Prepare a policy to combat advanced persistent threats

Assignment Help Business Law and Ethics
Reference no: EM13971153

Project: Prepare a Policy to Combat Advanced Persistent Threats

Introduction

Advanced Persistent Threats (APT) have become an area of great concern for businesses and government organizations. APTs are used by attackers to gain entry into an organization's networks and then remain inside by avoiding detection for extended periods of time during which information is harvested and exfiltrated. (See the infographic at https://www.symantec.com/theme.jsp?themeid=apt-infographic-1 )The threat agents for APTs are frequently software-based (malware) agents which can hide on servers and workstations for years before being activated. Since these agents are inside the defensive perimeter for the enterprise, they can be categorized as a type of insider threat. Many of the strategies to combat insider threats can also be used to detect and respond to APTs (see Nigel Wilson's blog at https://nigesecurityguy.wordpress.com/2014/03/17/apt-strategy-guide/)

Table 5-1. Best Practices for Combating Advanced Persistent Threats (adapted from https://nigesecurityguy.wordpress.com/2013/11/08/apt-strategy-series/)

• Maintain a list of application systems at risk
• Create an APT checklist for assets at risk
• Focus on APT detection techniques and analysis tools
• Focus on incident response for APTs
• Create ready to use APT rapid response tactics
• Prepare an APT forensic response plan
• Increase use of external threat intelligence
• Focus on APTs in security awareness training

In earlier projects for this course, you developed IT security policies for a specific organization. You may use applicable information from those projects when preparing the deliverable (APT policy) for this assignment.

If you wish to change to a different organization for project #5, you must first obtain your instructor's permission.

YourAPT security policy will be used to implement best practicesfor combating APT threats against the information, information systems, and information infrastructure (e.g. networks, communications technologies, etc.) which are housed within the data center. These best practices should include both administrative actions and implementation of technology-based defensive measures (e.g. real-time monitoring, host-based intrusion detection / prevention, etc.).

Your policy is being written by you as the facility manager. In this role, you are also the information system owner (ISO) for all IT systems and networks within the data center. The information systems hosted in the data center are shown in Figure 5-1.

The primary audience for your policy is the Tier 1 staff responsible for day-to-day operations and maintenance in the data center. Your policy will be communicated to other personnel and to the senior managers who are ultimately responsible for the security of the organization and its IT assets. These managers include: CEO, CIO/CISO, and CSO.

Research:

1. Research the subject of APTs as threats to the security of the information, information systems, and information infrastructure within the data center.Here are three URLs to start with:

a. https://nigesecurityguy.wordpress.com/2013/11/08/apt-strategy-series/
b. https://nigesecurityguy.wordpress.com/2014/03/17/apt-strategy-guide/
c. https://nigesecurityguy.wordpress.com/category/governance/

Note: some APT reports can only be accessed after registration (provide contact information). You are not required to use these reports but, some of the better examples are:

a. https://www.secureworks.com/resources/articles/featured_articles/20120719-hcr/
b. https://www.isaca.org/Knowledge-Center/Research/ResearchDeliverables/Pages/Advanced-Persistent-Threats-Awareness-Study-Results.aspx
c. https://securityintelligence.com/media/2014-ponemon-study-economic-impact-advanced-persistent-threats-apts/

2. Use the list presented in Table 5-1 and the IT architecture shown in Figure 5-2 to identify the types of information, information systems and information infrastructures (networks) which may be targeted byAPTs. Create a list of ten to fifteen specific areas of weakness or vulnerability ("risks") which could be exploited by an APT to gain access to or harvest information from the IT resources shown in this diagram. Include software applications in your informationsystems category.

3. Assess / evaluate the potential harm that could occur if the identified weaknesses or vulnerabilities are exploited by an APT. Use this information to prioritize your list of risks. Document the risks, potential impacts, and response priorities in a risk register(See Table 5-2). You will include this risk register in your policy deliverable for this assignment.

4. Identify at least 10 control measures or mitigations which could be used to address the identified risks. Use Table 5-1 and NIST 800-53 as your starting points.

5. Identify 5 or more technologies which can be deployed to implement detection, prevention, and eradication of APTs. 

Table 5-2. Risk Register

Risk Identifier

Description of the Risk
(identify affected assets)

Response Priority
(Most important = 1)

Sequence # or Brief title (<50 characters)

Split complex risk statements into multiple individual risks.

 

 

 

 

 

 

 

 

 

Figure 5-3. Data Center IT Architecture Diagram

547_IT Architectutre.png

Write:

1. Use the outline below to prepare your APT security policy for the data center.You must include 10 to 15 specific policy statements which address the prevention, detection, and eradication of Advanced Persistent Threats. You must also include your risk assessment and risk register (prepared earlier) containing 10 to 15 specific risks. Your mitigation strategies must include at least 5 technology-based countermeasures (technical controls) (including identification of 5 or more specific technologies).

I. Identification
a. Organization: [name]
b. Title of Policy:
c. Author: [your name]
d. Owner: [role, e.g. Data Center Manager]
e. Subject:
f. Review Date: [date submitted for grading]
g. Signatures Page: [authorized signers for the policy: CEO, CISO, Data Center Manager]
h. Distribution List
i. Revision History

II. Purpose
a. Provide a high level summary statement as to the policy requirements which are set forth in this document.

III. Scope
a. Summarize the information, information systems, and networks to be protected.
b. Identify who is required to comply with this policy. See the project description for categories of personnel and other individuals.

IV. Compliance
a. Identify the measures which will be taken to ensure compliance with this policy (e.g. audits, compliance reporting, exception reporting, etc.)
b. Identify the sanctions which will be implemented for compliance failures or other violations of this policy.
c. Include information about how to obtain guidance in understanding or interpreting this policy (e.g. HR, corporate legal counsel, etc.)

V. Terms and Definitions

VI. Risk Identification and Assessment
a. Using your risk register, present the findings of your risk assessment.
b. Using Table 5-1 and NIST 800-53 as starting points, identify control measures and protective solutions (technologies) which will be implemented to mitigate or otherwise address each risk or risk area (you may add a column to your risk register table or present in paragraph format).

VII. Policy
a. For each control measure, write a policy statement ("Shall" wording) which addresses the implementation of that control.
b. Include an explanatory paragraph for each policy statement.

2. Prepare a Table of Contents and Cover Page for your policy. Your cover page should include your name, the name of the assignment, and the date. Your Table of Contents must include at least the first level headings from the outline (I, II, III, etc.).

3. Prepare a Reference list (if you are using APA format citations & references) or a Bibliography and place that at the end of your file. (See Item #3 under Formatting.) Double check your document to make sure that you have cited sources appropriately.

Reference no: EM13971153

Questions Cloud

Explain the relationship between morality and ethics : In readings and class discussions we have talked about the relationship and distinctions between morality and ethics. Morality deals with basic principles of right and wrong or good and bad. Ethics deals with behavior and actions.
Planning process for a firm : You are involved in the planning process for a firm that is expected to have a large increase in sales for the next year. Which type of firm would benefit the most from that sales increase:
Determine a cost formula for utilities cost : Determine a cost formula for utilities cost using the least-squares regression method. Calculate the R2 as part of your analysis.
Mcrs system basis over the project : Foley Systems is considering a new investment whose data are shown below.  The equipment would be depreciated using the MCRS system basis over the project's 4-year life, would have a zero salvage value, and would require some additional working ca..
Prepare a policy to combat advanced persistent threats : Project: Prepare a Policy to Combat Advanced Persistent Threats, Advanced Persistent Threats (APT) have become an area of great concern for businesses and government organizations
What is the market value of the firm prior to the recap : What is the market value of the firm prior to the recap? What is the market value of equity?
Why is the web so important to business communications today : Why is the web so important to business (technical) communications today? What are some of the ways that the web is used for technical communications?
Find the final potential difference between a and b : Find the total energy stored in the capacitors before and after the switches are dosed. direction of the electric field, E, and the direction of the positive x axis at the point P, which has coordinates (in meters) (1, 0, 1).
What is NOPAT-What was average or effective tax rate : What is “NOPAT?” For the remaining questions in this assignment, base your answers on the following information for Joe’s Fly-By-Night Oil Company, whose latest income statement and balance sheet are shown below. Stock price on Dec 31, 2014…$60.00 Nu..

Reviews

Write a Review

Business Law and Ethics Questions & Answers

  Summarize the case and the verdict

Summarize the case and the verdict. Based on your review, do you agree with the court's decision? Defend/discuss your answer

  Explain valid contracts

Explain Valid Contracts and Describe what elements would to need to be present in order to have a valid contract

  Elements that establish a traffic stop as legally

In a 2 to 3 page APA formatted paper discuss the key elements that establish a traffic stop as legally defensible and professional. Additonally, research, cite, and discuss case law that established the legality of individual traffic stops and tra..

  Should firms invest money in sustainability efforts

Cite a legal or ethical guideline that has been enacted to protect the environment and the circumstances under which or reasons why it was written. Should firms invest money in sustainability efforts? Why or why not? Who are the stakeholders affected..

  Research a real-life incidence of your chosen tort for

due week 6 and 240 points write a 4-5 page paper in which youdefine one of the types of torts.describe the elements

  Describe the leadership characteristics and responsibilities

Analyze how the organizational, management, administration, and operational functions at these three organizational levels are similar or different and why. Be sure to identify the leadership characteristics and responsibilities pertaining to each..

  Additionally appraise the impact of court consolidation and

write a 350-700-word executive summary in which you articulate court purposes and responsibilities and the importance

  The final report on unconventional gas in europe write a

briefly in two to three paragraphs answer the following what is pennsylvania act 13?compare these with the new york

  How does the prison environment influence the way

How does the prison environment influence the way you manage a case? What is case management assessment and case management goal setting? Is there a relationship between the two

  What impact does jurisdiction have in computer-crime cases

The advent of the Internet has created several new categories of crime. In your opinion, what Internet crime(s) could be considered the most important crime for law enforcement to investigate? Explain your answer. What impact does jurisdiction hav..

  Briefly describe the entrepreneurial crime you researched

Briefly describe the entrepreneurial crime you researched. Discuss how the psychological characteristics of individuals and accounting opportunities for omission(s) may have contributed to the commission of the entrepreneurial crime you researched

  Identify and explain the positions of 3 specific

during the 1970s as result of the attica prison riots and other social forces such as the civil rights movement changes

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd