A Summary Of The Goal Of APT

Great Essays
The goal of an APT is to gain access into the power grid network and collect as much information as possible. They use the exfiltration techniques that allow them to transfer sensitive information to their data-miner area also know as Command and Control Center. It is important for the APT to mask the data to resemble normal network traffic so that it detection can be made difficult or almost impossible (Cruz, 2013).
Method for data exfiltration includes:
Backdoors: This method used by the attacker to capture keystrokes, as well as video and audio of the system’s environment, using attached audio microphones and video cameras
File transfer protocols Abuse: Attackers can abuse legitimate Windows features as well. For instance, attackers can
…show more content…
IT administrators will not suspect any malicious activity since connecting outside the network is not out of the ordinary (Cruz, 2013).
In our case study, APT used social engineering techniques by crafting email content sent to users that seemed legitimate. Once in the ICS the attacker will look for valuable information and noteworthy assets and the data seen here as the pot of gold is then transfer to the C2 center through tools like Remote Access Trojans (RATs) and other customized tools. Information collected is then used for different purposes such as retaliation, sabotage, data theft, and damage to brand image and reputation.
The APT is likely to install additional tools in order to gain access to servers that could contain users’ credentials. This could be an Active Directory Server from Microsoft or a LDAP Database. The APT’s goal is to collect credentials to gain an elevated access level to the network. At this point of the attack, customized tools and firmware will be installed on all accessible Programmable Logic Controller with the intention to damage to damage or run the ICS in a different way than intended by the
…show more content…
This training will include all possible means used by APT to gain access to the company network. (Outside and inside sources, including human errors and negligence). All agencies working directly or indirectly with the Western Interconnection would have to adhere to the National Institute of Standards and Technology. It is used as standard references by the federal government appliances and networks to protect sensitive information. It reinforces the use of the ISMS risk management process and provides guidance to meet a minimum level of information security as required by the FISMA Act of 2002 (Wikipedia, n.d). Written policy should include multi-perspectives on risk including threats, asset, vulnerability space and its

Related Documents

  • Decent Essays

    Nt1310 Unit 5 Lab 3

    • 441 Words
    • 2 Pages

    It is one of the key features to test penetration included in Kali. Furthermore, Kali includes Armitage, which is a Metasploit tool which allows a team to share sessions, hosts, event logs and most importantly share access to their exploited hosts. Bots, which can be written using a language called Cortana, can also be utilized to further assist in exploitation using Armitage. Armitage will also check and see which exploits are viable and effective on your targeted machine. Once the initial exploitation is completed, you will be able to perform greater degrees of exploitation such as logging keystrokes and accessing the file system.…

    • 441 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Pt1420 Unit 5 Lab Report

    • 1875 Words
    • 8 Pages

    Such behavior frequently includes things like gaining control of a computer system, allowing privilege escalation, or a denial-of-service attack. It is run on web servers, with the purpose of identifying software susceptibilities in client machines, communicating with it and exploiting discovered vulnerabilities to upload and execute malicious code on the client. 3 e. How many options are there? How many of these are required?…

    • 1875 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    CHALLENGE: Reigning in security management and reducing complexities at remote sites. SOLUTION: Palo Alto Networks PA-3020 and PA500’s, simplifies security at Data Center and advanced security policy deployment for the remote offices RESULTS: Simplify network security with powerful security controls, ease of use and powerful reporting. Visibility into the specific identity of each application helps enforce appropriate usage policies.…

    • 750 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 5 Paper

    • 415 Words
    • 2 Pages

    2.4.11 Independent testing: KIU should have a testing plan that identifies control objectives; schedules tests of the controls used to meet those objectives; ensures prompt corrective action where deficiencies are identified; and provides independent assurance for compliance with security policies. Security tests are necessary to identify control deficiencies. An effective testing plan identifies the key controls, then tests those controls at a frequency based on the risk that the control is not functioning. Security testing should include independent tests conducted by personnel without direct responsibility for security administration. Adverse test results indicate a control is not functioning and cannot be relied upon.…

    • 415 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    VPN A virtual private network is used by organisations to help secure data on a network. It’s very hard to access these private networks meaning that the data becomes much more secure and it can be used across a large area of a network, including many computers. This isn’t an expensive thing to do anyone can do it by using simple publicly available infrastructures. VPN also makes use of encryption firewalls and authentications services when sending data across the web.…

    • 767 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Along with usernames and passwords to computers is by adding usernames and passwords for individuals that need to gain access to certain files on servers. Network administrators have the task of providing each user with only the data that they need access to. If all users have access to everything on the network this serves as a security threat because if one user's credentials are compromised the whole system can become jeopardized by unauthorized…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Penetration tests assesses the overall security. It is the process of attempting to gain access to resources without knowledge of specific user names, their passwords, or other normal means of access (similar to what an attacker would do). The big different between a penetration tester and an attacker basically is permission. A penetration tester will already have some permissions (such as an normal user account) in place from the owner or managers of the computing resources that are to be tested. From here, the pen tester will attempt to gain additional accesses.…

    • 460 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 7

    • 1149 Words
    • 5 Pages

    Destructive malware will utilize popular communication tools to spread, including worms sent through email and instant messages, Trojan horses dropped from web sites, and virus-infected files downloaded from peer-to-peer connections. Malware will also seek to exploit existing vulnerabilities on systems making their entry quiet and easy (Malware). Malware is able to accomplish this by its works to remain unnoticed, either by actively hiding or by simply not making its presence on a system known to the user. The type of malware that could be used is a Rootkit Malware. A rootkit is a type of software designed to hide the fact that an operating system has been compromised, sometimes by replacing vital executable.…

    • 1149 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Information Management Introduction Over the year, I have completed 5 DT internal assessments. These included AS 1.41, AS 1.43, AS 1.45, AS 1.46, and AS 1.50. In completing these assessments, I have became more familiar with the applications that were used to complete these internal assessments, and has given me a better understanding for file structure. Assessments Completed AS 1.43 - First assignment: Website.…

    • 1963 Words
    • 8 Pages
    Improved Essays
  • Improved Essays

    In the year 2008, the Comprehensive National Cybersecurity Initiative (CNCI) was formed and it was to ensure the US is able to defend itself from immediate threats should they occur and to be able to educate the government. The Building Blocks of a Computer Network The description of a building block of a network will be explained by the description of one from a shore command in the Navy. First one would need a computer…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    These are traps set in the firewall of the system which help in recording the attacks of intruders on the system. Honeypots are used to research on the complex information of cyber attacking…

    • 1226 Words
    • 5 Pages
    Great Essays
  • Superior Essays

    Another type of security event or baseline anomalie could be the increased network traffic which could indicate an unauthorized server, software, or potential malware. Shareware installed on a client device is a perfect example where network traffic could increase when downloading electric content onto a corporate network that could potentially be infected with malware. Shareware also opens up the device to sharing its data to the outside world potentially leaking propriatry and confidential data. Monitoring network bandwidth, closing firewall ports, and removing local administrator rights are a few ways to remediate shareware activity. Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    It updates daily and informs the main user of who is on this site, who is watching this video, or who is online shopping. Spyware has become a parent’s new best friend because it helps them protect their child…

    • 166 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Programmers would sit in autos or vans in the parking garages of huge box stores with portable PCs and high-control radio receiving wires and search for retailer's available remote web signals. When they locate a powerless system, they introduced sniffer programs that caught credit and platinum card numbers, as they traveled through a retailer's handling computer (Verini, 2010). Breaches with Wardriving…

    • 910 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    Michael Thank You for responding to my discussion board post. The Ukrainian power grid attack is an excellent example of both the ability of foreign governments to take down critical infrastructure to make political statements. In response to your questions if a person came across a PLC on a network it would be helpful if they had some knowledge PLC if they plan on taking it offline; however, it is possible that they could cause some damage just by poking and prodding the devices. Poking and prodding of the different components may not cause a safety override immediately, but once strange activity is noticed it would definitely be investigated and resolved. For example if a person connected to a power company’s SCADA network and started doing…

    • 325 Words
    • 2 Pages
    Decent Essays