Prepare a policy to combat advanced persistent threats

Assignment Help Business Law and Ethics
Reference no: EM13971153

Project: Prepare a Policy to Combat Advanced Persistent Threats

Introduction

Advanced Persistent Threats (APT) have become an area of great concern for businesses and government organizations. APTs are used by attackers to gain entry into an organization's networks and then remain inside by avoiding detection for extended periods of time during which information is harvested and exfiltrated. (See the infographic at https://www.symantec.com/theme.jsp?themeid=apt-infographic-1 )The threat agents for APTs are frequently software-based (malware) agents which can hide on servers and workstations for years before being activated. Since these agents are inside the defensive perimeter for the enterprise, they can be categorized as a type of insider threat. Many of the strategies to combat insider threats can also be used to detect and respond to APTs (see Nigel Wilson's blog at https://nigesecurityguy.wordpress.com/2014/03/17/apt-strategy-guide/)

Table 5-1. Best Practices for Combating Advanced Persistent Threats (adapted from https://nigesecurityguy.wordpress.com/2013/11/08/apt-strategy-series/)

• Maintain a list of application systems at risk
• Create an APT checklist for assets at risk
• Focus on APT detection techniques and analysis tools
• Focus on incident response for APTs
• Create ready to use APT rapid response tactics
• Prepare an APT forensic response plan
• Increase use of external threat intelligence
• Focus on APTs in security awareness training

In earlier projects for this course, you developed IT security policies for a specific organization. You may use applicable information from those projects when preparing the deliverable (APT policy) for this assignment.

If you wish to change to a different organization for project #5, you must first obtain your instructor's permission.

YourAPT security policy will be used to implement best practicesfor combating APT threats against the information, information systems, and information infrastructure (e.g. networks, communications technologies, etc.) which are housed within the data center. These best practices should include both administrative actions and implementation of technology-based defensive measures (e.g. real-time monitoring, host-based intrusion detection / prevention, etc.).

Your policy is being written by you as the facility manager. In this role, you are also the information system owner (ISO) for all IT systems and networks within the data center. The information systems hosted in the data center are shown in Figure 5-1.

The primary audience for your policy is the Tier 1 staff responsible for day-to-day operations and maintenance in the data center. Your policy will be communicated to other personnel and to the senior managers who are ultimately responsible for the security of the organization and its IT assets. These managers include: CEO, CIO/CISO, and CSO.

Research:

1. Research the subject of APTs as threats to the security of the information, information systems, and information infrastructure within the data center.Here are three URLs to start with:

a. https://nigesecurityguy.wordpress.com/2013/11/08/apt-strategy-series/
b. https://nigesecurityguy.wordpress.com/2014/03/17/apt-strategy-guide/
c. https://nigesecurityguy.wordpress.com/category/governance/

Note: some APT reports can only be accessed after registration (provide contact information). You are not required to use these reports but, some of the better examples are:

a. https://www.secureworks.com/resources/articles/featured_articles/20120719-hcr/
b. https://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Advanced-Persistent-Threats-Awareness-Study-Results.aspx
c. https://securityintelligence.com/media/2014-ponemon-study-economic-impact-advanced-persistent-threats-apts/

2. Use the list presented in Table 5-1 and the IT architecture shown in Figure 5-2 to identify the types of information, information systems and information infrastructures (networks) which may be targeted byAPTs. Create a list of ten to fifteen specific areas of weakness or vulnerability ("risks") which could be exploited by an APT to gain access to or harvest information from the IT resources shown in this diagram. Include software applications in your informationsystems category.

3. Assess / evaluate the potential harm that could occur if the identified weaknesses or vulnerabilities are exploited by an APT. Use this information to prioritize your list of risks. Document the risks, potential impacts, and response priorities in a risk register(See Table 5-2). You will include this risk register in your policy deliverable for this assignment.

4. Identify at least 10 control measures or mitigations which could be used to address the identified risks. Use Table 5-1 and NIST 800-53 as your starting points.

5. Identify 5 or more technologies which can be deployed to implement detection, prevention, and eradication of APTs. 

Table 5-2. Risk Register

Risk Identifier

Description of the Risk
(identify affected assets)

Response Priority
(Most important = 1)

Sequence # or Brief title (<50 characters)

Split complex risk statements into multiple individual risks.

 

 

 

 

 

 

 

 

 

Figure 5-3. Data Center IT Architecture Diagram

547_IT Architectutre.png

Write:

1. Use the outline below to prepare your APT security policy for the data center.You must include 10 to 15 specific policy statements which address the prevention, detection, and eradication of Advanced Persistent Threats. You must also include your risk assessment and risk register (prepared earlier) containing 10 to 15 specific risks. Your mitigation strategies must include at least 5 technology-based countermeasures (technical controls) (including identification of 5 or more specific technologies).

I. Identification
a. Organization: [name]
b. Title of Policy:
c. Author: [your name]
d. Owner: [role, e.g. Data Center Manager]
e. Subject:
f. Review Date: [date submitted for grading]
g. Signatures Page: [authorized signers for the policy: CEO, CISO, Data Center Manager]
h. Distribution List
i. Revision History

II. Purpose
a. Provide a high level summary statement as to the policy requirements which are set forth in this document.

III. Scope
a. Summarize the information, information systems, and networks to be protected.
b. Identify who is required to comply with this policy. See the project description for categories of personnel and other individuals.

IV. Compliance
a. Identify the measures which will be taken to ensure compliance with this policy (e.g. audits, compliance reporting, exception reporting, etc.)
b. Identify the sanctions which will be implemented for compliance failures or other violations of this policy.
c. Include information about how to obtain guidance in understanding or interpreting this policy (e.g. HR, corporate legal counsel, etc.)

V. Terms and Definitions

VI. Risk Identification and Assessment
a. Using your risk register, present the findings of your risk assessment.
b. Using Table 5-1 and NIST 800-53 as starting points, identify control measures and protective solutions (technologies) which will be implemented to mitigate or otherwise address each risk or risk area (you may add a column to your risk register table or present in paragraph format).

VII. Policy
a. For each control measure, write a policy statement ("Shall" wording) which addresses the implementation of that control.
b. Include an explanatory paragraph for each policy statement.

2. Prepare a Table of Contents and Cover Page for your policy. Your cover page should include your name, the name of the assignment, and the date. Your Table of Contents must include at least the first level headings from the outline (I, II, III, etc.).

3. Prepare a Reference list (if you are using APA format citations & references) or a Bibliography and place that at the end of your file. (See Item #3 under Formatting.) Double check your document to make sure that you have cited sources appropriately.

Reference no: EM13971153

Questions Cloud

Explain the relationship between morality and ethics : In readings and class discussions we have talked about the relationship and distinctions between morality and ethics. Morality deals with basic principles of right and wrong or good and bad. Ethics deals with behavior and actions.
Planning process for a firm : You are involved in the planning process for a firm that is expected to have a large increase in sales for the next year. Which type of firm would benefit the most from that sales increase:
Determine a cost formula for utilities cost : Determine a cost formula for utilities cost using the least-squares regression method. Calculate the R2 as part of your analysis.
Mcrs system basis over the project : Foley Systems is considering a new investment whose data are shown below.  The equipment would be depreciated using the MCRS system basis over the project's 4-year life, would have a zero salvage value, and would require some additional working ca..
Prepare a policy to combat advanced persistent threats : Project: Prepare a Policy to Combat Advanced Persistent Threats, Advanced Persistent Threats (APT) have become an area of great concern for businesses and government organizations
What is the market value of the firm prior to the recap : What is the market value of the firm prior to the recap? What is the market value of equity?
Why is the web so important to business communications today : Why is the web so important to business (technical) communications today? What are some of the ways that the web is used for technical communications?
Find the final potential difference between a and b : Find the total energy stored in the capacitors before and after the switches are dosed. direction of the electric field, E, and the direction of the positive x axis at the point P, which has coordinates (in meters) (1, 0, 1).
What is NOPAT-What was average or effective tax rate : What is “NOPAT?” For the remaining questions in this assignment, base your answers on the following information for Joe’s Fly-By-Night Oil Company, whose latest income statement and balance sheet are shown below. Stock price on Dec 31, 2014…$60.00 Nu..

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  Discuss the list of four important issues

Discuss the list of four important issues that influence the response process. Needs to be a minimum of 1000 words

  What are the role types of officers identified by r johnson

Describe the role ambiguity that Cos faced in the 1970s and 1980s. What are the role types of officers identified by R. Johnson? Explain the two areas where probation and parole officers have discretion

  Should federal government be more involved in criminal law

The Controlled Substance Act, a federal law, doesn't permit marijuana sale and usage. Does legalizing marijuana in states mean that state law trumps federal law? If not, how do states pass these laws? Should federal government be more involved in ..

  Define what legal concerns are raised by these issues

Internet domain names are linked to trademark issues. Technology makes it easy to copy and distribute music and movies without paying royalties. Business conducted on the internet raise security and privacy issues. What legal concerns are raised..

  Some people actually state that oc is a good thing to have

answer the following two questions with a minimum of 500 words each. use an academic source for each - not our texts.

  The basic federal statute for prosecution

The Sherman Act of 1890 provided the basic Federal Statute for prosecution and ultimate dissolution of the Standard Oil Trust in 1911, which had functioned as a monopoly controlling 92% of the oil and natural gas business in the United States;..

  What does this case reveal about the conditions

What was the legal issue in this case? What did the Supreme Court decide? What does this case reveal about the conditions under which affirmative action is legal? What evidence did the county have of the need for affirmative action

  Obtain secrets from a large competitor in state z

Ecks Co. never appeared to appeal this decision to State Z's appellate courts. Subsequent efforts by Ecks Co. to set up a new branch in State Z were disallowed - Are there any objections to the ICJ's jurisdiction that State Z may be able to raise?

  In addition to your required evaluations you have a

you are the director of mental health halfway house which deals drug addicts with brain disorders that have found

  Explain the purpose of administrative law

Explain the purpose of administrative law. List and articulate the primary functions of an administrative agency

  Analyze the five elements of a contract

Describe and analyze the five elements of a contract that must exist for this agreement to be enforceable. Explain why this contract is governed by common law or the Uniform Commercial Code (UCC).

  Why is insider trading considered both illegal and unethical

Why is insider trading considered both illegal and unethical?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd