Case Study Of SPE Breach: The Hack Of The Century

Superior Essays
1. A brief summary of the range, contents, and argument of the article.As we tried to answer the question #2 of case study 1 – SPE Breach: The Hack of the Century, “Discuss why despite substantial investments made by at the past, Sony still suffers security weaknesses?” (Bechor, 2017), this article by Julisch (2013) attempts to answer the similar question, “why despite substantial investments, there are still major security weaknesses in today’s information systems” by identifying the four anti-patterns and by suggesting how to overcome the anti-patterns. After the introduction, Julisch (2013) covers each of the following four anti-patterns and presents steps to tackle each as follows:Overreliance on intuition to make security decisionsLeaving …show more content…
CI Principle I (threat awareness): “Continuously analyze the strategies and tools that cyber adversaries use.” Julisch (2013) argues that the adversaries’ strategies will change, and in response, firms’ maturity regarding the Principle I will be dependent upon the firms’ responsiveness to adapt accordingly.2. CI Principle II (preparedness): “Minimize your attack surface, i.e. the number of vulnerabilities that the threat can exploit.” Julisch (2013) provides several opportunities to apply this principle: assessing and managing ‘cyber footprint’, more restrictive spam filtering, the outright deletion of high-risk attachments, and identifying and blocking malicious Web pages and outgoing command and control channels. 3. CI Principle III (situational awareness): “Build situational awareness of the evolving state of attacks and intrusions.” When discussing this principle, Julisch (2013) argues the importance to understand APTs’ staged advancements and to comprehend the state of attacks and to block them in tracks and suggest anomaly detection as the most powerful technique for this principle. In wrapping up this anti-pattern, Julisch (2013) illustrates cyber intelligence in Fig 1. “Cyber intelligence combines the strategic intelligence of understanding and preparing for threats (Principles I and II) with the tactical intelligence of responding to dynamic threat situations (Principle III)” and urges us to perform the cycle faster to become more adaptable, thus yielding more limited opportunity for the attackers.Weak Governance (the anti-pattern #4) – Regarding IT

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    This author himself is a highly educated, college professor. Even with that perspective of being a scholar in this field of study for more than 5 years, Herb does not frame this article to be viewed by other highly educated university professors in his similar field of study. As I mentioned before he aims this article at a more general population. The actual audience of this piece would be subscribers to the Washington Post where this article was published. In addition to the subscribers, the ideal audience would include individuals in care about the Equifax hack or cyber space policy and security.…

    • 1616 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Developing data analytics to monitor and screen cybersecurity threats and react to threat attacker episodes and review log activities (Bergquist, 2016). Technical recommendations to boost security without significantly increasing personnel management can be achieved by incorporating security frameworks reviews, examining any area(s) of weakness or vulnerabilities and implementing security controls. Business partners of ABC Healthcare such as banks, vendors, and collection agencies will continue to thrive with the integration of proper security measures without introducing significant overhead and complexity. Integrating data sharing polices can protect the information and ultimately reduce the level of access to individuals information. To tackle information security infringements, ABC healthcare business partners must concentration on the collaboration of security control with ABC Healthcare to enforce security regulations such as data encryption, data sharing and disposal policies, and educate personnel by…

    • 782 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Moreover, there are other types of cyber-attacks and acts of cyber warfare that are not solely military and defense concentrated, but nevertheless are dangerous. An example of this type of attack is explained in columnists, DJ Summers (2014) article “Fighting in the Cyber Trenches”. In his example, he explains how an honest biomedical company going through the process of creating a new technological innovation may have to wait up to five years to be able to release a new product. On the other hand, a different company who is trying to release the same product may use a hacker to release this new product into the market in as shorter span of time for instance, as 18 months (Summers, 2014). Summers explains how hackers are able to infiltrate…

    • 230 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    One of the other options in having more aggressive operation is the ability to disrupt operations being conducted in our IC, as well as determine what the enemy wants to know. If the CI community is able to determine what the enemy wants to know then the IC can then be strengthened where there are issues. With the new evolutions of technology, espionage may not be conducted in some back alley in Moscow or Tehran, but in a blog or forum where OPSEC has been compromised. With the integration of Cyber in the CI community the ability to cover another avenue of approach, as well as give another ability to conduct active operations against the enemies is a large advantage.…

    • 675 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the world of cybersecurity it is taught the user is the weakest link. Training and education to the staff is a vital piece of maintaining a strong security posture. It is recommended annual awareness training is a requirement to all personnel that have access to information or information systems at Sony, requiring them to sign documentation stating they were trained and understand the “do’s” and “don’ts” when accessing those systems. All recommendations provided in this white paper will require awareness and education to senior management and the…

    • 431 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    INTRODUCTION The increasing growth of cybercrime and the associated risks are forcing most organizations to focus more attention on information security. It is critical that organizations must find a way to protect their data. This article will describe how to plan, develop and create an Information Security Operation Center (ISOC). Basically, an ISOC brings together the many isolated monitoring and response functions in a unified framework.…

    • 1078 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Security Breach Effects

    • 734 Words
    • 3 Pages

    Effects of Security Breaches Breaches come in many shapes and sizes, from rather harmless website defacements perpetrated by hacktivist groups or bored, gifted youngsters, to data being accidentally exposed, to data being stolen by professional crackers and later traded in the black market or used to blackmail the company (Krausz, Michael, and John Walker). Not all security breaches are of the same scale, and, naturally, not all breaches affect a company the same way. These security breaches result in a pronounced effect on a company’s bottom line, stock, and reputation It may be quite obvious that the bottom line of a company’s checkbook is often directly affected by a security breach. Target suffered a large security breach in 2014 that…

    • 734 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Improved Essays

    “As a young boy, I was taught in high school, hacking was cool.” - Kevin Mitnick Tell me what is the first thing that comes to your mind when you hear the term ‘hacking’? Brighten up your imagination a bit more and tell me how do you portray a ‘hacker’? Well, I am sure most of the will imagine a hacker as a geek, who is mysteriously attractive and is surrounded by many computers with codes running in them.…

    • 876 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Previously I stated that “Overcomplicating Security is Your Greatest Weakness” [1] and now I would like to expand a little more on this issue. I will state that I have a lot of professional respect for many of my peers, but I know factually that many have been on the wrong security path for some time. Initially I tended to blame certification bodies for putting forth less than stellar explanations of “real world security”, then I began blaming those tasked with frameworks, guidelines and standards for what I feel (not felt), are “less than stellar” explanations and or fixes for issues in the networks. Prior to discussing security issues, I’d like to point out “conditioning.” clas·si·cal con·di·tion·ing - a learning process that occurs when…

    • 976 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    When studies on cyber security and cyber attacks combined with the all too real fact that the general public is mal-informed as to their responsibility to become educated in cyber security awareness, a correlation exists (Fiedler, 2016). Being unaware of the serious consequences of the actions of individuals and businesses alike is what cyber security awareness is all about. Furthermore, in line with the disruptive innovation theory, the more advanced the technology, the greater opportunity to protect our businesses and individuals…

    • 2302 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    The United States currently faces many challenges, including a very widespread lack of confidence in its ability to carry out its many missions competently as well as legally. Counterintelligence (CI) is one of the most vital arenas within the United States Intelligence Community (IC), and is aimed at achieving the main goal of protecting the country, both from insider threats and foreign intruders. It is our nation’s shield and sword. While many improvements to this vital system have been made or need to be made, many issues still remain as no system will ever be perfect.…

    • 845 Words
    • 4 Pages
    Improved Essays