Task 1 – 1 page
Instructions: Use examples from the readings, or from your own research, to support your views, as appropriate. Encouraged to conduct research and use other sources to support your answers. Be sure to list your references at the end. References must be in APA citation format. A minimum of 250-300 words.
Please look at the killing with keyboards file then answer the following questions in the context of the best practice concepts covered in chapter 11 and the security professional proficiencies covered in chapter 13. Identify what is at risk here, 5 possible threats and 5 vulnerabilities in this scenario. Analyze measures that could be taken to reduce the risks.
Number of Pages: 1 Page
Page Line Spacing: Double spaced (Default)
Academic Level: College
Paper Format: APA
Add additional insight opinions or challenge opinions and you can visit a couple of the web sites contributed and share your opinion of these sites. Minimum of 150 words for each.
PART 1 – 150 W0RDS
1) There are so many possible ways to become a victim and not only in cyber as we will look at in the scenario.
I remember working at a communications center for the navy during my active duty time. The first thing we were told was not to have any type of social media. Most of us could not understand that then but as time went on and more training was available to us, we learned that it could be used against us. Using unclassified information against us can be something that can have military missions compromised, which may result in harm or fatality. In the case of the scenario there where 238 fatalities.
I believe that Chris has made some mistakes that he may have taken for granted. Five possible threats can be; that posting on social media your status, posting on blogs information that may be used against you. Also, if you have the safe name on different sites means you may be using the same password for those sites. Posting things about your family can be used against you, especially that one of them is in the military. Chris had a problem with reviewing the training again because he had a clearance he believes that he will not make a mistake. Going over training can always help and there may be additional information out there to keep your systems safe. Chris using the WI-FI of a café also a vulnerability.
To reduce risks, I would say limit what you put on any site, as far as too much personal or sensitive unclassified information on social media and blogs. Update your passwords every 90 days, ensure one password is different from the other, not birthdays, names or any other personal information as a password. Try to stay off the local WI-FI and if you must use it please limit the use of personal data while using their WI-FI. Use of anti viruses on your system will help prevent potential threats. Some having the proper pass-codes on your device.
PART 2 – 150 Words
2) After locating the Killing with keyboards file online, and then reading it really made me think about the common mistakes that ALL if not a large amount of people make online every day.
Social networking has changed the way we interact with friends and associates. While social networks, like Facebook, Twitter, YouTube, and Google+, play a significant role in our lives, they are also a high risk for security threats.
With hundreds of millions of users online, these tools not only attract friends and family wanting to stay in touch, but they also attract people wanting to know about you for the wrong reasons. Be aware of the top five security threats currently out there to help you stay safe online. Identity thieves gather personal information from social media sites. Even if you have your account on the highest security settings, there are still ways for an identity thief to get your information. Most social network sites have information that is required, such as email address or birthday. It’s common for an identity thieves to hack an email account by using social information.
Choosing the wrong tools: In today’s scenario, planning and analyzing the data appropriately becomes very important to make the right decisions. Companies can access customer data, so they should use the right tools to systematically assess data and offer real-time insights, which would help them in arriving at the right social media marketing strategy. They can either choose in-app statistical tools that are available in the social media app or use the third-party tools.
Killing with keyboards file:
In regards to the threats I feel that these were targeted based off of chapter 11: Were the lack of detection involving when Chris was probed at the tech conference that he was attending for work. He shared information on the web publically that was utilized by the Open source intell. Gatherer to collect detailed information about the Target Chris. Now this story did not say that the internal network of his corporation was hacked illegally but Chris definitely demonstrated category 5 in which he displayed poor security practice. He should never have publically made the comment about the chips that he felt were defective or a liability to the Army. Category VI was definitely used by the adversary because the intell. lady applied reconnaissance and probes into the Target Chris’s personal life based off of personal information he wrote online or clues that linked his personal profile to him based off of key words he used online. The adversary most definitely used a kind of covert tactic to obtain information from Chris that was needed to gather detailed confirmation.
Methods for reducing Risk:
1. Applying tools to combat defensive strategic dominance like ACP (Access control Policies)
2. Detection which could utilize IDS of a network base.
3. Installing reliable firewalls that will keep a good amount of intrusion form entering the network.
4. Management and policy that would enforce, create, and disseminate the security policy as well as make the team members understand the importance of operation security.
Academic Level: College
Paper Format: APA