Case Study: Moving Target Security

Great Essays
Moving Target Defense
The current cybersecurity environment is based around a static defense that has been employed for the past few years to protect information systems (See Figure 6). Unfortunately, this cybersecurity paradigm is not effective against current and future cyber threats. According to Zheng (2014), the weakness of this cybersecurity approach is its passive and reactive nature towards safeguarding information systems. Additionally, this method also allows threat actors the time they require to conduct their reconnaissance and exploit any vulnerabilities that are discovered.
Moving Target Defense is a cyber security approach that is being developed to replace the current static defense with a dynamic defense (See Figure 7). This emerging cybersecurity approach increases the difficulty that threat actors face when attempting to breach an information system by fluctuating the “attack surface” and employing resilient hardware (DHS, 2016). Additionally, by employing this approach, the organization is hardening the security of its information systems to a point where it has become too expensive and complex. This should motivate threat actors to skip the organization employing the Moving Target Defense approach and seek out easier targets.
There are several ways that an organization can employ Moving Target Defense to safeguard
…show more content…
Additionally, organizations with limited personnel can monitor its networks in multiple locations from a central hub. Utilizing remote agents is not entirely new; currently, system administrators utilize remote services to conduct updates and corrective maintenance. However, today’s emerging remote monitoring agents allow cybersecurity professionals to continuously monitor their organizations information and information systems and conduct certain digital forensics functions remotely (UMUC,

Related Documents

  • Improved Essays

    Cyber Ark Case

    • 725 Words
    • 3 Pages

    The critical requirement of the industry is to protect the data inside of your customer’s computer networks. With an every growing list of companies in the industry and an every present awareness of the risks as told by the news media the need is very apparent. Customers in the cyber security industry range from Colleges to medical facilities, financial companies to banks, major companies from retail to manufactures, including governments and the military. The threat is other companies looking for Intellectual property to other countries hoping to steal technology or intelligence vital to a nation’s security. Research and development are vital components of any company in the Cyber Security business.…

    • 725 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Target Attacker Timeline Date 1: 10/8/2013. (Estimated date) Reconnaissance and scanning: Attackers acquired Fazio Mechanical Firm’s user code and password through a phishing email containing a Trojan called Citadel, a password sniffing bot program. The phished credentials provided access to Target’s payment system network. Extensive reconnaissance and scanning would have been needed in order to identify Fazio Mechanical as a Target vendor, and acquire the emails of employees that possessed the login credentials necessary to access Target’s systems. Date 2: November 11th 2013 (Around 34 days after date 1) Exploitation: Attackers first breach Target’s system.…

    • 591 Words
    • 3 Pages
    Great Essays
  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Target received red flags right before the actual attack. Due to common cyber crimes target was already aware of the threats that happen so they installed $1.6 million malware detection tool Fireeye. They also had a team of security specialists in Bangalore and Minneapolis who monitor its computers around the clock. Fire eye did its job and notified them on multiple occasions about the incident that’s going to happen; unfortunately security team appears to have made wrong call. "…

    • 332 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Cybersecurity is a rapidly changing field and is growing with intensity. Not a day goes by without hearing something in the news about cybersecurity. The United States government faces a dilemma. Their foes are getting stronger and more advance in their cyber attacks. While the United States is lagging behind in all aspects of cybersecurity.…

    • 580 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Well before the breach on Target, the company had already been receiving alerts. Evidently, the company’s million-dollar investment of FireEye’s did what it was supposed to do by alerting Target on numerous occasions (Riley, M., Elgin, B., Lawrence, D.). The worst part about this attack was that it was done by “script kiddies”, which is a person who basically uses other people’s scripts and codes to hack into computers. Overall Target had what they needed as far as security tools to keep this from happening, but an employee didn’t do what was necessary. It could very well be that the staff was not properly trained on roles and responsibility; this in turn led to the passivity of the alerts that were sent.…

    • 216 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Answer. Yes, Target story does indeed follow the general “ATP kill chain” attack model as clearly elaborated upon in the case study. Attackers started by performing“Reconnaissance”over one of Target’s external heating and ventilation providers, Fazio Mechanical Servicesprobably after prior deep investigation to detectan easy loophole to infiltrate Target’s network for its malicious objectives. Also,Fazio relied onfree version of a security software called, “Malwarebytes Anti-Malware”, whose license explicitly prohibited corporate use; which is a fineexample of Overreliance on knowledge versus intelligence.…

    • 892 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    One of the problems that remains an issue for fusion centers is although they are good at dispersing information between all levels of law enforcement, there remains a disconnect between the private sector and the fusion centers. In a recent survey conducted with seventy of the seventy-seven fusion centers around the country, 2.1 percent of them admitted that they received daily information from the private sector (Erickson, 2012). Without the private sectors input of information there remains a disconnect of information and this should be addressed as soon as possible. Another problem that persists is the difficulty that fusion centers have when it comes to their ability to “analyze cyber security relevant information (Erickson, 2012).” This could easily be fixed by employing more knowledgeable personnel.…

    • 665 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Zero Day Economy Essay

    • 620 Words
    • 3 Pages

    An Overview of the Zero Day Economy: Classification, Longevity, and Costs of Zero Day Exploits Offensive cyber security hinges on exploiting vulnerabilities in order to create effects on adversaries’ cyber systems. A commonly shared belief in the field is that an attacker has more of an advantage if the effect uses an unknown vulnerability, also known as a zero day. Given this shared belief, the discovery of zero days, the process of turning them into reliable effects, and their eventual sale and use to either nation-state actors or criminal organizations is the foundation of offensive cyber security operations. Despite this importance, the world surrounding zero days, primarily their development and their sale, has not garnered much formal research.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Decent Essays

    As more business activities are being automated and an increasing number of computers are being used to store sensitive information, the need for secure computer systems becomes more apparent. This need is even more apparent as systems and applications are being distributed and accessed via an insecure network, such as the Internet. The Internet itself has become critical for governments, companies, financial institutions, and millions of everyday users. Networks of computers support a multitude of activities whose loss would all but cripple these organizations. As a consequence, cybersecurity issues have become national security issues.…

    • 188 Words
    • 1 Pages
    Decent Essays
  • Superior Essays

    1. Why do you think that countries like China and other poor or developing nations are havens for intellectual property theft and film/video pirating? In China and other poor nations IP laws are either non-existent or not enforced. For instance, Chinese government has no interest in enforcing these laws, since Chinese businesses hold few copyrights (and those are rigorously protected).…

    • 1288 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Today we see that many businesses rely on technologies and these technologies can be infiltrated and therefore causing significant harm. A cyber threat in a chemical facility could shutdown operations which would have a cascading effect on other critical infrastructures that rely on products produced by the affected chemical facilities. The cyber technologies that are in a chemical facility face many risks related to ones imposed by a person looking to do harm, a failure with the given technology, mistakes by human error, or other vulnerabilities related to product delivery (Homeland Security, 2015). Also some of the systems within the chemical sector receive updates through internet based systems which make them more vulnerable to cyber attacks (Homeland Security, 2015). Cyber threats need to be assessed within the chemical sector as well as other critical infrastructures to ensure measures are in place to counter…

    • 2266 Words
    • 10 Pages
    Superior Essays
  • Great Essays

    At the user level cyber-attacks begin according to Eddolls (2016) Therefore, it stands to reason why cyber security awareness is the front line defense in any security infrastructure. What the literature review here does is demonstrates that while security infrastructures exist, it is that there are serious problems that only heightened awareness mitigates. Qualitative case studies on the topic of cyber security highlight the need for further research in the area of cyber security awareness as attacks occur more frequently in our world. Case studies reviewed demonstrate how widespread the problem is, and the impact cyber attacks bring to businesses across the globe.…

    • 2302 Words
    • 10 Pages
    Great Essays