StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Advanced Persistent Threats Against RSA Tokens - Case Study Example

Cite this document
Summary
After September 2011 terrorist attacks, developed countries have significantly changed the way of countering vulnerabilities from terrorism.Enormous amount of resources were utilized for mobilizing them on a very short time period…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.7% of users find it useful
Advanced Persistent Threats Against RSA Tokens
Read Text Preview

Extract of sample "Advanced Persistent Threats Against RSA Tokens"

? Full Paper Introduction After September terrorist attacks, developed countries have significantly changed the way of countering vulnerabilities from terrorism. Enormous amount of resources were utilized for mobilizing them on a very short time period. These mobilized resources were aligned to counter apparent cyber threats from terrorist attacks. Likewise, in the entire hoax, there was a requirement of evaluating homeland security that also pertains to Information technology infrastructure. The Information technology infrastructure was not the only consideration, as these attacks affect vulnerabilities pertaining to federal information systems and any organization that acquires information systems. However, there were several laws that were passed in the congress after September 11 terrorist attacks. In the process, a series of homeland security presidential directives were issued for sustaining domestic security. However, on the other hand, despite an economic turmoil from September 11 attacks, the aviation industry continues to grow at a rapid pace and is considered as a fundamental transformation. Moreover, there is also a significant change for managing air traffic via net-centric approach. The acquisition of this change will replace the traditional approach for controlling air traffic that is constructed on Information technology solutions. By focusing on security, there is a significant increase in utilizing computerized systems onboard of an air carrier. Likewise, these systems facilitate high airborne and internally located system connectivity, operational and maintenance requirements. Moreover, the net-centric ATM connectivity raises concerns for cyber security threats and vulnerabilities. Propagation threats are critical because it is capable of rapidly broadcasting traffic on the Internet along with bypassing intrusion detection systems. Likewise, for augmenting the primary phase of work propagation, it uses a ‘hit list’ comprising of overflowed users i.e. users consuming heavy bandwidth. By identifying users, worm spreads itself at a rapid pace when compared to traditional spreading worms. Moreover, this type of attack saves a considerable amount of scanning time by only attacking a visible target. In the context of any cyber threat to an airport, the airport cannot be the primary target, as the Spanair flight JK5022 crash was successful by one of the contributions from a Malware. Vulnerabilities Existed in the System / Attack Methods Computer network intrusions are becoming very sophisticated and advanced and they have enforced a challenge for modern computer network based organizations. Likewise, a new class of challengers called now as ‘Advanced Persistent Threats’ (APT) demonstrates a well-planned and sponsored, highly skilled hackers targeting highly classified data for gaining competitive edge specifically in corporate businesses, law firms, military networks, national or international politics (Cole, 2012). Likewise, these highly skilled cyber criminals utilize sophisticated tools and methods that are constructed to disrupt computer network defense semantics without being detected. As per Mr. Mike Cloppert, is a Co-Chair of the cyber threat intelligent summit says that the cyber threat intelligence can facilitate organizations to maintain an information classification and protection mechanism based on the priorities of these cyber criminals. As a result, the likelihood of success for these hackers will become low. Moreover, organizations can than plan accordingly for the targeted information and can counter these complex advanced persistent threats. Information security management team requires authentic and on time information for constantly monitoring new and potential threats and techniques. Likewise, exploiting the received information will improve a resilient defense posture of an organization. The number of RSA tokens implemented up till now exceeds 40 million and another 250 million are mobile software, as that leads the market for enabling two factor authentications (Dumas, 2012). Likewise, in two factor-authentications, password is generated that grants access to users on the network. The RSA token are common in financial institutions and government agencies for processing transactions. Three Methods to Protect against APT The Chief Security Officer for a corporate organization will adopt a common defense strategy that will lead to preparation of business and mitigating risks, as per IT security authorities. However, some of the APT for example Stuxnet integrates a portfolio of penetration methods and techniques. These combined penetration methods can be countered individually and can be easily defended. By practicing the baselines effectively will enable baseline security that will minimize the likelihood of hackers or cyber criminals managing a vulnerability management mechanism, security patch management for keeping security patches up to data and continuous monitoring of the IT security architecture for the organization’s infrastructure. Likewise, adopting best practices will facilitate organizations to perceive APT’s to some extent and other attempts such as hacking or human threats intentional/ un-intentional can be detected and prevented. Moreover, for protection against APT’s, a in depth defense mechanism along with advanced detection techniques, a resilient APT incident response planning and recovery planning along with security awareness session is essential. These practices will prepare organization to counter these advanced threats. Adopting a standard and certifying such as ISO27001 certification will also ensure protecting the Confidentiality Integrity and Availability of data within the organization. There are certain requirements to fulfill before achieving the certification such as establishing and maintaining an asset register, establishing and maintaining risk management plan, establishing and maintaining statement of applicability, establishing and maintaining configuration and record management, establishing and maintaining Business Continuity Plan etc. furthermore, effective policies and procedures along with guidelines must be in place in accordance to the ISO27001 standard. For maintaining effectiveness, security awareness sessions and surveillance internal audits are conducted to measure the compliance for each business functions that is available in the ISO27001 scope (Calder, 2005). Types of Technologies would Help Alleviate the Problems It is very important for organizations to review the assets marked as critical in the risk register. The executive and senior management along with the corporate communication function need communication for ensuring the PR messages are submitted for lowering the damage to the brand. Everyone from top to bottom, designation wise, must be trained and aware of the latest security trends in order to report incident within the organization. Likewise, everyone should be aware of security risks associated with any incident or potential attacks and their consequences. As mentioned earlier, if the organization certifies to one of the information security standards such as ISO27001, policies, procedures and adequate controls will be implemented. Advanced Persistent Threats have already exploited vulnerabilities in corporate organizations such as RSA, Iran’s nuclear reactors, Google incorporated and Sony Corporation as well. It is obvious that no one is safe from these intelligent and customized attacks tailored only for disrupting businesses and makes them suffer. These threats can be countered individually by making an intelligent defense mechanism. Three Techniques for Protection against APT As stated by the IT security specialist, the three methods are suggested in order to defend (Advanced Persistent Threat) APT risk in large organizations. In fact, simple security techniques cannot provide required protection for large organizations for APT as the threats are getting stronger. The advanced threats are the combination of high infiltration procedures. The main objective of most APTs is to obtain zero-day vulnerabilities for instance, the APTs like Stunxnet. However, these threats are detectable if considered independently. In addition, the techniques that are used by many advanced threats are well known and can be defend easily. In order to reduce the risk of possible threats, the organizations along with IT security providers must maintain proper level of security, updating security patches and frequent testing of security bearings. This will help an organization to identify the number of APTs, system hacking or accidental security breaches. Moreover, organizations must have an in-depth defense analysis for possible threats, on time risk identification capabilities, incident response map regarding APT, security training sessions and an incident recover map. This will help the organization to deal with the threats and to respond rapidly over the ongoing problem in order to save the asset from possible security threat. In addition, the organizations have to conduct re-evaluation procedures to reduce future security breaches. Furthermore, business procedures are made to reduce future risk. This can be implemented by correct allocation of finances and resources for the defense of expensive assets present in the organization. The security breach in RSA was accomplished by obtaining SecurID through phishing emails. The RSA has revealed that the security lapse is accomplished via formerly develop unpatched Adobe Flash hole. The emails were sent to the lower grade officers with the subtitle named “2011 Recruitment Plan”. The Elinor Mills, head of new technologies related to consumer identity protection at RSA wrote in his blog that the hackers sent these phishing emails last mint within the period of two days. These phishing emails contain Excel file attachments that states that the hacker has implemented a customized remote administration tool that is called as Poison Ivy Remote Administration Tool (Varsalone & McFadden, 2011). Likewise, this tool grants external remote administration request for accessing the system. Moreover, after gaining access, the hacker may execute many commands on the hacked system. This is a more common attack that is difficult to detect. The attack on RSA is known as APT i.e. Advance Persistent Threat. In addition, these types of threats mainly focus on the source code and other useful data to collapse organizations valuable network operations and IT infrastructure. These kinds of attackers gather information for several months before final attack. However, these times the attack was identified as well as defends by the RSA and their team. The head of new technologies and consumer identity protection says, “Since RSA detected this attack in progress, it is likely the attacker had to move very quickly to accomplish anything in this phase.” These threats are sent through emails or other social networks. The attackers use key loggers, snooping techniques to target specified employees. Furthermore, the attackers are using an unpatched hole through which they enter into company’s computer as stated by Google and several other organizations. These attackers were identified in China and used internet explorer to steal organizations valuable assets. References Cole, E. (2012). Advanced persistent threat : Understanding the danger and how to protect your organization. Burlington: Elsevier Science. Calder, A. (2005). The case for ISO 27001 IT Governance Ltd. Dumas, B. M. (2012). Information technology and society Taylor & Francis. Varsalone, J., & McFadden, M. (2011). Defense against the black arts: How hackers do what they do and how to protect against it Taylor & Francis. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Advanced Persistent Threats Against RSA Tokens Case Study”, n.d.)
Retrieved from https://studentshare.org/information-technology/1489076-advanced-persistent-threats-against-rsa-tokens
(Advanced Persistent Threats Against RSA Tokens Case Study)
https://studentshare.org/information-technology/1489076-advanced-persistent-threats-against-rsa-tokens.
“Advanced Persistent Threats Against RSA Tokens Case Study”, n.d. https://studentshare.org/information-technology/1489076-advanced-persistent-threats-against-rsa-tokens.
  • Cited: 0 times

CHECK THESE SAMPLES OF Advanced Persistent Threats Against RSA Tokens

Primary Cyber Threats

hellip; In the security system against the cyber threats, a company usually determines its target and policies which includes latest and more advance persistent threat (Bodeau, et al, 2010).... (Swafford, 2011) Advantages and Disadvantages of different security systems against Cyber Attacks Biometrics and Access Control It is an elementary system which uses to control and save the unique feature of one's body such as finger prints.... Primary Cyber threats to an Organization's Mission-Critical Information Systems No: Date: Primary Cyber threats to an Organization's Mission-Critical Information Systems Introduction This research has been conducted in order to explore the latest cyber threats an airport bears and all the issues in an airport's infrastructure which is equally valuable for the existing, new and future clients and passengers....
3 Pages (750 words) Coursework

The Quality of Service Provided by the Integrated Services Architecture

The paper "The Quality of Service Provided by the Integrated Services Architecture" defines the ways the HTTP protocol attempts to improve performance for HTTP applications, advantage introduced by pipelining, a conditional GET request, three different Internet protocols for email retrieval, etc....
28 Pages (7000 words) Assignment

Unified Threat Management: A Defensive Suite for the 21st Century

It is no longer the 1990s, where the omnipresent and singular concern was… Even individual end-users behind home networks face a bevy of threats from spam, scammers, fraudulent offers, spyware (whether illicit or created by “legitimate” companies), malware, viruses, keyloggers, identity theft, credit and debit card interceptions and fraud, and Making distinctions between these threats is often an exercise in futility: Thus, the birth of the UTM movement....
13 Pages (3250 words) Essay

Hackers Gain Access to RSAs SecurID Tokens

From analyzing the statements of RSA's CEO it is clear that they were aware of advanced persistent threats for some time.... The article “Hackers Gain Access to RSA's SecurID tokens” reveals that hackers have breached the security of the renowned security and cryptography Company RSA.... Also, the statements made by RSA's CEO at the RSA Security Conference in San Francisco earlier this year describes that such attacks as part of an evolving threat landscape that has shifted from wholesale crime to targeted attacks that steal high-value information (Jackson, Hackers gain access to RSAs SecurID security tokens, 2011)....
2 Pages (500 words) Essay

Advanced Hunting and Content Development

In their attack, offenders use different platforms and phishing techniques while defenders are forced to use such as exploit kit servers such as rsa Security Analytics to monitor phishing and other attacks.... rsa security analytics work toward protecting phishing, and suspicious objects, patterns or events using notifications such as warnings, provision of information, and curbing suspicions.... In all cases, rsa security analytics uses an event reconstruction to identify suspicions, warnings, or compromise, and communicates to the present security tools including intrusion prevention systems, and firewalls....
2 Pages (500 words) Research Paper

Defining Provocation and Its Historical Context

This study will examine the law on provocation and the developmental changes within the law that are now operative when relying on this as a defense.... The study will also look at the historical use of provocation in order to compare this with the modern day application of the defense.... hellip; It is anticipated that this study will reveal that provocation as a defense is not clearly and consistently applied and that the court will take many factors into account when deciding whether to accept the defense of provocation....
39 Pages (9750 words) Essay

What Are Advanced Persistent Threats and How to Prevent Them

This research paper "What Are advanced persistent threats and How to Prevent Them" focuses on modern information technology and cybersecurity threat.... APTs have grabbed international headlines due to their ability to effectively target both enterprises as well as governmental networks which can generate considerable national security threats....
20 Pages (5000 words) Research Paper

Development of a Classroom Token Economy

List of ReinforcersReinforcements are the meaningful objects, privileges, and activities that individuals exchange for their tokens.... Upon successful initiation of the program, the tokens should be reduced gradually to allow the target to display the desired behavior or task independently without the use of tokens.... The students should be able to exchange their tokens for something attractive and desirable and they should be allowed to choose their own rewards....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us