{"id":369,"date":"2017-09-27T18:29:35","date_gmt":"2017-09-27T18:29:35","guid":{"rendered":"http:\/\/bocchinfuso.net\/?p=369"},"modified":"2017-10-06T19:22:51","modified_gmt":"2017-10-06T19:22:51","slug":"fit-mgt-5115-wk-5-discussion-post","status":"publish","type":"post","link":"https:\/\/bocchinfuso.net\/index.php\/2017\/09\/27\/fit-mgt-5115-wk-5-discussion-post\/","title":{"rendered":"FIT \u2013 MGT 5115 \u2013 Wk 5 Discussion Post"},"content":{"rendered":"<p><em><strong>Why is cybercrime expanding rapidly? Discuss some possible solutions, including acceptable-use policies, security procedures, and policies.<\/strong><\/em><\/p>\n<p>One of my favorite websites is the\u00a0<a href=\"http:\/\/map.norsecorp.com\/\" target=\"_blank\" rel=\"noopener\">Norse Attack Map<\/a>.<br \/>\nThe Norse Attack Map does a good job graphically depicting the amount of suspicious activity occurring on the Internet. I am also an avid reader of\u00a0<a href=\"https:\/\/krebsonsecurity.com\/\" target=\"_blank\" rel=\"noopener\">Kerbs on Security<\/a>\u00a0and it&#8217;s clear that hackers are motivated by differing agendas and that attack surface and entry points are increasing at an exponential rate. IOT is creating an unprecedented attack surface and with the number of Internet-connected devices growing exponentially I think it&#8217;s fair to expect that cyber attacks will remain on the rise. \u00a0Companies like Cisco are introducing what they call\u00a0<a href=\"https:\/\/youtu.be\/CNXNWsfNlgU\" target=\"_blank\" rel=\"noopener\">&#8220;The Network Intuitive&#8221;<\/a>\u00a0(if this is the only link you click, I suggest watching this video)which will leverage machine learning and AI to protect the network and its connected devices.<\/p>\n<p><a href=\"https:\/\/www.vox.com\/a\/internet-maps\" target=\"_blank\" rel=\"noopener\">Our connected evolution<\/a>\u00a0from the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/ARPANET\" target=\"_blank\" rel=\"noopener\">ARPANET<\/a>\u00a0to the Internet we are all so familiar with and have come to rely on, to the\u00a0<a href=\"http:\/\/ioeassessment.cisco.com\/\" target=\"_blank\" rel=\"noopener\">Internet of Everything (IoE)<\/a>\u00a0is what provides the basis for the rapid expansion of cybercrime. A quick look at the growth of the Internet and the connected devices provides insight to an attack surface that is growing bigger and bigger with each passing day.<\/p>\n<p>The\u00a0<a href=\"https:\/\/krebsonsecurity.com\/2014\/02\/target-hackers-broke-in-via-hvac-company\/\" target=\"_blank\" rel=\"noopener\">Target breach<\/a>\u00a0was highlighted in the text (Turban, 2015, p. 149) and this was a violation that was a probably avoidable with simple layer one isolation. Why Fazio Mechanical Servies, Target&#8217;s HVAC contractor would have credentials on a network that had access to Target&#8217;s POS systems is a bit astounding. Hindsight is 20\/20 and hackers have proven capable of penetrating facilities which are off the grid; this was the case with\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Stuxnet\" target=\"_blank\" rel=\"noopener\">Stuxnet<\/a>. In the case of Stuxnet, a worm purportedly developed under an unacknowledged government operation called\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Operation_Olympic_Games\" target=\"_blank\" rel=\"noopener\">Olympic Games<\/a>\u00a0which was a campaign to use cyberwarfare to disrupt Iran&#8217;s nuclear program. I highly recommend the movie\u00a0<a href=\"https:\/\/www.rottentomatoes.com\/m\/zero_days\/\" target=\"_blank\" rel=\"noopener\">Zero Days<\/a>.<\/p>\n<p>The Internet is the modern-day battlefield, the keyboard is the weapon of choice, the ideal soldier is adept at sleep deprivation and enjoys\u00a0<a href=\"https:\/\/i1.wp.com\/wordofthenerdonline.com\/wp-content\/uploads\/2015\/11\/05\/Jolt-Cola-Jurrasic-Park.jpg\" target=\"_blank\" rel=\"noopener\">jolt cola<\/a>\u00a0and cold pizza. Whether you hack for the challenge (e.g. &#8211;\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Kevin_Mitnick\" target=\"_blank\" rel=\"noopener\">Kevin Mitnick<\/a>), hack for\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Hacktivism\" target=\"_blank\" rel=\"noopener\">hacktivism<\/a>\u00a0(e.g. &#8211;\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Barrett_Brown\" target=\"_blank\" rel=\"noopener\">Barrett Brown<\/a>), hack for money (e.g. &#8211;\u00a0<a href=\"https:\/\/www.howtogeek.com\/157460\/hacker-hat-colors-explained-black-hats-white-hats-and-gray-hats\/\" target=\"_blank\" rel=\"noopener\">black, white and gray hat hackers<\/a>\u00a0for hire) or you\u00a0<a href=\"http:\/\/tech.newstatesman.com\/guest-opinion\/nation-state-cyber-attacks-come-shadows\" target=\"_blank\" rel=\"noopener\">hack for a nation-state<\/a>, you likely live inside a sub-culture which is which is experiencing exponential growth.<\/p>\n<p>I think it&#8217;s important to note that amount of\u00a0<a href=\"https:\/\/opensource.org\/\" target=\"_blank\" rel=\"noopener\">Open Source<\/a>\u00a0software being deployed has exploded; this is important because the source code is easily accessible, this makes it easier for hackers to find and exploit vulnerabilities. This software is everything from operating systems like\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Linux\" target=\"_blank\" rel=\"noopener\">Linux<\/a>\u00a0which powers the Internet in the form of servers, mobile devices, IoT devices, routers, switches, etc&#8230; to platforms like\u00a0<a href=\"https:\/\/wordpress.com\/\" target=\"_blank\" rel=\"noopener\">WordPress<\/a>\u00a0which is said to power 28% of the websites on the Internet. \u00a0Linux and platforms like WordPress are\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Honeypot_(computing)\" target=\"_blank\" rel=\"noopener\">honeypots<\/a>\u00a0because a vulnerability found in the\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Linux_kernel\" target=\"_blank\" rel=\"noopener\">Linux kernel<\/a>, a\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/GNU_Project\" target=\"_blank\" rel=\"noopener\">GNU binary<\/a>\u00a0or in the WordPress code can be exploited and impact maximum damage. \u00a0It&#8217;s also important to recognize how important simple things like password length and complexity are, tools like\u00a0<a href=\"https:\/\/hashcat.net\/hashcat\/\">hashcat<\/a>, cloud computing, and the accessibility to\u00a0<a href=\"http:\/\/www.nvidia.com\/object\/what-is-gpu-computing.html\" target=\"_blank\" rel=\"noopener\">GPU computing<\/a>\u00a0have made cracking reasonably complex passwords a speedy task, what used to take years now takes minutes.<\/p>\n<p>Cloud computing and rapid adoption have not made these problems any easier to deal with. \u00a0As developers race to the cloud to become the next\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Unicorn_(finance)\" target=\"_blank\" rel=\"noopener\">Unicorn<\/a>security practices are weakening. \u00a0One of my favorite stories is about a company called\u00a0<a href=\"https:\/\/www.theregister.co.uk\/2014\/06\/18\/code_spaces_destroyed\/\" target=\"_blank\" rel=\"noopener\">Code Spaces<\/a>\u00a0who was put out of business by a hacker who gained root access to their AWS account and essentially deleted all their instances, data, and backups. \u00a0There are stories every day about developers placing keys on\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/GitHub\" target=\"_blank\" rel=\"noopener\">Github<\/a>\u00a0inadvertently and there are<a href=\"https:\/\/www.theregister.co.uk\/2015\/01\/06\/dev_blunder_shows_github_crawling_with_keyslurping_bots\/\" target=\"_blank\" rel=\"noopener\">\u00a0bots which are actively crawling code repositories<\/a>\u00a0looking for keys. \u00a0In this connected world access to information awesome and so is the ability to expose information that should not be exposed, good policies, procedures, automation, etc&#8230; are required to mitigate risk.<\/p>\n<p>Acceptable use policies and training can be an effective means of influencing how users interact with systems that can either pose a direct or tangential cybersecurity threat.<\/p>\n<p>Security policies and procedures define how to prevent and respond to security incidents. These policies and procedures focus on enforcement, designated and empowered incident response personnel, notification procedures, communication plans and monitoring external sources of information.<\/p>\n<p><strong>Examples of computer security related incidents and items that might be addressed in an acceptable use policy might include items such as:<\/strong><\/p>\n<ul>\n<li>A denial of service attack (DOS, DDOS).<\/li>\n<li>Malware infections.<\/li>\n<li>Policy violations, such as sharing offensive material, deliberate violation of information security policies, inappropriate use of systems and assets, and unauthorized escalation of privileges or subversion of access controls.<\/li>\n<li>A user who defaces another organization\u2019s public website.<\/li>\n<li>Unauthorized access is gained to a critical information system.<\/li>\n<li>Internal hacking.<\/li>\n<li>External hacking, including defacement of websites and malicious intrusion attempts into the internal network.<\/li>\n<li>Unauthorized access using VPN or wireless remote access.<\/li>\n<li>Abuse of authorized internal and external services.<\/li>\n<li>Unauthorized changes to live systems.<\/li>\n<li>An event requiring forensic investigation to obtain evidence (e.g. point of entry, compromise of data, etc.).<\/li>\n<li>Information systems and assets being used to commit unlawful activity.<\/li>\n<li>The actions of third parties who use computer systems to harm the reputation of an organization.<\/li>\n<li>Theft of database content.<\/li>\n<li>Theft of mobile computing property.<\/li>\n<li>Misuse of an employee\u2019s or customer\u2019s personal information.<\/li>\n<li>User disclosure of confidential information to external parties.<\/li>\n<\/ul>\n<p><strong>A security policy might include items such as the following:<\/strong><\/p>\n<ul>\n<li>An incident response plan that serves as a guideline for an overall approach to addressing information security incidents.<\/li>\n<li>An intrusion detection procedure that establishes an intrusion detection system and parameters related to maintaining this system.<\/li>\n<li>Processes that flow through all phases of a response to an information technology-related incident (preparation, identification, containment, eradication, recovery, and lessons learned).<\/li>\n<li>A procedure within the plan that includes classifying an event and assigning a severity rating or priority.<\/li>\n<li>Regular reporting requirements for summary reports to management.<\/li>\n<li>Provisions for documentation of critical information necessary in the event of an incident and guidelines for all personnel to report observed suspicious activity.<\/li>\n<li>Incident management procedures that include a severity rating assignment.<\/li>\n<li>Establishment of guidelines for communication of incidents to outside parties.<\/li>\n<li>Selection of an incident response team with designated roles and responsibilities.<\/li>\n<li>Ongoing and scheduled training for the incident response team.<\/li>\n<\/ul>\n<p>Outlining what is acceptable use and how to respond to incidents, can reduce risk and improve the ability to contain potential damages should a security incident arise.<\/p>\n<p><strong>References<\/strong><\/p>\n<p>Bate, Ben, et al. \u201cWordPress now powers 28% of all websites.\u201d Envato, 5 Sept. 2017, envato.com\/blog\/wordpress-now-powers-28-websites\/. Accessed 27 Sept. 2017.<\/p>\n<p>Finley, Klint. \u201cLinux Took Over the Web. Now, It&#8217;s Taking Over the World.\u201d Wired, Conde Nast, 3 June 2017, www.wired.com\/2016\/08\/linux-took-web-now-taking-world\/. Accessed 27 Sept. 2017.<\/p>\n<p>\u201cKrebs on Security.\u201d Brian Krebs, krebsonsecurity.com\/2014\/02\/target-hackers-broke-in-via-hvac-company\/. Accessed 27 Sept. 2017.<\/p>\n<p>Tung, Liam. \u201c IoT devices will outnumber the world&#8217;s population this year for the first time.\u201d ZDNet, ZDNet, 13 Feb. 2017, www.zdnet.com\/article\/iot-devices-will-outnumber-the-worlds-population-this-year-for-the-first-time\/. Accessed 27 Sept. 2017.<\/p>\n<p>Turban, Efraim, et al. Information technology for management digital strategies for insight, action, and sustainable performance. New Jersey (Estados Unidos), Wiley, 2015.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why is cybercrime expanding rapidly? Discuss some possible solutions, including acceptable-use policies, security procedures, and policies. One of my favorite websites is the\u00a0Norse Attack Map. The Norse Attack Map does a good job graphically depicting the amount of suspicious activity occurring on the Internet. I am also an avid reader of\u00a0Kerbs on Security\u00a0and it&#8217;s clear [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":37,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,8,2],"tags":[],"_links":{"self":[{"href":"https:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/posts\/369"}],"collection":[{"href":"https:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/comments?post=369"}],"version-history":[{"count":1,"href":"https:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/posts\/369\/revisions"}],"predecessor-version":[{"id":370,"href":"https:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/posts\/369\/revisions\/370"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/media\/37"}],"wp:attachment":[{"href":"https:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/media?parent=369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/categories?post=369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bocchinfuso.net\/index.php\/wp-json\/wp\/v2\/tags?post=369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}