Computer Science
Week 13 Chapter 10 Emerging Threats and Countermeasures Discussion

Question Description

I’m working on a Computer Science question and need guidance to help me study.

Subject: Emerging Threats & Countermeasures

Topic: Detecting an infrastructure attack is a complex process; what kind of indicators or information would help you make the determination that a threat is underway?

1) Discussion Topic (Around 500 to 600 words) need to submit in next 2 days.

2) Respond to at least 2 other students with at least a 100-word reply about their Primary Task Response regarding items you found to be compelling and enlightening. To help you with your discussion, please consider the following questions:

  • What did you learn from your classmate's posting?
  • What additional questions do you have after reading the posting?
  • What clarification do you need regarding the posting?
  • What differences or similarities do you see between your posting and other classmates' postings?


Reference:

* Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.

* Security Risk Management:

* attached PPT

Unformatted Attachment Preview

Cyber Attacks Protecting National Infrastructure, 1st ed. Chapter 10 Awareness Copyright © 2012, Elsevier Inc. All Rights Reserved 1 • Situational awareness is the real-time understanding within an organization of its security risk posture • Awareness of security posture requires consideration of the following – – – – – – Chapter 10 – Awareness Introduction Known vulnerabilities Security infrastructure Network and computing architecture Business environment Global threats Hardware and software profiles Copyright © 2012, Elsevier Inc. All rights Reserved 2 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness Fig. 10.1 – Optimal period of system usage for cyber security 3 • Factoring in all elements of situational awareness should create an overview of current security risk • Descriptors such as high, medium, and low are too vague to be helpful • Security risk levels should be linked with actionable items Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness Introduction 4 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness Fig. 10.2 – Rough dashboard estimate of cyber security posture 5 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness Fig. 10.3 – Security posture changes based on activity and response 6 • No security task is more difficult and complex than the detection of an ongoing attack • Many tools for detecting attack, yet none comprehensive or foolproof • Determination of risk level is a fluid process Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness Detecting Infrastructure Attacks 7 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness Fig. 10.4 – Attack confidence changes based on events 8 • Situational awareness for national infrastructure protection requires a degree of attention to daily trivia around vulnerability information • Practical heuristics for managing vulnerability information – – – – Chapter 10 – Awareness Managing Vulnerability Information Structured collection Worst case assumptions Nondefinitive conclusions Connection to all sources Copyright © 2012, Elsevier Inc. All rights Reserved 9 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness Fig. 10.5 – Vulnerability management structure 10 • Three basic rules for managers – Always assume adversary knows as much or more about your infrastructure – Assume the adversary is always keeping vulnerabilityrelated secrets from you – Never assume you know everything relevant to the security of your infrastructure Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness Managing Vulnerability Information 11 • Daily cyber security intelligence reports are standard in government agencies • They would be useful in enterprise settings • A cyber security intelligence report would include – – – – Chapter 10 – Awareness Cyber Security Intelligence Reports Current security posture Top and new security risks Automated metrics Human interpretation Copyright © 2012, Elsevier Inc. All rights Reserved 12 • Tasks for creating a cyber security intelligence report – Intelligence gathering – Interpretation and publication – Dissemination and archiving Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness Cyber Security Intelligence Reports 13 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness Fig. 10.6 – Cyber security intelligence report creation and dissemination 14 • Security risks must be tracked and prioritized • Generally agreed upon approach to measuring risk associated with specific components begins with two estimations Chapter 10 – Awareness Risk Management Process – Liklihood – Consequences • Actual numeric value of risk less important than overall relative risk • A useful construct compares security risk against cost of recommended action Copyright © 2012, Elsevier Inc. All rights Reserved 15 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness Fig. 10.7 – Risk versus cost decision path structure 16 • Increasing risks likely incur increased costs • Summary of management considerations – Maintaining a prioritized list of security risks – Justifying all decisions Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness Risk Management Process 17 • The security operations center (SOC) is the most visible realization of real-time security situational awareness • Most SOC designs begin with centralized model – a facility tied closely to operation • A global dispersal of SOC resources is an around-theclock real-time analysis of security threats Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness Security Operations Centers 18 Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness Fig. 10.8 – Security operations center (SOC) high-level design 19 • A national-level view of security posture will require consideration of the following – – – – Commercial versus government information Information classification Agency politics SOC responsibility Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 10 – Awareness National Awareness Program 20 ...
Purchase answer to see full attachment
Student has agreed that all tutoring, explanations, and answers provided by the tutor will be used to help in the learning process and in accordance with Studypool's honor code & terms of service.

Final Answer

Hi buddy,Find the attached completed work, don't hesitate to reach me out in case you need any clarification or edits. I would like to also request you to invite me for your next assignment (privately if possible), am always available to help. Kindly give me a 5 star review to build my profile. Good Bye.

Running Head: INFRASTRUCTURE ATTACK

Indicators of threat in Infrastructure attack
Name:
Institution:
Date:

1

INFRASTRUCTURE ATTACK

2

Critical national infrastructures are so critical in the development of every City-State.
They entail the networks, systems, facilities, sites, and information that people depend on for
daily life. As such, it is important to protect such infrastructures. This can only be achieved by
implementing strategies on detecting any form of possible infrastructure attack. This is a
complex process and requires much attention and research. This paper seeks to discuss the
indicators or info...

Duke University

Anonymous
The tutor was pretty knowledgeable, efficient and polite. Great service!

Anonymous
Heard about Studypool for a while and finally tried it. Glad I did caus this was really helpful.

Anonymous
Just what I needed… fantastic!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4