Cybersecurity ATD Scenario conclusion

Slides:



Advertisements
Similar presentations
2009 – E. Félix Security DSL Toward model-based security engineering: developing a security analysis DSML Véronique Normand, Edith Félix, Thales Research.
Advertisements

Software Modeling SWE5441 Lecture 3 Eng. Mohammed Timraz
SC2 meeting 24 November 2014 Security Measures and Resources Toolbox
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
MOBILE MALWARE TOPIC #5 – INFORMATION ASSURANCE AND SECURITY Michael Fine 1.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
SEC835 Database and Web application security Information Security Architecture.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malware and Spyware Attacking Cell Phones Chris Gooch, Jessica Russell, Destiny Logan.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Software Assurance Session 15 INFM 603. Bug hunting vs. vulnerability spotting Bugs are your code not behaving as you designed it. Many can be found by.
Whitacre College of Engineering Panel Interdisciplinary Cybersecurity Education Texas Tech University NSF-SFS Workshop on Educational Initiatives in Cybersecurity.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
7 Information Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
 Introduction to Computing  Computer Programming  Terrorisom.
Computer Concepts 2014 Chapter 10 Information Systems Analysis and Design.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
International Telecommunication Union Geneva, 9(pm)-10 February 2009 BEST PRACTICES FOR ORGANIZING NATIONAL CYBERSECURITY EFFORTS James Ennis US Department.
Enterprise Cybersecurity Strategy
The Architecture of Systems. System Architecture Every human-made and natural system is characterized by a structure and framework that supports and/or.
Adaptive Robotics Framework (1/2) Autonomous robot behaviour: –able to monitor environment –analyze the current deployment scenario –plan strategies to.
14.1 Silberschatz, Galvin and Gagne ©2009 Operating System Concepts with Java – 8 th Edition Protection.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Information Systems Design and Development Security Risks Computing Science.
Cyber Security – The Changing Landscape Erick Weber Department of Public Works Khaled Tawfik Cyber Security.
INFORMATION SECURITY MANAGEMENT L ECTURE 2: P LANNING FOR S ECURITY You got to be careful if you don’t know where you’re going, because you might not get.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
CompTIA Security+ Study Guide (SY0-401) Chapter 9: Malware, Vulnerabilities, and Threats.
Insecure PCs virus malware phishing spam spyware botnets DNS spoofing identity theft Trojan horse buffer overflow DoS attack worm keyloggers cross-site.
WP2: Security aware low power IoT Processor
Securing Information Systems
Botnets A collection of compromised machines
Executive Director and Endowed Chair
Security Testing Methods
Monitoring & Evaluation Processes A A walkthrough of the whole process
Secure Software Confidentiality Integrity Data Security Authentication
RCCU Zephyr South West Regional Cyber Crime Unit.
Network security threats
Cybersecurity EXERCISE (CE) ATD Scenario intro
Botnets A collection of compromised machines
Securing Information Systems
Panel Discussion Can We Handle an Advanced Cyber Threat?
Cyber Security Lesson Quarter 1.
Cyber defense management
SEC 420 StrCompetitive Success/tutorialrank.com
I have many checklists: how do I get started with cyber security?
Managing Change and Other Keys to Successful Implementation
Auburn Information Technology
CompTIA Security+ Study Guide (SY0-501)
Attacks on The Manufacturing Industry
Internet Security Threat Status
Reconnaissance Report Trillium Technologies
Home Internet Vulnerabilities
Security Essentials for Small Businesses
Must cost less than possible Impact
Keeping your data, money & reputation safe
How to Mitigate the Consequences What are the Countermeasures?
I UNDERSTAND CONCEPTS OF CYBERSECURITY
What are the Resilience Mechanisms? Hugo Pereira Evoleo Technologies
Acquisition training day Two Wrap up
Networking for Home and Small Businesses – Chapter 8
Motivation and Problem Statement
Cybersecurity EXERCISE (CE) ATD Scenario questions
Networking for Home and Small Businesses – Chapter 8
Information Protection
Networking for Home and Small Businesses – Chapter 8
Introduction to Internet Worm
Information Protection
Presentation transcript:

Cybersecurity ATD Scenario conclusion

ATD objectives Apply 5-step cybersecurity framework throughout the system's lifecycle Analyze via representative system Apply cybersecurity risk management process Recognize role of team approach to cybersecurity success Analyze risk; consequences and likelihood via risk cube Develop alternatives to material/non-material solution(s) via tradeoff analyzes Students should be able to understand: the difference between threat, risk, attack and vulnerability how threats materialize into attacks where to find information about threats, vulnerabilities and attacks typical threats, attacks and exploits and the motivations behind them high-level understanding of how example attacks work (e.g. DDOS, phishing and buffer overflow) how users are targeted in an attack and why this must be considered in defending against such attacks the concept of a threat landscape, its dynamic nature and how to create a landscape for an organization how to classify threats and example categories that there are different attacks, which have different patterns and different steps – for example be able to compare a DDOS to an attack designed to copy information how to classify threats and example categories that there are different types of malware – for example viruses, Trojans and spyware – their distribution mechanism and a detailed understanding of how they compromise information and systems that attacks can be combined for greater effect (e.g. phishing email, followed by social engineering phone call)

CYBERSECURITY ACQUISITION STRATEGY Adjust your plans to execute the acquisition strategy: NEAR MID LONG TERM TERM TERM Implement Contingency Plans Implement CONOPS Material/Non-Material Solutions Training Policies/Procedures Develop Acquisition and Strategic Plans Students should be able to understand: the difference between threat, risk, attack and vulnerability how threats materialize into attacks where to find information about threats, vulnerabilities and attacks typical threats, attacks and exploits and the motivations behind them high-level understanding of how example attacks work (e.g. DDOS, phishing and buffer overflow) how users are targeted in an attack and why this must be considered in defending against such attacks the concept of a threat landscape, its dynamic nature and how to create a landscape for an organization how to classify threats and example categories that there are different attacks, which have different patterns and different steps – for example be able to compare a DDOS to an attack designed to copy information how to classify threats and example categories that there are different types of malware – for example viruses, Trojans and spyware – their distribution mechanism and a detailed understanding of how they compromise information and systems that attacks can be combined for greater effect (e.g. phishing email, followed by social engineering phone call)

Acquisition & operations Threat Mgmt. Implementation Cyber Operations Test and Development Security Architecture and Engineering

Atd outcomes Smart Planning Early Trade-Space and Trade-Offs People/Process Team Sport Acquisition and Operation linkage