hey same task as last week please use writer 62922 for the task as they've done it twice
also will send the two posts for question 4 soon please put their names on top of it please check in the next two days
After reading through the weekly readings and performing your own research, answer the following questions on Cyber Hygiene & Security Posture.
- What do you believe are the biggest 3 Cyber Hygiene issues to individuals?
- What do you believe are the biggest 3 Security Posture threats to businesses?
- Find a case where poor security posture has been a major issue in a business and explain how it could have been fixed.
- Reply to 2 other posts stating whether you agree or not and why
3.1-CyberHygiene Cyber Hygiene ED MOORE Lecture Outline Faculty of Arts | Department of Security Studies and Criminology 2 1. What is Cyber Hygiene? 2. Best practices 3. QUIZ Cyber Hygiene INDIVIDUALLY 3 Cyber Security Hygiene WHAT IS IT? “Cyber hygiene is a reference to the practices and steps that users of computers and other devices take to maintain system health and improve online security.” Cyber Security Hygiene TARGETS The sheer volume of accounts available for hacking is jaw dropping: • 6 billion email accounts • 2 billion smartphones • 1 billion Apple users • 1 billion Gmail accounts • 1.8 billion Facebook accounts • … and 300 million Twitter accounts who tweet 7,350 times per second, send 2.5 million emails per second, and transfer 1.5 billion GB (1.5 EB) of data per day through the internet. • 30,000 websites are hacked every day • Many hacks can occur and complete in less than 5 seconds Cyber Security Hygiene • Loss of data ― Data not being backed up • Security Breach ― Poor passwords lead to stolen accounts ― Phishing leads to stolen accounts ― Installed malware leads to stolen accounts • Productivity ― Cyber attacks often render you unable to work ― Identity theft can take weeks or months (or longer) to be completely resolved • Financial ― Security Breaches and attacks cost businesses a great deal of money (through stock/fines/productivity) ― More than 70% of businesses involved in a major incident fail within 3 years EFFECTS OF POOR CYBER HYGIENE Cyber Security Hygiene • Don’t open emails from people you don’t know • Don’t open email attachments if you don’t know the emailer ― PDF, ZIP, executable & office files are particularly dangerous • Don’t provide personal information to anyone you don’t know • An email header is a hidden piece of meta data that shows addition information about an email and it’s origin ― If you suspect an email to be spam/phishing, check the headers • Watch out for: ― Poor spelling ― Requests for personal information/passwords ― Emails sent from public email domains (gmail, yahoo, outlook, etc) ― Email creates a sense of urgency ― General salutations (“Valued Customer”) BEST PRACTICES - EMAILS Cyber Security Hygiene BEST PRACTICES - EMAILS Cyber Security Hygiene BEST PRACTICES - EMAILS Cyber Security Hygiene BEST PRACTICES - EMAILS Cyber Security Hygiene • Check your link for expected URLS ― Become familiar with what URLs common websites have ― Become familiar with URLs that are suspicious § Misspelt common websites • Be careful of URL Shorteners • Remember that links can say one thing and be linked to another BEST PRACTICES - GENERAL Cyber Security Hygiene • Limit information available on social media ― Oversharing information on social media allows attackers to use your information to steal your identity and access accounts ― Remember, social media thrives on your information! • Use strong passwords ― Longer is better than “complex” ― Unique is best ― Password managers manage this • Don’t use public wifi networks ― Public wifi networks are often unencrypted ― Unencrypted network traffic can be intercepted & modified ― Use cellular data when security is important BEST PRACTICES - GENERAL Cyber Security Hygiene • 2FA is a very good protection against stolen accounts ― A knowledge factor (Something you know) ― A possession factor (Something you have) ― An inherence factor (Something you are?) • Password Managers ― Password reuse can lead to cascading account failures! BEST PRACTICES - GENERAL Cyber Security Hygiene https://phishingquiz.withgoogle.com/ https://haveibeenpwned.com GIVE IT A TRY https://phishingquiz.withgoogle.com/ https://haveibeenpwned.com/ The end 15 Resource List • https://www.buildingbetterhealthcare.co.uk/news/article_page/Health_chiefs_refuse_to_foot_1bn_bill_t o_improve_NHS_cyber_security/147855/cn164706 • https://www.hsj.co.uk/technology-and-innovation/cyber-attack-cost-nhs-92m--dhsc/7023560.article • https://www.techradar.com/au/news/atm-security-still-running-windows-xp • https://searchsecurity.techtarget.com/definition/two-factor-authentication https://www.buildingbetterhealthcare.co.uk/news/article_page/Health_chiefs_refuse_to_foot_1bn_bill_to_improve_NHS_cyber_security/147855/cn164706 https://www.hsj.co.uk/technology-and-innovation/cyber-attack-cost-nhs-92m--dhsc/7023560.article https://www.techradar.com/au/news/atm-security-still-running-windows-xp https://searchsecurity.techtarget.com/definition/two-factor-authentication 3.2-SecurityPosture Security Posture ED MOORE Lecture Outline Faculty of Arts | Department of Security Studies and Criminology 2 1. What is Security Posture? 2. Cybersecurity Maturity 3. Best practices 4. Case studies Cyber Security Posture WHAT IS IT? • “The security status of an enterprise’s networks, information, and systems based on information security resources (e.g., people, hardware, software, policies) and capabilities in place to manage the defence of the enterprise and to react as the situation changes.” – NIST • What does this mean? ― It is an assessment of how healthy a body is with regards to cyber security. ― This assessment can be used to influence spending, budgets and projects for a company Cyber Security Posture WHAT IS IT? • Organisations with a low cybersecurity maturity level will typically be more vulnerable to attacks. They will be at higher risk of attack and should spend a larger amount of money to improve. • Organisations with a medium cybersecurity maturity level will typically be less vulnerable to attacks, having performed basic risk assessments and protections against attacks. The company may withstand some basic attacks against it but a more sophisticated attack may be devastating. • Organisations with a high cybersecurity maturity level will have performed thorough risk assessments and will usually have the smallest amount of risks. Organisations at this level are often large and any successful attacks against them will be extremely complex Cyber Security Posture CYBER SECURITY POSTURE ASSESSMENT Everyone has different processes for a posture assessment but they can be summarised to 1. Identification 2. Assessment 3. Improvements 4. Repeat Cyber Security Posture CYBER SECURITY POSTURE ASSESSMENT Identification • What are the organisation’s most important activities and assets – the “crown jewels”? • Where are they stored? • Who can access them? • How are they accessed? This may include: • IT Assets • Business Processes • Data Cyber Security Posture CYBER SECURITY POSTURE ASSESSMENT Assessment • What could happen to it? ― If it’s a process this may include disruption of that process ― If it’s an asset this may include damage/theft of the asset ― If it’s data then this may include unauthorised access, theft or destruction • How could this happen? ― Is it something that could happen remotely or would it have to be done physically? • Who could do it? Cyber Security Posture CYBER SECURITY POSTURE ASSESSMENT Improvement • What could we do to reduce the likelihood and consequence of the risk occurring? • How can we make it harder for the risk to occur? • How can we limit what would happen if it were to happen? • How can we recover from it if it does happen? This may include: • Establishing an incident response plan • Implementing mitigations • Training employees We’ll discuss this in more detail in later weeks Cyber Security Posture CYBER SECURITY POSTURE ASSESSMENT Repeat • How can you keep momentum for Cyber Hygiene? ― Cyber Hygiene is easily forgotten and lapses back to insecurity • Review the current mitigations put in place and re-assess them ― If they are ineffective or insufficient they should be replaced Cyber Security Posture STRONG CYBER SECURITY PRACTICES • Conducting comprehensive risk assessments at least once a year • Enforcing use of strong passwords • Enforcing software updates regularly • Document any new installed software • Limit users who need admin-level access • Backup data • Block users from installing new software • Block users from disabling security software • Conduct risk assessments (yearly) Cyber Security Posture POOR CYBER SECURITY PRACTICES • Single location backups (or none at all!) • Out of date software • Undocumented system access • Use of unsupported OS’s ― Each OS has an end of life date, after this date, security patches are no longer released and exploits will not be fixed leaving all computers running the OS vulnerable to them ― Windows XP security support ended in June 2014 ― Windows 7 ended in January 2020 Cyber Security Posture CASE STUDY: ATMS • Many ATM currently run Windows XP (ended support in 2014) ― Researchers tested 26 ATM machines and found: § 15 of the ATMs were running Windows XP § 22 were vulnerable to a network attack § 18 were vulnerable to ‘black box’ attacks § 20 could be forced out of kiosk mode with a USB devices § 24 had no data encryption in place Cyber Security Posture CASE STUDY: NHS & WANNACRY • WannaCry was a piece of encrypting ransomware that spread around the world in 2017 • It was malware based on an exploit in the Windows OS called EternalBlue • WannaCry swept around the world, quickly taking over hundreds of thousands of computers • The UK National Health Service (NHS) was hit particularly hard with many of their critical devices and servers going offline • Over 1,200 pieces of diagnostic equipment were effected by WannaCry • The total cost of the attack to the NHS is estimated to be £92m (AUD$165) • Why were some computers effected and not others? Why was the NHS effected more than others? ― EternalBlue was discovered before it was used in the WannaCry attack ― Microsoft had released a fix for this exploit in the form of a Windows Update ― The NHS did not keep up to date with their OS updates which allowed their devices to fall victim to the attack ― The NHS has since refused to fork out the estimated £1b to meet the Cyber Essentials Plus standard The end 14 Resource List • https://www.buildingbetterhealthcare.co.uk/news/article_page/Health_chiefs_refuse_to_foot_1bn_bill_t o_improve_NHS_cyber_security/147855/cn164706 • https://www.hsj.co.uk/technology-and-innovation/cyber-attack-cost-nhs-92m--dhsc/7023560.article • https://www.techradar.com/au/news/atm-security-still-running-windows-xp • https://www.hitachi-systems-security.com/blog/what-is-a-cybersecurity-posture-assessment/ • https://cdn2.hubspot.net/hubfs/466473/Cybersecurity%20Posture%20Assessment%20Brochure_Hitac hi%20Systems%20Security.pdf • https://searchsecurity.techtarget.com/definition/two-factor-authentication https://www.buildingbetterhealthcare.co.uk/news/article_page/Health_chiefs_refuse_to_foot_1bn_bill_to_improve_NHS_cyber_security/147855/cn164706 https://www.hsj.co.uk/technology-and-innovation/cyber-attack-cost-nhs-92m--dhsc/7023560.article https://www.techradar.com/au/news/atm-security-still-running-windows-xp https://www.hitachi-systems-security.com/blog/what-is-a-cybersecurity-posture-assessment/ https://cdn2.hubspot.net/hubfs/466473/Cybersecurity%20Posture%20Assessment%20Brochure_Hitachi%20Systems%20Security.pdf https://searchsecurity.techtarget.com/definition/two-factor-authentication supplement.5.2 Measuring the Human Factor of Cyber Security Brian M. Bowen, Ramaswamy Devarajan, Salvatore Stolfo Department of Computer Science Columbia University {bb2281, rd2446, sjs11}cs.columbia.edu Abstract—This paper investigates new methods to measure, quantify and evaluate the security posture of human organi- zations especially within large corporations and government agencies. Computer security is not just about technology and systems. It is also about the people that use those systems and how their vulnerable behaviors can lead to exploitation. We focus on measuring enterprise-level susceptibility to phishing attacks. Results of experiments conducted at Columbia University and the system used to conduct the experiments are presented that show how the system can also be effective for training users. We include a description of follow-on work that has been proposed to DHS that aims to measure and improve the security posture of government departments and agencies, as well as for comparing security postures of individual agencies against one another. I. INTRODUCTION Lord Kelvin taught us that without numbers there is no sci- ence. Indeed, quantification lies at the very heart of scientific progress. Without measurement, one cannot know what has been learned or achieved and whether our knowledge has been advanced or progress has been made. The field of computer and information security requires the foundational science that provides the means for assessing the strength of organizational security postures. For the Department of Homeland Security needs, solid metrics may be applied as a means of assessing the strength of one organization relative to others, and to help identify vulnerabilities. There are a few notable successes in the field of computer security where metrics have been well established and prof- itably applied to practical technologies with mathematically provable security properties. Cryptography