced techniques: in breakdown of cyber threats, the 80/20


principle is brought up meaning 80 percent of cyber actors are generally less
sophisticated and the top 20 percent are so advanced that given enough time and
resources they will break onto any network.

Sophisticated developers who spent years honing their hacking techniques can now
profit from their experience by selling hacking toolkits as a software package.

Effective information security is defined according to three core pillars:


The confidentiality of data is the guarantee that only those who are properly authorized
may have access to a systems information.

1
Integrity of data is the concept that all information within a system is holistic, complete,
and free of errors.

Availability of data refers to the amount of time a system is functioning, or is available


to be accessed by the user.

Pillar twoan incomplete security response

The cybersecurity community has not fundamentally changed the way networks have
been protected over the past four decades. Much effort has been placed on building the
next-generation firewall expanding the virtual moats and perimeter defenses that
surround networks.

Just obtaining the proper data for network visibility is an enormous task. Now, the
modern network has massive amounts of tools and data storage recording every log,
alert, and heartbeat.

Both the public and private sector are rapidly seeking to swell their cybersecurity ranks
with qualified personnel, but there are simply not enough trained persons.

Roles, responsibility and terminology involved in cyber threat


Analysis is the examination, inspection, and investigation of relevant data in order to reach a
conclusion. Generally, this process is human-led and a manual process.

Analytics is the systematic and procedural computational analysis of data or statistics in order
to produce a result. Generally, this process is automated and heavily assisted by a computer.

Cognitive is the thought processes involved in the acquisition and understanding of


knowledge, decision making, and problem solving. It is rooted in facts and not in emotions.

Intelligence is the ultimate result of the collection of valuable information produced in a


format in which a decision or conclusion can be reached.

Security analysis
The art of aggregating, correlating, and automating IT-related data in order to detect, discover,
and understand information security threats.

2
Cyber analysis
The art of human-led analysis of security and non-security related data from logical and
physical domains in order to research trends, discover anomalies, provide context, create
relationships, and uncover hidden issues.

Cyber intelligence
Evidenced-based knowledge and actionable advice concerning security related issues.

Security intelligence
Actionable information derived from the analysis of security-relevant data available to an
organization.

Case studies in the shortcomings of the current approach


The Sony attack:- On November 25th 2014, reports began to surface that Sony Pictures was
being attacked by a ransomware linked to a group calling itself the Guardians of Peace.9 Five
days later, the FBI assists in the investigation and eventually releases a warning about the
wider use of destructive malware. In the coming weeks hundreds of gigabytes of Sonys files
were posted in a series of bundles in public forums and contained personally identifiable
information, sensitive correspondence, and salary information.

Next-generation bank heist:- On February 4th 2015, the Federal Reserve Bank of New York
processed four requests to transfer USD 101 million from the Bangladesh Central Bank to
banks in the Philippines and Sri Lanka. The transactions were handled in accordance with the
procedures and credentials governed by SWIFT. some unknown assailants introduced
malware, most likely a Remote Access Trojan (RAT), into the victims computer systems a
few weeks before the plan was executed. After collecting sufficient information, the fraudsters
finally launched their operation. Understanding the mechanism also allowed the hackers to
remove a critical system file and disable the printer that recorded each money transfer request,
making it harder for the bank to see the transfers before they could be halted.

Concepts of intelligence operations: the new approach


Tactical phase: the key role in current operations, where events of interest are constantly
examined and triage is performed to determine critical events.

Operational phase. This phase attempts to determine the nature of the attack, using advanced
forensic analysis.

Strategic phase. This phase attempts to look at a larger ecosystem of data in order to provide
insight into threats, vulnerabilities, and adversary TTPs.

3
CYBER THREAT HUNTING

What is cyber threat hunting?


Cyber Threat Hunting refers to proactively and iteratively searching through networks and
datasets to detect threats that evade existing automated tools.It includes using both manual and
machine-assisted techniques, and aims to find the Tactics, Techniques and Procedures (TTPs)
of advanced adversaries.

Sources of cyber threats


Commercial and industrial cyber espionage for theft and competitive advantage
Government cyber espionage for technical and political advantage
Organized crime for financial gain through the acquisition and theft of data and goods
Terrorist activity designed to harm both businesses and governments, including
damage to physical infrastructure by unauthorized entry to their industrial control
systems
Hacktivism of IT assets resulting in public embarrassment, loss of public confidence
and damage to the value of the brand

IBM i2 Enterprise Insight Analysis a solution to cyber threat


IBM i2 Enterprise Insight Analysis is a next generation intelligence solution that enables
organizations to incorporate cyber threat hunting into their security strategy and turn their
defence into a proactive offense. It helps organizations uncover critical insights about their
threats and threat actors so they can mitigate and counter more threats with a combination of
multi-dimensional visual analysis capabilities and advanced analytics.

4
The solution to cyber threat
With the IBM i2 Enterprise Insight Analysis solution, organizations can proactively develop
a comprehensive understanding of their attack surfaces and vulnerabilities and develop
referenceable attack scenarios to help speed investigations and remediation. To prevent future
attacks, organizations can identify and investigate attackers after an incident. All insights
become part of the organizations cyber security strategy and tactics, resulting in an intelligent
approach to cyber security.

Rich extraction, analysis and visualization capabilities that turn large quantities of cyber
data into actionable intelligence
Rapid pattern analysis that quickly identifies characteristics and bad actors in attacks
Social network analysis capability that identifies distribution of power and
communication patterns in cyber networks
Sophisticated analytical database for managing and analyzing multi-source data
Data sharing and layering to pool cyber investigative data with other data sources

Вам также может понравиться