Advanced Persistent Threats Against RSA Tokens - Case Study Example

Comments (0) Cite this document
Summary
After September 2011 terrorist attacks, developed countries have significantly changed the way of countering vulnerabilities from terrorism.Enormous amount of resources were utilized for mobilizing them on a very short time period…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Advanced Persistent Threats Against RSA Tokens
Read TextPreview

Extract of sample "Advanced Persistent Threats Against RSA Tokens"

Download file to see previous pages Likewise, in the entire hoax, there was a requirement of evaluating homeland security that also pertains to Information technology infrastructure. The Information technology infrastructure was not the only consideration, as these attacks affect vulnerabilities pertaining to federal information systems and any organization that acquires information systems. However, there were several laws that were passed in the congress after September 11 terrorist attacks. In the process, a series of homeland security presidential directives were issued for sustaining domestic security. However, on the other hand, despite an economic turmoil from September 11 attacks, the aviation industry continues to grow at a rapid pace and is considered as a fundamental transformation. Moreover, there is also a significant change for managing air traffic via net-centric approach. The acquisition of this change will replace the traditional approach for controlling air traffic that is constructed on Information technology solutions. By focusing on security, there is a significant increase in utilizing computerized systems onboard of an air carrier. Likewise, these systems facilitate high airborne and internally located system connectivity, operational and maintenance requirements. Moreover, the net-centric ATM connectivity raises concerns for cyber security threats and vulnerabilities. Propagation threats are critical because it is capable of rapidly broadcasting traffic on the Internet along with bypassing intrusion detection systems. Likewise, for augmenting the primary phase of work propagation, it uses a ‘hit list’ comprising of overflowed users i.e. users consuming heavy bandwidth. By identifying users, worm spreads itself at a rapid pace when compared to traditional spreading worms. Moreover, this type of attack saves a considerable amount of scanning time by only attacking a visible target. In the context of any cyber threat to an airport, the airport cannot be the primary target, as the Spanair flight JK5022 crash was successful by one of the contributions from a Malware. Vulnerabilities Existed in the System / Attack Methods Computer network intrusions are becoming very sophisticated and advanced and they have enforced a challenge for modern computer network based organizations. Likewise, a new class of challengers called now as ‘Advanced Persistent Threats’ (APT) demonstrates a well-planned and sponsored, highly skilled hackers targeting highly classified data for gaining competitive edge specifically in corporate businesses, law firms, military networks, national or international politics (Cole, 2012). Likewise, these highly skilled cyber criminals utilize sophisticated tools and methods that are constructed to disrupt computer network defense semantics without being detected. As per Mr. Mike Cloppert, is a Co-Chair of the cyber threat intelligent summit says that the cyber threat intelligence can facilitate organizations to maintain an information classification and protection mechanism based on the priorities of these cyber criminals. As a result, the likelihood of success for these hackers will become low. Moreover, organizations can than plan accordingly for the targeted information and can counter these complex advanced persistent threats. Information security management team requires authentic and on time information for constantly monitoring new and potential threats and techniques. Likewise, exploiting the received information will improve a resilient defense posture of an organization. The number of RSA tokens implemented up till now exceeds 40 million and another 250 million are mobile software, as that leads the market for enabling ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Advanced Persistent Threats Against RSA Tokens Case Study”, n.d.)
Retrieved from https://studentshare.org/information-technology/1489076-advanced-persistent-threats-against-rsa-tokens
(Advanced Persistent Threats Against RSA Tokens Case Study)
https://studentshare.org/information-technology/1489076-advanced-persistent-threats-against-rsa-tokens.
“Advanced Persistent Threats Against RSA Tokens Case Study”, n.d. https://studentshare.org/information-technology/1489076-advanced-persistent-threats-against-rsa-tokens.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Advanced Persistent Threats Against RSA Tokens

Number theory and RSA

...? Number Theory and RSA By Number Theory and RSA Introduction Cryptography is a model different from steganography. Steganography is the process by which communication between individuals is secured through completely hiding the existence of the conversation from uninvolved parties, while cryptography is obscuring or just encrypting the messages in a conversation so that anybody who overhears the conversation cannot understand it. This process is also known as cryptosystem. In cryptography, the message is known as plaintext, then the message is scrambled to conceal the message, this process of scrambling the message is called encryption. After this process of scrambling the message, the message version...
13 Pages(3250 words)Essay

Cyber Threats

...? Cyber threats Number: Lecturer: Introduction With cybercrime becoming a threat to many organizations, there are many threats that have been recognized and pose to be a threat to the normal operations of an organization. There are various types of attacks that have been recognized. This paper will focus on the threats that are normally found to be common on the internet and suggest the possible mitigation strategies that can be applied. ARP poisoning Address Resolution Protocol spoofing, also referred to as ARP flooding, or ARP poisoning/ARP poison routing is a mechanism that is employed when one wants to attack an Ethernet wireless or wired network....
4 Pages(1000 words)Assignment

Case Study 1: Advanced Persistent Threats Against RSA Tokens

...accordingly for the targeted information and can counter these complex advanced persistent threats. Information security management team requires authentic and on time information for constantly monitoring new and potential threats and techniques. Likewise, exploiting the received information will improve a resilient defense posture of an organization. The number of RSA tokens implemented up till now exceeds 40 million and another 250 million are mobile software, as that leads the market for enabling two factor authentications (Dumas, 2012). Likewise, in two factor-authentications, password is generated that grants access to users on the...
6 Pages(1500 words)Essay

Chinas Threats

...) population 2) economic 3) military and 4) technology. While these areas are easily justified, the real reason behind the threat is somewhat unclear. This is largely because China, as an international role player, has no known or declared objectives. Thus, in order to have a basic idea on China's immediate and future plans, one must look back in history and decipher China's policies and ideals. In the 1960s, according to Okabe (1968), China's medium-range objectives consist of the following: promotion of world revolution and acquisition of resources, markets and territories; bolstering national security primarily against the American "threats;" and asserting its role in the international...
8 Pages(2000 words)Essay

Internal and External Threats

...EXTERNAL AND INTERNAL THREATS INSTITUTE EXTERNAL AND INTERNAL THREATS With the advancement in technology and the invention of computers, the working and functioning of organizations and industries has widely changed. The impact has been more towards the positive side with improved efficiency and increased output. One sector in the United States where the information technology and computers still need progress and lags in attaining the benefits of these inventions is the health division. The health sector is now attaining progress in the field of information technology and many health organizations have started implementing programs to improve efficacy and provide better health care to...
2 Pages(500 words)Essay

Community threats

... (Distribution list) Head of Noble Training Facility Three Threats to the Community (Insert) Noble Training Facility takes a very serious view of the fact that the community in Calhoun County is facing three major threats. The purpose of this paper is to present an analysis of these threats. Introduction Calhoun County is found in the Alabama state of the US. There are several community threats that the residents of this county are subjected to in their lives. These threats include Chemical Agents, Biological Agents, Explosive Agents, Nuclear Terrorism, Incendiary Terrorism and Cyber terrorism. My paper addresses three of these threats. Chemical Agents All of us are aware that chemicals if released carelessly... into...
4 Pages(1000 words)Assignment

Security Threats and Defenses

..., it the employee cannot be trusted to maintain secrecy, he or she could trade crucial information for selfish gains. They could also get manipulated. It is of great need that employees are trustworthy with or without supervision. The other aspect of social security engineering is in the form of conformity (Hadnagy, 2011). Conformity entails the ill-motive individual trying to convince an employee to confirm a password or log in information for him on the pretext that someone else such as the supervisor had already done it and he is merely confirming. This can be avoided by establishing proper communication channels within an organization so that such compromises are not made. A company can further discourage such security...
2 Pages(500 words)Essay

Security Threats and Defenses

...Security Threats and Defenses Need for security measures. Social engineering has caught on among many professionals. The techniques in use are based on cognitive biases, which are attributes of man decision making. Social engineers are aiming at exploiting these biases by creating attack techniques. Consequently, every company is at a risk of being attack by one of the many techniques in use. Preparing employees to recognize and respond to social engineering techniques will at help to protect the company in many ways, which include: 1. Use strong passwords. By using strong passwords in the computer network, they will protect the company from against unauthorized access to company’s confidential information and identity theft. 2... ...
1 Pages(250 words)Essay

CyberSecuirty Threats

...that mainly affects transport or courier companies. Here, the legitimate persons responsible for delivery of a certain consignment are requested elsewhere by the malicious persons (Engin & Christopher, 560). Baiting is whereby an attacker schemes and leaves a malware-infected USB flash drive, CD-ROM or floppy disk in a very open area or sure location where the target persons may easily find it (Peter & Allan, 200). References Lynch, Jennifer. Identity Theft in Cyberspace: Crime Control Methods and Their Effectiveness in Combating Phishing Attacks. United States, 2005. Web. Engin, Kirda. Christopher Kruegel. Protecting Users against Phishing Attacks. Technical University of Vienna Vienna: Austria, 2005. Web. HUANG,...
2 Pages(500 words)Essay

Persistent Online Games

...Persistent Online Games Introduction ‘Online gaming’ is popular among youths and children. Online gaming is popular amid youths belonging to 9-16 year age. In this age group, online gaming is popular than social networking. Games are identified as social and fun form of entertainment that encourages co-operation and teamwork when playing with others. However, it is harmful to the subscribers in terms of privacy, addiction and health (Hayes, 2008). In this respect, the essay focuses on the harms caused to the subscribers of persistent online gaming. In addition, the moral responsibility of the designers of online gaming has been discussed in relation to the harms that subscribers faced. Subscribers May...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Advanced Persistent Threats Against RSA Tokens for FREE!

Contact Us