Preview

Summary: Follow The Genera APT Attack Model

Good Essays
Open Document
Open Document
523 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Summary: Follow The Genera APT Attack Model
The Target story does follow the genera APT kill chain attack model in various different ways. In regards to its full definition (white hand out) , it was sophisticated, had multiple attack vectors, established extended foothills within Target, pursued its objectives repeatedly, adapted to defenders’ efforts, and maintained a level of interaction of execution. The Target attack was sophisticated in the sense that it was launched discretely and navigated around the (little) infrastructure and back-up plan that was established. It had multiple attack vectors in the sense that it occurred through a 3rd party vendor and not the organization in itself, meaning it had to attack from different angles in order to get all the wanted information. The …show more content…
There were several breakdowns in Target’s security operations. First, the security system was not compliant to the latest standards nor was the architecture robust enough – too many systems were chained together without defenses between them. Second, Target did not make the changes that were suggested to them on multiple fronts, but instead either ignored them completely or did not implement a plan that would last long. Third, the response to the multiple warnings, from both the monitoring system and the security teams, was not enough in comparison to the severity of the warnings. Like most organizations, Target could not predict the kind of attack that would be executed on them; however, had they responded to any of these problems directly and more carefully, they could have stopped the breach much sooner.3. The first thing I would recommend to the company would be to at least implement the standards and known issues. Yes, the main point of APTs are to constantly attack, adapt, and repeat until breach, but having established protocols in place would help Target to be less vulnerable by default. Second, I would make sure that there are establish security “check points” at all levels of system interaction or transactions. The check points should be robust enough to stop anything that is not explicitly correct. And lastly, I think Target should I would make sure that there is a proper response workflow for every point of the APT kill chain...this way, although the APT

You May Also Find These Documents Helpful

  • Powerful Essays

    In 2008 Boeing had made all sorts of headlines in the media, due to some new technological developments in their newly designed 787 Dreamliner. These headlines that splashed across websites were initially brought about due to a FAA “special conditions” report. This topic of this report first appeared in Flight International, and then a few days later it gathered momentum in a critical follow up from Wired Magazine. According to Wired (2008), the FAA states “Boeing’s new 787 may be vulnerable to hacker attack”.…

    • 1124 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    FINAL Project IS3230

    • 1645 Words
    • 6 Pages

    P. A. Loscocco, S. D. Smalley, P. A. Muckelbauer, R. C. Taylor, S. J. Turner, and J. F. Farrell. The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments. In Proceedings of the 21st National Information Systems Security Conference, pages 303–314, Oct. 1998.…

    • 1645 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    References: Horton, T. (2014, May 1). The Right Technology Fix Can Help Prevent Breaches. Retrieved April 29, 2015, from ProQuest: http://search.proquest.com/docview/1548709638?accountid=458…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    To start off with I chose to go with our banking or financial industry. The banking industry is constantly getting attacked by various methods on a daily basis. I chose this industry because I happen to know someone who works in the security sector at Wells Fargo Bank, he was a good person to get information on what he sees on a daily or weekly basis. This paper is the opinion of myself and with gathered information from various resources.…

    • 1021 Words
    • 5 Pages
    Good Essays
  • Good Essays

    9/11 Research Paper

    • 1002 Words
    • 5 Pages

    Questions: Why was security so poor, even though before 9/11 there were plenty of hijackings and attempted hijackings?…

    • 1002 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Often Information Technology Directors overlook that information security is more of a people issue rather than a technology issue. We rely heavily on people’s awareness, ethics and behavior, and an understanding of what they want to achieve is essential to accomplish the goals of business. This includes the employees that deliver services and the customers that take advantage of them, as well as the senior executives that outline the budgets.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    This article discusses Homeland Security's decision to renew Raytheon's contract as its cyber protector. In September Raytheon was picked as the main contractor for the Network Security Deployment division. This new contract is directly influenced by the companies new plans to prioritize cyber security as just last year the Office of Personnel Management was hacked, leaving data on 21.5 million people comprised. Moreover, in January of this year, a report on Homeland's cyber security admitted to limitations in ability to detect possible malware. Overall, cyber security is a controversial issue. An example of this is the debate surrounding the unlocking of a terrorist's iPhone in December, which Apple refused to do.…

    • 111 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Did the Target corporation have or use a cyber security policy? Where key controls enforced and tested at all levels of the management framework? Where their policies in place to handle, and guide the implementation of technology and protocols for support? Did Target conduct annual or semi-annual training of staff, management to cashiers, on how to identify potential security issues and what to do? Where adequate audits conducted to test the key controls, policies, and procedures that were and are in place? All of these questions will be asked after a data breach or cyber theft has occurred but was these questions asked prior to the intrusion.…

    • 823 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Despite the sense of professionalism maintained by Turley and Ripley it was clear that the company has no procedures in place to deal with infrastructure risk at any level. Needless to say that if this or any similar attack occurred during high traffic time the consequences might be excessive to the infrastructure, business and the reputation of the company. It was clear in the case that Jack hired Bob to create and implement proper policies and procedures for the infrastructure risk management. To do this, iPremier has to assess all known threats to the infrastructure risk matrix and develop procedures to immediately identify the type and risk. These threats would need to be continually assessed as new ones emerge and identification would determine the proper procedures defending against them. Additionally, the incident team manager must have a flawless understanding of the infrastructure design in order to identify where the highest risk of consequences from the attack will be. The case clearly illustrates that an important component of any procedure, regardless of the threat, is a chain of command. Incident…

    • 815 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Tim J. Watts goes more into the dark side of the “hacker” community by bringing up the constant back in forth between computer security officers and the so called hackers. This article, being written this year is able to reflect on the events of September 11, 2001 and new homeland security measures. He represents this viewpoint of a dangerous hacker in his definition: “While some hackers are harmless, others break into systems with the intent to steal information or to do destruction to the system. Hackers performing the latter pose a serious threat to the economic future of the United States” (Watts). Tim Watt outright blames the hacker community of accessing information that should be private. Only looking and reflecting on the serious threat…

    • 154 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Target's Attack Model

    • 607 Words
    • 3 Pages

    1. Does Target story follow the general “APT kill chain” attack model? Target’s story follows the general advanced persistent threat attack model. The hackers did the reconnaissance work by finding out Target’s external vendors. Unfortunately, this was easy for the hackers, because Target’s supplier portal and facilities management pages were publicly available information. So, the hackers target Fazio, an external vendor Target used. The hackers then created a targeted “weapon,,” in this case, malware, and sent phishing emails to people at Fazio. Fazio unfortunately did not use from anti-malware software. The hackers gained access to all of Fazio’s usernames and passwords, which allowed access to Target’s systems. The hackers exploited a…

    • 607 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    The attacks of September 11, 2001 on our country was one of the most tragic and deadly days in our history. It brought a country together and the American strength of freedom and unity became a battle cry. After the dust had cleared, the questions came about that asked, how could this have happened? Were there not security and intelligence infrastructures and policies in place? Where did these failures occur? Will our country be vulnerable going forward? The events of 9/11 brought a large amount of vulnerabilities to the surface of our country’s security.…

    • 2595 Words
    • 11 Pages
    Powerful Essays