Please enable JavaScript.
Coggle requires JavaScript to display documents.
Security Implications and Adoption of Evolving Technology (2. Advanced…
Security Implications and
Adoption of Evolving Technology
2. Advanced persistent threats (APTs)
APT characteristics
Unprecedented degree of planning, resources employed and techniques used
Often follow a particular modus method
APT Sources of threat
Intelligence agencies
Political, defense or commercial
trade secrets
Criminal groups
Money transfers, extortion opportunities, personal identify information or secrets for potential onward sale
Terrorist groups
Production of widespread terror
through death, destruction and
disruption
Activist groups
Confidential information or disruption
of services
Armed forces
Intelligence or positioning to support future attacks on critical national infrastructure
Stage of APT Attack
Link Title
Target Selected
Target Research
Target Penetration
Command and control
Target Discovery
Data Exfiltration
Intelligence Dissemination
Information Exploitation
An advanced persistent threat (APT) is a targeted threat that is composed of various complex attack vectors and can remain undetected for an extended period of time.
1.Trends in the Current Threat Landscape
Trends in cybersecurity
Increasing
Malware
Web-Based Attack
Inside Threat (malicious or accidental)
Denial of service
Information leakage
Stable
Physical damage/theft/ loss
Data breaches
Identity theft
Declining
Botnets
Spam
3. Mobile device vulnerabilities, threats and risk
Technical Risk
Activity Monitoring and Data Retrieval
Messaging
Audio
Picture and Video
Geolocation
Static data
History
Storage
Unauthorized Network Connectivity
Email
SMS
HTTP get/post
TCP/UDP socket
Bluetooth
WLAN
DNS exfiltration
Sensitive Data Leakage
Mobile devices store
replicated information from enterprise networks.
Unsafe Sensitive Data Storage
Application may store sensitive data
Data store without encryption
Mobile associated with cloud storage which add risk
Unsafe Sensitive Data Transmission
Mobile devices rely on wireless data transmission, creating a risk of unauthorized network connectivity
Use unsecured public networks for data transfer
Automatic network recognition
Drive-by Vulnerabilities
Device size restricts display and edit capabilities
Documents may contain active hyperlinks, macros and embedded documents
Application may not recognize malformed links or provide adequate warnings to users.
Users can be harmed by insertion of illegal material or services bypass of authentication mechanisms.
4. The consumerization of IT and mobile
devices
Internet of Things (IoT)
Business Risk
Health and Safety
Regular compliance
User privacy
Unexpected cost
Operational Risk
Inappropriate access to functionality
Shadow usage
Performance
Technical Risk
Device vulnerabilities
Device updates
Device management
Big Data
Technical and operation risk
Amplified technical impact
Larger data sets are in more danger if attacked
Privacy in data collection
Revealed information is overly intrusive
Re-identification
semi-anonymous information may be converted to identifiable information, compromising individual privacy
5. Cloud and Digital Collaboration
Cloud Computing
Platform
Software as a service (Saas)
Platform as a service (Paas)
Infrastructure as a Service (IaaS)
Threats
Data breaches
Data loss
Account hijacking
Insecure application programming interfaces (APIs)
Web Application
Use Saas will increase the risk at application layer, include those attack vectors
Zero-day exploits
Primary malware
Secondary malware
Social Media
Risk of Enterprise
Risk to introduce viruses or malware to the organization network
Misinformation or misleading information posted or hijacked corporate presence
Unclear or undefined content rights to information posted to social media sites
Mismanagement of electronic communications may impacted by retention regulations
Risk of Employees
Use of personal accounts to communicate work-related information
Employee posting of pictures or information that link them to the enterprise
Employee use of social media in the workplace
Access to social media via enterprise-supplied mobile devices