Rubic_Print_Format
Course Code | Class Code | Assignment Title | Total Points | |||||
NRS-490 | NRS-490-O501 | PICOT Statement Paper | 75.0 | |||||
Criteria | Percentage | Unsatisfactory (0.00%) | Less than Satisfactory (75.00%) | Satisfactory (79.00%) | Good (89.00%) | Excellent (100.00%) | Comments | Points Earned |
Content | 80.0% | |||||||
Identification of Clinical Problem/Issue | 30.0% | Clinical problem/issue is not identified, and resolution is not addressed. | Clinical problem/issue is identified with little discussion of resolution or patient outcome. | Clinical problem/issue is identified but not supported with clinical observations or evidence. The identified problem/issue can be resolved, or a patient outcome shows minimal improvement. | Clinical problem/issue is identified based on clinical observation experience or evidence in literature. Articles are cited to support the need for change in nursing practice. The identified problem/issue can be resolved, or a patient outcome can be improved using nursing interventions. | Clinical problem/issue is identified based on key concepts that define evidence-based practice or clinical experience. Articles are cited to support the need for change in nursing practice. The identified problem/issue can be resolved, or a patient outcome can show a marked improvement through a nursing intervention. | ||
Clinical Problem/Issue, Including Description, Evidence-Based Solution, Nursing Intervention, Patient Care, Health Care Agency, and Nursing Practice | 30.0% | Clinical problem/issue is not described with clarity and the corresponding elements are not included. | Clinical problem/issue description includes a basic understanding of the problem/issue and setting, with few of the following elements explained: evidence-based solution, nursing intervention, patient care, health care agency, and nursing practice. | Clinical problem/issue description includes a basic understanding of the problem/issue, the setting, and the patient population. The following elements are explained: evidence-based solution, nursing intervention, patient care, health care agency, and nursing practice. Minimal rationale is provided to support the resolution of the clinical problem/issue. | Clinical problem/issue description includes a thorough understanding of the problem/issue, the setting, the patient population, and why it is a problem/issue. The following elements are explained in detail: evidence-based solution, nursing intervention, and patient care consistent with specific health care agency and nursing practice. Sound rationale is provided supporting the clinical problem/issue resolution. | Clinical problem/issue description includes a developed and thorough explanation of the problem/issue, the setting, the patient population, and the rationale for why it is a problem/issue. The identified clinical problem/issue explains the following elements with detail and clarity: evidence-based solution, nursing intervention, and improved patient care consistent with specific health care agency resulting in nursing practice change. Sound rationale is provided in the discussion of the clinical problem/issue resolution. | ||
PICOT Statement Focused on Resolution, Improvement, Application, and Intervention | 10.0% | PICOT statement does not focus on resolution of a problem/issue, improvement of patient care or application of a nursing intervention. | PICOT statement discusses a clinical problem/issue without a focus on improvement or intervention. | PICOT statement focuses on the resolution of a clinical problem/issue that improves patient care through the application of a nursing intervention. | PICOT statement focuses on the resolution of a clinical problem/issue, with discussion of improving patient care through the application of an evidenced-based nursing intervention. | PICOT statement clearly focuses on the resolution of a clinical problem/issue and aims at improving patient care through the application of an evidenced-based nursing intervention. | ||
PICOT Statement Including Population, Intervention, Comparison, Outcomes, and Time | 10.0% | Population, Intervention, Comparison, Outcomes, and Time are not included. | Population, Intervention, Comparison, Outcomes, and Time are present, but lack detail or are incomplete. | Population, Intervention, Comparison, Outcomes, and Time are present. | Population, Intervention, Comparison, Outcomes, and Time are clearly provided and well developed. | Population, Intervention, Comparison, Outcomes, and Time are comprehensive and thoroughly developed with supporting details. | ||
Organization and Effectiveness | 15.0% | |||||||
Presentation | 5.0% | Paper lacks any discernible overall purpose or organizing claim. | Thesis is insufficiently developed or vague. Purpose is not clear. | Thesis is apparent and appropriate to purpose. | Thesis is clear and forecasts the development of the paper. Thesis is descriptive and reflective of the arguments and appropriate to the purpose. | Thesis is comprehensive and contains the essence of the paper. Thesis statement makes the purpose of the paper clear. | ||
Argument Logic and Construction | 5.0% | Statement of purpose is not justified by the conclusion. The conclusion does not support the claim made. Argument is incoherent and uses noncredible sources. | Sufficient justification of claims is lacking. Argument lacks consistent unity. There are obvious flaws in the logic. Some sources have questionable credibility. | Argument is orderly, but may have a few inconsistencies. The argument presents minimal justification of claims. Argument logically, but not thoroughly, supports the purpose. Sources used are credible. Introduction and conclusion bracket the thesis. | Argument shows logical progressions. Techniques of argumentation are evident. There is a smooth progression of claims from introduction to conclusion. Most sources are authoritative. | Clear and convincing argument that presents a persuasive claim in a distinctive and compelling manner. All sources are authoritative. | ||
Mechanics of Writing (includes spelling, punctuation, grammar, language use) | 5.0% | Surface errors are pervasive enough that they impede communication of meaning. Inappropriate word choice or sentence construction is used. | Frequent and repetitive mechanical errors distract the reader. Inconsistencies in language choice (register), sentence structure, or word choice are present. | Some mechanical errors or typos are present, but they are not overly distracting to the reader. Correct sentence structure and audience-appropriate language are used. | Prose is largely free of mechanical errors, although a few may be present. A variety of sentence structures and effective figures of speech are used. | Writer is clearly in command of standard, written, academic English. | ||
Format | 5.0% | |||||||
Paper Format (use of appropriate style for the major and assignment) | 2.0% | Template is not used appropriately or documentation format is rarely followed correctly. | Template is used, but some elements are missing or mistaken; lack of control with formatting is apparent. | Template is used, and formatting is correct, although some minor errors may be present. | Template is fully used; There are virtually no errors in formatting style. | All format elements are correct. | ||
Documentation of Sources (citations, footnotes, references, bibliography, etc., as appropriate to assignment and style) | 3.0% | Sources are not documented. | Documentation of sources is inconsistent or incorrect, as appropriate to assignment and style, with numerous formatting errors. | Sources are documented, as appropriate to assignment and style, although some formatting errors may be present. | Sources are documented, as appropriate to assignment and style, and format is mostly correct. | Sources are completely and correctly documented, as appropriate to assignment and style, and format is free of error. | ||
Total Weightage | 100% |
Project 4: Threat Analysis and Exploitation
Transcript (background):
You are part of a collaborative team that was created to address cyber threats and exploitation of US financial systems critical infrastructure. Your team has been assembled by the White House Cyber National security staff to provide situational awareness about a current network breach and cyber attack against several financial service institutions. Your team consists of four roles, a representative from the financial services sector who has discovered the network breach and the cyber attacks. These attacks include distributed denial of service attacks, DDOS, web defacements, sensitive data exfiltration, and other attack vectors typical of this nation state actor. A representative from law enforcement who has provided additional evidence of network attacks found using network defense tools. A representative from the intelligence agency who has identified the nation state actor from numerous public and government provided threat intelligence reports. This representative will provide threat intelligence on the tools, techniques, and procedures of this nation state actor. A representative from the Department of Homeland Security who will provide the risk, response, and recovery actions taken as a result of this cyber threat. Your team will have to provide education and security awareness to the financial services sector about the threats, vulnerabilities, risks, and risk mitigation and remediation procedures to be implemented to maintain a robust security posture. Finally, your team will take the lessons learned from this cyber incident and share that knowledge with the rest of the cyber threat analysis community. At the end of the response to this cyber incident, your team will provide two deliverables, a situational analysis report, or SAR, to the White House Cyber National security staff and an After Action Report and lesson learned to the cyber threat analyst community.
Step 2: Assessing Suspicious Activity
Your team is assembled and you have a plan. It's time to get to work. You have a suite of tools at your disposal from your work in Project 1, Project 2, and Project 3, which can be used together to create a full common operating picture of the cyber threats and vulnerabilities that are facing the US critical infrastructure.
To be completed by all team members: Leverage the network security skills of using port scans, network scanning tools, and analyzing Wireshark files, to assess any suspicious network activity and network vulnerabilities.
Step 3: The Financial Sector
To be completed by the Financial Services Representative: Provide a description of the impact the threat would have on the financial services sector. These impact statements can include the loss of control of the systems, the loss of data integrity or confidentiality, exfiltration of data, or something else. Also provide impact assessments as a result of this security incident to the financial services sector.
Step 4: Law Enforcement
To be completed by the Law Enforcement Representative: Provide a description of the impact the threat would have on the law enforcement sector. These impact statements can include the loss of control of systems, the loss of data integrity or confidentiality, exfiltration of data, or something else. Also provide impact assessments as a result of this security incident to the law enforcement sector. (2 page)
Step 5: The Intelligence Community
To be completed by all team members: Provide an overview of the life cycle of a cyber threat. Explain the different threat vectors that cyber actors use, and provide a possible list of nation-state actors that have targeted the US financial services industry before. (1-2 page)
Review this threat response and recovery resource and use what you learned from the resource to provide or propose an analytical method in which you are able to detect the threat, identify the threat, and perform threat response and recovery. Identify the stage of the cyber threat life cycle where you would observe different threat behaviors. Include ways to defend against the threat, and protect against the threat. Provide this information in the SAR and AAR.
To be completed by the Intelligence Community Representative: Provide intelligence on the nation-state actor, their cyber tools, techniques, and procedures. Leverage available threat reporting such as from FireEye, Mandiant, and other companies and government entities that provide intelligence reports. Also include the social engineering methods used by the nation-state actor and their reasons for attacking US critical infrastructure. Include this information in the SAR and AAR.
Step 6: Homeland Security
To be completed by the Homeland Security Representative: Use the US-CERT and other similar resources to discuss the vulnerabilities and exploits that might have been used by the attackers.
Explore the resources for risk mitigation and provide the risk, response, and risk mitigation steps that should be taken if an entity suffers the same type of attack.
To be completed by all team members: Provide a risk-threat matrix and provide a current state snapshot of the risk profile of the financial services sector. These reports will be part of an overall risk assessment, which will be included in the SAR and AAR. (1-2 page)
Review and refer to this risk assessment resource to aid you in developing this section of the report.
Step 7: The SAR and AAR
All team members: After you compile your research, and your own critical assessments and analysis, determine which information is appropriate for a Security Assessment Report (SAR) that will be submitted to the White House, and an After Action Report (AAR) that will be submitted to the rest of the analyst community.
Prepare your SAR for the White House Cyber National Security Staff, describing the threat, the motivations of the threat actor, the vulnerabilities that are possible for the threat actor to exploit, current and expected impact on US financial services critical infrastructure, the path forward to eliminate or reduce the risks, and the actions taken to defend and prevent against this threat in the future.
Prepare the AAR. This knowledge management report will be provided to the cyber threat analyst community, which includes the intelligence community, the law enforcement community, the defense and civilian community, the private sector, and academia. The purpose of the AAR is to share the systems life cycle methodology, rationale, and critical thinking used to resolve this cyber incident.
The deliverables for this project are as follows:
Security Assessment Report (SAR): This report should be a 14-15 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
After Action Report (AAR): This report should be a 10-15 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
A 5-8 slide PowerPoint presentation for executives along with narration or In-Class presentation by each team member summarizing a portion of your SAR and AAR report.
3
Project #4: Team Bravo
Security Assessment Report (SAR)
U.S. Critical Infrastructure Cyber Attack & Breach:
Financial Services Sector
CYB 610: Cyberspace and Cybersecurity Foundations
University of Maryland Global Campus
The financial services sector (“FSS”) of many countries has increasingly been targeted by nation-states to advance political, military, and especially, economic motives. Nation-states and their proxies may be able to destabilize national enemies through the use of cyberwarfare. It is necessary to understand nation-state cyberattack patterns to correctly attribute an attack to a nation-state, disincentivize future critical infrastructure attacks, and / or to retaliate. Information sharing and resource leveraging is essential for national security, as is cooperation of many sectors, including the FSS, law enforcement, intelligence agencies, and Homeland Security.
The Financial Sector
Impact of Network Breach and Cyber Attacks on FSS
A successful compromise and subsequent breach of the FSS of the U.S. critical infrastructure would likely wreak havoc on all other U.S. critical infrastructure sectors that rely upon any form of financial messaging; common FSS attacks include distributed denial-of-service (“DDoS”), web defacements, and data exfiltration (See Table 1). It is of utmost importance for financial sector companies and governance to share timely cyber threat information in order to minimize the potential negative impact of a cyberattack on FSS networks. Organizations such as the Financial Services Information Sharing and Analysis Center (FS-ISAC), created pursuant to Presidential Decision Directive 63 (1998) to foster resiliency in the FSS, may be indispensable in aiding the FSS to mitigate risks, to receive timely threat warnings, and to share actionable information between public and private entities (Financial Services Information Sharing and Analysis Center, 2019). FS-ISAC has 7,000 members that are all likely targets of a nation-state cyberattack; members include community banks, credit card companies, securities firms, credit unions, insurance companies, investment banks, bank service providers, and payment processors (Financial Services Information Sharing and Analysis Center, 2019).
Nation-State Advanced Persistent Threat Stages, Attacks, Defenses, & Recovery |
|||
6 APT Stages |
Attacks |
Defenses |
Recovery |
1. Compromised network: attacker enters through application, email, file, or network vulnerabilities + uploads malware (reverse-engineering / copycats possible) |
Malware > 12 months Watering hole Minimal footprint Keyloggers Screenshots / video Malware encrypted Transferred from registry Phishing domains Credential stuffing SQL Injection Cross-site scripting (XSS) Local file inclusion (FLI) Object Graph Navigation Library (OGNL)
Mobile Ad-hoc Networks: buffer overflow, routing table, session hijacking, wormhole |
Threat intelligence Defense-in-depth Quantitative prediction: CVSS / NVD Threat / vulnerability / risk assessment Continuous monitoring Least privilege System hardening / Secure coding Protect interbank payment messages Logical / physical security (e.g., strong passwords, 2FA, guards, locks, biometrics) Anti-virus software / Logging / auditing Customer / employee training Next Generation Firewalls Air-gap critical systems Secure mobile ad-hoc networks Standardized WLAN configurations Input / error handling Encryption |
Update security policies POA&M Trusted third parties Decrease patch time (e.g., 176 day average patch time for FSS) Business continuity plan Disaster recovery plan Consider recovery time / point objectives Data back-up Compliance with regulations: Sarbanes-Oxley, SEC, etc. Natural disasters / equipment failures Public-Private Partnership Coordinate international finance regulations Threat enclaves |
2. Malware searches for other network vulnerabilities and awaits instructions from command and control servers |
Waits until public holiday Remote controlled attack Port scanning |
IDS / IPS Logging / auditing Segregate networks Next Generation Firewalls |
Update security policies POA&M |
3. Malware searches for other vulnerabilities to compromise if initial attack vector is closed |
Administrator privileges Change firewall rules Stops warning messages |
IDS / IPS Segregate networks Next Generation Firewalls Configuration management |
Update security policies POA&M |
4. Target data, including accounts and passwords, are inspected |
Password credentials Authentication bypassed Operations exposed Messaging exposed Bank commands recorded Interface manipulated Bypass validity checks |
System hardening Least privilege / Encryption Data integrity checks Next Generation Firewalls Air-gap critical systems 2FA Symmetric / asymmetric encryption |
Update security policies POA&M |
5. Breached network: malware collects data on staging server and exfiltrates data |
Security teams distracted: Ransomware / denial-of-service / DDoS Proxies obscure identity |
Integrity checks Next Generation Firewalls Block unusual payment messages Secure mobile ad-hoc networks |
Update security policies POA&M Stop data loss / downtime |
6. Evidence of attack is removed, but network remains compromised for future attacks |
Overwrite Windows Event Logs / Prefetch files False-flags (e.g., diversionary language) Delete transfer requests Alter balance reporting |
Incident Response Plan Malware containment Devolution Plan Reconstitution Plan Fusion unit hack-backs Cloud-based Penetration testing |
Update security policies POA&M Risk management plan Business Impact Assessment Cyberwarrior reserve |
Table 1. Nation-State Advanced Persistent Threat Stages, Attacks, Defenses, & Recovery. Adapted with information from (FireEye, Inc., 2019), (SWIFT, 2019), (SWIFT & BAE Systems, 2017), (Carnegie Endowment for International Peace, 2019), (Ashford, 2019), (Jaganathan, 2019), (Osborne, 2015), (UMGC, n.d.), (Stonefly, 2017), (Stadnik, 2019), (Saraydayran, et al., 2011), (Micrhandani, 2018), (Carr, 2016), (Healey, et al., 2018), (Souppaya, et al., 2012, 2013), (The Web Application Security Consortium, n.d.), (Archer, et al., 2013), (Pavate, et al., 2014), & (Saraydayran, et al., 2011).
Since nation-state threats may impact the FSS of any country, organizations like FS-ISAC provide leadership and information sharing with FSS companies worldwide; for example, the central bank of Singapore, the Monetary Authority of Singapore, has entered into an information sharing agreement with the FS-ISAC to create an Asia Pacific Regional Intelligence and Analysis Center to combat cyberattacks (Nandikokur, G., 2019). According to the Monetary Authority of Singapore, “The objective behind partnering with FSISAC is to bolster the quality and timeliness of cyber threat intelligence received by financial institutions, strengthen cybersecurity risk management and response as well as champion cybersecurity programs and initiatives in the APAC region." (Nandikokur, 2019). Information from the FS-ISAC has allowed the central bank to establish mandatory guidelines for all financial institutions in Singapore, including requiring patch updates, using security devices, and improving authentication and access controls (Nandikokur, 2019). The potential financial impact of each successful cyberattack on the FSS cannot go unchecked.
FSS firms endure at at a minimum, roughly 1 billion cyber attacks annually, resulting in $16.8 billion in damages in 2017, with a 98% success rate for nation-state actors (Mirchandani, 2018). 8.5% of all data breaches in 2017 were against FSS firms, such as consumer banks, credit cards issuers, credit unions, investment banks, mortgage and loan companies, pension funds, and trust administrations; the average cost of a breached FSS record is $336 compared with $225 for other types of business records (Schaffer, 2018). Damages and recovery from FSS data breaches may include revamping network security, fines, consumer lawsuits, identity theft monitoring, harm to business reputation, lost customers, and scathing media coverage (Mirchandani, 2018).
It has been reported that 71% of bank executives prioritize spending on cybersecurity (Melton, 2018); “Even if an attack is not widespread throughout the industry, a cyberattack against one or more financial institutions can prevent customers from accessing their accounts or their funds, thereby causing reputational damage and lack of confidence in the system as a whole…” (Cotney, 2018). FSS data vulnerability may be due to unpatched network vulnerabilities, malware, exploited credentials, spear-phishing to change account IDs or passwords, business corporate account takeovers, and third party vendors (Cotney, 2018). Vigilance, enterprise risk approaches, security agreements with third parties, and customer / employee training are all necessary steps to combat potential nation-state cyberattacks on the FSS (Cotney, 2018). The Industrial Control Systems used by the FSS, such as financial messaging systems, may be prime disruption targets for nation-state cyberattacks.
Nation-states have been targeting the interbank communications and messaging software known as the Society for Worldwide Interbank Financial Telecommunications (“SWIFT”); according to SWIFT, “… a mix of malicious files will often be used, whether that be to acquire credentials or to bypass authentication requirements; to learn how internal operations or messages work; to create distractions and delay local security teams’ responses; or to securely delete log files and other traces of the attacks” (SWIFT, 2019) (See Figure 1). The SWIFT network interconnects over 11,000 institutions globally and annually transmits 7.8 billion financial messages between banks in over 200 countries (SWIFT, 2019). According to the 2017 U.S. Department of the Treasury Annual Report to Congress, “Disruptions to the operations of a key institution in the financial system could be transmitted through these networks and lead to a systemic crisis” (U.S. Department of the Treasury, Office of Financial Research, 2017).
Figure 1. The Cyber Kill Chain. (Lockheed Martin Corporation, 2019).
Problematically, nation-state and non-nation-state actors will often encrypt their malware making it difficult to both detect the inception of an Advanced Persistent Threat (“APT”) on FSS industrial control systems, and to reverse-engineer malware (SWIFT & BAE Systems, 2017). The SWIFT banking network losses billions of dollars per year to cyber criminals (Mirchandani, 2018). An attacker may only need to exploit a single vulnerability to successfully breach the FSS, whereas a defender must seal off as many vulnerabilities as possible (SWIFT & BAE Systems, 2017). Once a cyberattack alert is sent, it is critical to inform law enforcement as soon as possible; unfortunately, law enforcement has also experienced increased cyberattacks.
Law Enforcement
Impact of Network Breach and Cyber Attacks on Law Enforcement
Network breach and cybersecurity attacks collectively refer to the attempt to expose, alter, disable, destroy, steal, or gain unauthorized access to, or make unauthorized use of, confidential or private data or any other assets (Jensen, 2009). The attacks come in various forms, and they are intended to exploit unauthorized access to data, resources, and information. From the case scenario, the Financial Services Representative (FSR) has identified several network breach and cyber-attacks, including DDoS attacks, web defacements, sensitive data exfiltration, and others. Notably, these attacks have an effect on the victim, as well as other related agencies, such as the law enforcement agency. They cause loss in system controls, data integrity or confidentiality as well as exfiltration of data or something else.
One of the potential effects on the agency is the loss of system controls. Law enforcement agencies have a critical position in the consequences of cyber-attacks and threats - they are often on the forefront of investigations, interdiction, or enforcement. Consequently, they become the target of network threats and attacks. The series “Hawaii Five-O” demonstrates the impact of a cyberattack on the Five-O, a law enforcement agency in Hawaii. In one episode, a hacker accessed the Five-O information system and closed it down, denying the Five-O members the access to the security information, financial data, and other essential information for law enforcement. The team lost control of their systems entirely. Consequently, it blocked the opportunity to trace the hacker, who had accessed other financial service infrastructure for malicious reasons. This is but one example of the effects of a network breach and cyber-attack on a law enforcement agency.
Losing control of systems can impact computer-aided dispatching, emergency alert systems, event tracking, the ability to monitor transportation and traffic infrastructure, intelligence dissemination, and operational plans set in motion (Quinn, 2018). APTs against law enforcement may take the form of malware, ransomware (e.g., locking law enforcement out of video evidence), phishing, hacktivism, and “doxing” police officers by releasing home addresses, social security numbers, and sensitive family information (Quinn, 2018). A police chief association describes the situation as “near-constant attack” and recommends training programs, security patches, decommissioning obsolete devices, anti-virus software, least privilege, data back up, and encryption (Quinn, 2018).
Another effect of a data security break, as demonstrated in the “Hawaii Five-O” episode, is exfiltration of data. The hacker acquires physical access to computers, transfers data, and often destroys the system. For instance, an attacker sneaked into the Five-O headquarters, transferred confidential data, and destroyed their information system while the Five-O task force was away pursuing a criminal investigation. The stolen data is used to accomplish malicious and criminal activities for the benefit of the malicious actor.
Moreover, computer network attacks result in the loss of data integrity or confidentiality. When hackers access information systems of any institutions, whether law enforcement or financial services agencies, they often alter data to fit their purpose. For example, the Pikachu virus and the love bug of the 2000s propagated through infected users by sending themselves to all the users’ contacts in the Outlook address book. The viruses, mainly, the love bug, caused damage to the mailing systems of large corporations around the world, causing agencies such as the Pentagon, CIA, the British Parliament, and most large corporations to completely shut down their mail systems (Jensen, 2009). As the law enforcement agency, it would be challenging to trust any incoming data for investigation and enforcement of the law.
DDOS attacks, web defacements, sensitive data exfiltration, and other attack vectors typical of a nation-state actor can strain the financial resources of the law enforcement sector. It can cost the sector billions to restore the systems to normal function; in other words, network breach and cyber-attacks have a significant impact on the law enforcement sector. Cyberattacks reduce the efficiency of this sector in enforcing laws, conducting criminal investigations, and monitoring malicious actors. When a cyberattack is conducted by a nation-state, it will be essential for local law enforcement to cooperate with regional and national law enforcement, and potentially the military, in order to stop the cyberattack, recover data and system functionality, restore security, and possibly retaliate when there is definitive attribution.
The Intelligence Community
Nation-State Actors, Motivation, Tactics, Techniques, and Procedures
The FSS is often cyberattacked by powerful nation-states, or proxies, that defy attribution and have unlimited resources. Nation-states may use cyberwarfare as a show of power and sovereignty; “… victories are fought with bits instead of bullets, malware instead of militias, and botnets instead of bombs…” (Geers, et al., 2014). Nation-states with demonstrable capabilities in this arena include China, North Korea, India, Pakistan, Russia, Iran, Syria, Israel, South Korea, and the United States; of note, there have been no known cyberattacks emanating from the European Union (EU) or the North Atlantic Treaty Organization (NATO) (Geers, et al., 2014). Nation-states have various economic, military, and political cyberwarfare motives (Geers, et al., 2014); to date, nation-state attacks on the FSS are believed to be from China, Iran, Russia, and North Korea (Moon, 2019), though FSS insiders also pose a considerable threat (Randazzo, et al., 2005). Some U.S. lawmakers advocate hacking-back via law enforcement / military (e.g., cybersecurity reservist system) (Mirchandani, 2018), public-private partnerships (Carr, 2016), and coordinating international finance regulations (Healey et al., 2018).
North Korea, in particular, has been suspected of attacking the FSS and cryptocurrency exchanges of many countries to fund WMD programs; North Korea has already amassed approximately $2 billion from FSS attacks (Schwartz, 2019). Nation-states may hide behind attribution smokescreens to make retaliation politically infeasible, though some behaviors, such as the timing of a cyberattack, may bear the motivational fingerprints of a particular nation-state (See Table 2) (See Figure 1). For example, APTs are likely to emerge during international negotiations (Geers, et al., 2014). Proposed “cyber-arms treaties” are thought to be of limited worth since there may not be an effective way of inspecting for prohibited activity in cyberspace (Geers, et al., 2014). Positive attribution depends upon recognizing nation-state tactics, techniques, and procedures (“TTP”) in order to successfully direct potential retaliation; for example, Asia-Pacific attacks are frequently brute-force, while U.S. attacks are more “surgical” (Geers, et al., 2014) (See Table 3).
|
Nation-State Cyber Attack Patterns & Cyber Kill Chain |
||||
|
People’s Republic of China / North Korea |
India / Pakistan |
Russia / Eastern Europe |
Middle East / Iran / Syria |
United States / Israel / South Korea |
Internet Speed Mbps (Mobile Download / Upload / Broadband Download / Upload) |
China: 33.49 / 14.28 / 84.63 / 30.32 |
India: 10.87 / 4.33 / 29.06 / 25.85
Pakistan: 13.61 / 10.08 / 8.54 / 6.31 |
Russia: 21.04 / 9.63 / 50.31 / 53.43 |
Iran: 29.13 / 12.33 / 13.36 / 6.24
Syria: 20.21 / 8.62 / 9.99 / 11.73 |
United States: 35.02 / 9.96 / 119.09 / 43.66
Israel: 24.07 / 13.44 / 84.35 / 19.12
South Korea: 90.06 / 16.03 / 144.99 / 95.91 |
Reconnaissance (Cyber Kill Chain Step 1) |
Crawling / mailing lists / social networks / watering holes |
|
HUMINT |
Regional mailing lists |
HUMINT |
Weaponization (Cyber Kill Chain Step 2) |
Masked exe files / non-exe files / watering holes |
Malware |
Malicious DOC / XLS Files |
Malicious PPT / PPS files |
Infected removable media |
Delivery (Cyber Kill Chain Step 3) |
Spear-phishing / server / web compromise |
|
Email attachments |
Email attachments |
USB |
Exploitation (Cyber Kill Chain Step 4) |
Social engineering / app vulnerabilities / 0-day browser attack |
|
0-day app vulnerabilities |
Social engineering / mouse clicks |
Social engineering / USB |
Installation (Cyber Kill Chain Step 5) |
Feature Rich Remote Access Trojan (RAT) (requires operator) |
|
Feature Rich RAT with encrypted modules |
RAT / rudimentary tools |
Crypto-keyed, targeted worm (no operator, auto-lateral movement) |
Command and Control (C2) (Cyber Kill Chain Step 6) |
HTTP with embedded, standard (e.g., XOR) / custom encodings / manipulate OS / disable anti-virus software |
|
HTTP with custom embedded encoding / encryption |
HTTP / plain sight hiding |
Single use / fully encrypted |
Objectives (Cyber Kill Chain Step 7) |
Economic espionage / intelligence / APT / R & D data |
|
Intelligence |
Intelligence / denial-of-service |
Intelligence / system disruption |
TTP |
Comment Crew Bureaucracy: brute-force hacking
Dark Seoul Gang (North Korea): DDoS with political motives on dates of historical significance
Malware: Taidoor / Seinup
|
Pakistani Cyber Army: malware |
Red October: spying on former Soviet Union citizens, embassies, military, critical infrastructure using “Sputnik” software
“False-flags” to misdirect attribution |
Mahdi: novelty, creativity, and deception to attack Israeli targets
Malicious Word / PowerPoint files / PDFs / games / animations
Iran: “Cutting Sword of Justice” / Cyber Army
Syrian Electronic Army (SEA)
|
Stuxnet / Flame / Duqu / Gauss
Heavy financial investment / sophistication / legal oversight / defense contractor base |
Table 2. Nation-State Cyber Attack Patterns & Cyber Kill Chain. Adapted with information from (Geers, et al., 2014), (SpeedTest, 2019), & (Lockheed Martin Corporation, 2019).
|
Nation-State Cyber Offense & Defense |
||||
|
People’s Republic of China / North Korea |
India / Pakistan |
Russia / Eastern Europe |
Middle East / Iran / Syria |
United States / Israel / South Korea |
Offense |
U.S.: Nuclear espionage / F-35 plans / Google / Intel / RSA SecureID / Lockheed Martin / Northrup Grumman (e.g., Operation Beebus) / Morgan Stanley / Chamber of Commerce / N.Y. Times / gas pipelines
Europe: UK House of Commons / UK businesses
India: reliance on Chinese hardware / Navy
South Korea: Government / Internet portals
Japan: Government / military / high-tech networks
Australia: Australian Security Intelligence Organization
Bangladesh: North Korea allegedly steals $1 billion from Bangladesh Bank in 2016 using automated toolkit attack on SWIFT systems
Indonesia, Malaysia, Singapore, Thailand, and Vietnam: telecommunications & banks |
India: Pakistani malware infects music service / India Central Bureau of Investigation / India government
Pakistan: India “Operation Hangover” attack on Pakistani IT, mining, automotive, legal, engineering, military, and financial services |
Chechnya: websites
Estonia: DDoS attack
Georgia: military invasion
U.S.: USB attack on CENTCOM / “Climategate” |
Saudi Arabia: Iran uses “Shamoon” virus to attack Aramco (oil) – 75% data deleted and replaced with image of burning American flag
U.S.: Izz ad-Din al-Qassam “Operation Ababil” DDoS attacks on financial institutions / NYSE / Marine Corps 1 plans / Twitter
China: attack on Baidu search engine
Netherlands: Dutch certificate signing authority
Qatar: SEA DDoS hack of Al-Jazeera
Israel: alleged SEA attack on water supply |
Syria: Israel disables air defense networks to facilitate nuclear facility destruction
Iran: Stuxnet shut down Iranian nuclear enrichment (compromised as few computers as possible) / payload decrypted only on target device |
Defense |
U.S. / Taiwan: China Aerospace Science & Industry Corporation attacked with spyware
U.S. / South Korea: Key Resolve alleged attack on North Korea / North Korea disconnecting critical servers from internet
Chinese military creating cyber warfare units
|
India: Pakistani attack on music service / Central Bureau of Investigation / government
Pakistan: India “Operation Hangover” attack |
Russia: Buying old-fashioned typewriters
Russian military creating cyber-warfare units |
U.S. / Israel: Stuxnet attack on Iran nuclear program |
Russia / Hamas / Hezbollah: DDoS attack on Israeli “Home Front Command” during Gaza operation (15 million junk mail deliveries per second)
Iraq: disruption of Predator drone live video feed
U.S. Military cyber warfare units |
Table 3. Nation-State Cyber Offense & Defense. Adapted with information from (Geers, et al., 2014) & (Carnegie Endowment for International Peace, 2019).
Cyber warfare attack techniques include USB infected physical media, malware that surreptitiously records all computer activity, Bluetooth data exfiltration, encrypted code that decrypts only on a unique target device, zombies, botnets, denial-of-service attacks, services-for-hire, and “false flags” in which a nation-state disguises nefarious activity to look like the pattern of another entity (Geers, et al., 2014). Digital forensics techniques may be used to establish the TTP used by various nation-states that may later be used for potential attribution; “The best chance to pierce this veil comes with the skillful blending of forensic back-hacking techniques with deep knowledge of others’ strategic cultures and their geopolitical aims…” (Geers, et al., 2014). For example, North Korea has been suspected of repeatedly targeting the SWIFT messaging system, automated teller machines, and interbank payment switch applications (Ashford, 2019) (See Figure 2). Nation-state cyberwarfare against critical infrastructure may negatively impact national security and resiliency (U.S. Department of Homeland Security, 2013).
Figure 2. Cyber-attack on financial services critical infrastructure sector (Swift & BAE Systems, 2017).
Critical Infrastructure & Policy
U.S. critical infrastructure is defined as “… systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.” (U.S. Department of Homeland Security, 2013) (See Table 4). The FSS of any country is an attractive target since financial infrastructure supports other critical infrastructure areas, including emergency services and defense (Geers, et al., 2014). The U.S. Department of the Treasury is the Sector-Specific Agency governing the U.S. FSS (U.S. Department of Homeland Security, n.d.); in anticipation of a cyberattack on the FSS, a plan has been prepared that addresses risk management, partners, strategy, and sector goals, including information sharing, best practices, incident response and recovery, and policy support, as well as methods to measure effectiveness (U.S. Department of the Treasury, et al., 2015). It is important to build a secure and resilient FSS with appropriate risk management to mitigate the impact of an impending nation-state cyberattack that exploits FSS vulnerabilities; quantitative risk assessment may help to allocate limited resources and share information.
U.S. Critical Infrastructure Risk Management & Policies |
||||||
Risk Management Framework |
2013 Presidential Policy Directive 21, Critical Infrastructure Security and Resilience (PPD-21) |
NIPP 2013 Partnering for critical infrastructure security and resilience (National Plan) |
2013 Executive Order 13636: Improving Critical Infrastructure Cybersecurity |
PPD-8, National Preparedness
Presidential Decision Directive 63 (PDD-63) |
2013 Climate Action Plan |
2013 National Strategy for Information Sharing and Safeguarding (NSISS) |
Human / Physical / Cyber
Set goals ID infrastructure Assess risks Manage risks Check effectiveness
Information sharing |
16 sectors: Chemical, Commercial Facilities, Communications, Critical Manufacturing, Dams, Defense Industrial Base, Emergency Services, Energy, Food and Agriculture, Government Facilities, Healthcare and Public Health, Information Technology, Nuclear Reactors, Materials, and Waste, Transportation, Waste and Wastewater Systems, and Financial Services
Security = physical / cyber
Resilience = adapt / withstand / recover rapidly
Risk = unwanted outcome from threats / vulnerabilities
Risk management = controlling risk
Partnership = cooperation of parties with common interests |
Manage physical / cyber risks through collaboration
Goals:
1) Assess threats / vulnerabilities 2) Reduce risk with cost benefit analysis 3) Advance planning and rapid recovery 4) Share information 5) Advance learning post-incidents
Coordinate risk Promote cross-sector interdependencies Information sharing Local & regional Partnership building International collaboration Build-in security to networks, assets, & systems |
Goals:
Federal adoption of technology-neutral cybersecurity framework
Best practices for cybersecurity
Information sharing
Civil liberty and privacy protection
|
Goal:
National security & resiliency against the strongest threats & risks
PDD63: Creates FS-ISAC to improve resilience of financial services sector
|
Goal:
Protecting critical infrastructure from the potential impacts of climate change
|
Goal: Timely information sharing
|
Table 4. U.S. Critical Infrastructure Risk Management & Policies. Adapted with information from (U.S. Department of Homeland Security, 2013) & (Financial Services Information Sharing and Analysis Center, 2019).
Quantitative Risk Assessment
One of the best known methods to quantitively assess risk may be the Common Vulnerability Scoring System (Jaganathan, et al., 2015) and the latest malware in the National Vulnerability Database (“NVD”) (NIST, 2019). The NVD currently contains 127,741 CVE Vulnerabilities and 249 US-CERT Alerts, with thousands of new CVEs reported annually (NIST, 2019). The CVSS “… base group highlights the qualities of vulnerability that are unchanged over time and user. The temporal group covers the characteristics of vulnerability over time and the environmental group highlights the specific user environment…” (Jaganathan, et al., 2015); CVSS score severity includes low, medium, high, and critical (NIST, 2019). Vulnerabilities are also broken down into categories including configuration, credentials management, cryptographic issues, and improper authentication / authorization (NIST, 2019).
Another quantitative metric that may be used to gauge risk is “time to compromise” a network (Hughes, et al., 2013). “Time to compromise” may be impacted by the extent of vulnerabilities present in a network; various vulnerabilities will surface depending upon system susceptibility, threat accessibility, and threat capability (Hughes, et al., 2013). Unfortunately, it is not enough to merely quantify risk - identified vulnerabilities must be promptly remedied.
In the “2015 State of Vulnerability Risk Management”, 65,000 known security vulnerabilities were studied over 20 years and it was discovered that it takes an average of 176 days to patch discovered FSS security vulnerabilities, which gives a nation-state plenty of time to exploit FSS targets and destabilize critical infrastructure (Osborne, 2015). Many of the top vendors, including Adobe, Java, Microsoft, Oracle, and Sun have vulnerable platforms that are used throughout the FSS (Osborne, 2015). Effective disaster plans may protect data and preserve business operations with minimal downtime, regardless of timely vulnerability patching.
Disaster Recovery and Business Continuity
Disaster planning and business continuity planning generally requires threat analysis (e.g., nation-state attack, natural disaster), determining the appropriate hardware / software requirements, having a security policy governing access, repeatedly testing the plan, and creating a resilient failover system (BizTech Staff, 2018). The recovery time objective must be understood, factoring in the application recovery time from the beginning of a disaster until user uptime, while the recovery point objective considers time until data restoration counting backwards from disaster onset (Stonefly, 2017). Disaster recovery and business continuity plans may meet the demand for “always-on operations”, but also must comply with regulations, including Sarbanes-Oxley and Gramm-Leach-Bliley (Stadnik, 2019). Disaster planning may include upgrading traditional network security to the latest effective hardware and software.
In addition to next generation firewalls, IDS / IPS, and biometrics, a non-negotiable defense is encryption for data at-rest and in-transit. Encryption may be symmetric (e.g., same key to encrypt / decrypt), or asymmetric (e.g., public key and private key related by a mathematical algorithm, public key infrastructure, digital certificates) (UMGC, n.d.). Examples of symmetric encryption include Advanced Encryption Standard (AES) and Triple DES; an example of asymmetric encryption is Pretty Good Privacy (UMGC, n.d.). In the event of a data breach, Homeland Security may advise on potential risk management and incident response.
Homeland Security
The Department of Homeland Security was first created after the terrorist attacks of 9/11, “to oversee and coordinate a comprehensive national strategy to safeguard the United States against terrorism and to respond to any future attacks” (Kemp, 2012). Today, the mission of DHS has broadened and modified, to include a better vision of the agency’s ultimate goal: the safeguarding of American citizens and the country.
The Financial Sector and National Security
Financial institutions are part of Section 9 entities, which are defined by the DHS as “companies that provide services so vital to the functioning of the economy that a successful cyberattack could reasonably result in catastrophic regional or national effects on public health, safety, economic security, or national security.” These institutions are susceptible to cyberattacks carried out by foreign adversaries. The main reason why financial institutions are targeted is that this sector is considered the motor of a nation and a successful attack could affect the entire United States and even have global, catastrophic consequences. As Homeland Security Representatives, it’s our mission to ensure that financial institutions have the necessary cybersecurity controls to ensure the nation’s safety.
Securing cyberspace is a national critical infrastructure priority. According to Barney et al. (2018), it was found that financial services firms are more susceptible to cybersecurity attacks, with victims 300 times more frequently than other businesses, and being attacked an average of 1 billion times per year. The main cyberattacks targeting financial institutions are ransomware, Denial of Service, phishing, social engineering, and malware.
Vulnerability and Risk Management
Homeland Security Representatives have proposed conducting a risk assessment with the goal of capturing vulnerabilities discovered during the control implementation, security assessment, and patching or assessment activities throughout the lifecycle of the systems. The findings are then assessed for applicability, mitigations, impact, and residual risk.
It was found that the financial institutions lacked a proper Information Assurance (IA) program. The IA team is the one who oversees the management of vulnerabilities, as well as ensures the confidentiality, integrity, and availability of the information systems. Risk is when a vulnerability is found, the likelihood of it being exploited. The organization’s IA program identifies vulnerabilities in the information systems as Very Low, Low, Moderate, High, or Very High, depending on the risk it represents. The IA team should have had guidelines in place to follow when a vulnerability is discovered, and what to do next. There’s a decision to be made: accept, mitigate, transfer, or eliminate the risk. If the vulnerability is going to be accepted, there has to be substantiating information on why it needs to be accepted.
The IA program is in place, but a lack of training and follow-up has caused it to fail. As part of the assessment conducted, it was concluded that the vulnerability used by the attackers was, indeed, a Very High vulnerability previously identified by an IA team. There were multiple vulnerabilities, including High and Very High ones, found that had been in the information systems for a period of a year. The team failed to address these vulnerabilities in the standard days established; it was simply dismissed and forgotten. A Very High vulnerability should never be accepted, especially one that has the power to affect the financial sector. If it cannot be eliminated, the team should move to mitigate the impact of the vulnerability, and this can change it from a Very High to Moderate or Low risk, one that the company could accept. If the risk had been accepted, the system owner should have created the proper documentation for risk acceptance and had it approved by the appropriate authority (See Table 5).
Table 5. Risk matrix: likelihood of threat event resulting in event initiation (adversarial) (NIST, 2012).
Furthermore, it is essential that rigorous monthly vulnerability scans are conducted and for them to be correctly configured. The scans should have a range that has all assets, including all the IP space. Once the results are generated, provide them to the owner of the system to address the different vulnerabilities found. The system owner needs to apply the patches needed or act to eliminate the vulnerability through group policies, change of configurations, replacement of software, or others. If a vulnerability cannot be fixed at the moment, a feasible Plan of Action and Milestones (POA&M) needs to be created. It needs to include the mitigation factors that have been implemented, the actions that will take place, a completion date for when the vulnerability will be remediated, as well as supporting documentation. This was found to be a broken process, not being followed and even less, monitored.
Incident Response
As stated by Mansfield-Devine (2017), “organizations need to adopt a cyber-security posture that embraces both strong preventative measures along with the ability to respond effectively if the worst happens.” When the measurements taken to avoid risks fail, and a successful cyberattack takes place, addressing the situation in a timely and organized manner is crucial. Financial institutions need to have an up-to-date incident response plan, and personnel needs to be trained and capable to implement it when necessary. According to Cichonski, et al. (2012), the incident response process has four cycles: preparation, detection and analysis, containment, eradication and recovery, and post-incident activity (See Figure 3).
Figure 3. Incident response lifecycle (NIST, 2012).
The first step for a successful incident response plan is preparation. For this, appointed team members will work in the incident response plan management, to include the assignment of roles and responsibilities. This will be followed by table topics, where experts from different IT areas and leadership within the company are present. The table topics would include different scenarios, affecting the different networks. The goal of table topics is to gain a clear vision of what is the status of the different systems, how the communication would be handled if a system fails, and how prepared the team is to handle the different situations. At the end of each meeting, it is decided whether or not the company is conveniently prepared and what actions are needed to get it to where it should. These actions are to include personnel training, creation of SOPs, technical implementations, equipment replacement, and simulations.
A question to ask is not if an incident would occur but if the company is prepared to react. Once a cyber incident occurs, the next step is detection and analysis. In this phase, a cybersecurity team uses tools like IDPs, SIEMs, file integrity check software, and security logs for detection. Once the threat is successfully detected and validated, the scope of the incident is then determined, including an initial assessment of affected systems, data, origin, and methods.
The containment, eradication, and recovery steps follow. Acting in a timely manner is crucial in this phase. The affected information systems may need to disconnect from the network to contain the damage. Afterward, when the cause is determined, the threat needs to be completely removed from the information systems and the network. Once it is removed, it is essential to validate that the systems are free of corruption or any indication of damage. Actions like account management and patches application may happen in this phase.
The last step of the cycle before repeating is post-incident activity. This is mainly recognizing lessons learned from the incident. The team gathers all the information available, including the challenges encountered. The information compiled during this phase will be essential for the preparation phase to be better equipped to respond to future incidents. Research conducted by Grispos, et al., (2017) determined that many organizations that had security incidents failed to use the information as learning experiences; information obtained after an incident is unique and may benefit the organization.
Recommendations
Barney et al. (2018) concluded that "with the threat landscape constantly evolving in this industry, financial institutions can never be too prepared to address new emerging cyber risks." After summarizing the information gathered from the security incident, Homeland Security Representatives have recommendations for the FSS in order to mitigate future cyberattacks (See Tables 6,7).
US-CERT Best Practices to Mitigate Breach Risk |
Block all SMB protocols, as well as TCP ports 139 and 445 and UDP port 137. |
Block Web-based distributed authoring and versioning (WebDAV) protocol on border gateway devices. |
Monitor VPNs for abnormal activity. |
Segment critical networks and systems from business systems. |
Use only PowerShell v. 5 with advanced logging. |
Block external access for admin accounts. |
Implement two-factor authentication. |
Table 6. US-CERT Best Practices to Mitigate Breach Risk (Wayne, 2018)
Homeland Security Representative Security Recommendations for FSS |
Better oversight of the IA / cybersecurity programs is needed to ensure that vulnerabilities are identified and addressed. |
Legacy systems no longer supported by the vendors should be decommissioned and replaced by newer equipment. |
Patches to address known and emerging vulnerabilities. |
Employee training, including basic cybersecurity awareness for all employees and technical training for IT personnel. Cybersecurity is the responsibility of all company employees. Mandatory yearly training for basic cybersecurity awareness could reduce the risk of breach by reducing incidents like phishing and social engineering. It is important that the IT personnel are trained and capable of performing their duties, as well as being up to date about new cyber trends. |
A strong company cybersecurity culture is vital to achieve the confidentiality, integrity, and availability of our information systems. |
Table 7. Homeland Security Representative Security Recommendations for FSS.
Conclusion
National critical infrastructure sectors are interdependent upon one another; the FSS underpins the functioning of all critical infrastructure sectors. Unfortunately, the FSS is increasingly the target of sophisticated cyberattacks from various threats, including nation-states, in order to destabilize enemies and advance the interests of the attacker. It may be possible to determine the source of a cyberattack using nation-state TTP, possibly discouraging potential attacks via retaliation. It is vital to establish and continuously monitor secure networks in order to mitigate the risk of critical infrastructure breach. The efforts of many interested sectors, including financial services, law enforcement, intelligence agencies, and Homeland Security, are necessary to protect critical infrastructure, mitigate risk, and effectively respond to inevitable cyberattacks.
References
Archer, D. W. & Wick, A. (2013, July). Peer-to-peer enclaves for improving network defense
[sic]. Retrieved from https://timreview.ca/article/701
Ashford, W. (2019, July 31). Financial services top cyber attack target. Retrieved from
https://www.computerweekly.com/news/252467639/Financial-services-top-cyber-attack
-target
BizTech Staff. (2018, October 11). 5 ways banks can bulk up disaster recovery. Retrieved from
https://biztechmagazine.com/article/2018/10/5-ways-banks-can-bulk-disaster-recovery
Carnegie Endowment for International Peace. (2019). Timeline of cyber incidents involving
financial institutions. Retrieved from https://carnegieendowment.org/specialprojects
/protectingfinancialstability/timeline
Carr, M. (2016). Public–private partnerships in national cyber-security strategies. International
Affairs, 92(1), 43-62. Retrieved from https://www.chathamhouse.org/sites/default/files
/publications/ia/INTA92_1_03_Carr.pdf
Cotney, D. (2018, November 20). Perspective: financial sector at risk as cyber foes target
critical infrastructure. Retrieved from https://www.hstoday.us/subject-matter
-areas/infrastructure-security/perspective-financial-sector-at-risk-as-cyber-foes-
target-critical-infrastructure/
Financial Services Information Sharing and Analysis Center. (2019). Who we are. Retrieved
from https://www.fsisac.com/who-we-are
FireEye, Inc. (2019). Anatomy of Advanced Persistent Threats. Retrieved from
https://www.fireeye.com/current-threats/anatomy-of-a-cyber-attack.html
Geers, K., Kindlund, D., Moran, N., & Rachwald, R. (2014). World war c: understanding
nation-state motives behind today’s advanced cyber attacks. Retrieved from
https://www.fireeye.com/content/dam/fireeye-www/global/en/currentthreats/pdfs
/fireeye-wwc-report.pdf
Healey, J., Mosser, P., Rosen, K., & Tache, A. (2018). The Future of Financial Stability and Cyber Risk. The Brookings Institution Cybersecurity Project, October. Retrieved from https://www.brookings.edu/wp-content/uploads/2018/10/Healey-et-al_Financial-Stability-and-Cyber-Risk.pdf
Hughes, J., & Cybenko, G. (2013). Quantitative metrics and risk assessment: The three tenets model of cybersecurity. Technology Innovation Management Review, 3(8). Retrieved from https://timreview.ca/sites/default/files/article_PDF/HughesCybenko_TIM
Review_August2013.pdf
Jaganathan, V., Cherurveettil, P., & Muthu Sivashanmugam, P. (2015). Using a prediction model to manage cyber security threats. The Scientific World Journal, 2015. Retrieved from https://www.hindawi.com/journals/tswj/2015/703713/
Jensen, E. T. (2009). Cyberwarfare and precautions against the effects of attacks. Tex. L., Rev., 88, 1533. Retrieved from https://digitalcommons.law.byu.edu/cgi/viewcontent.cgi?
article=1224&context=faculty_scholarship
Lockheed Martin Corporation. (2019). The cyber kill chain. Retrieved from https://www.lockheedmartin.com/en-us/capabilities/cyber/cyber-kill-chain.html
Melton, M. (2018, May 21). Cybersecurity still keeps bank execs up at night. Retrieved from https://bankinnovation.net/allposts/biz-lines/payments/cybersecurity-still-keeps-bank-execs-up-at-night/
Mirchandani, B. (2018, August 28). Laughing all the way to the bank: cybercriminals targeting U.S. financial institutions. Retrieved from https://www.forbes.com/sites/bhaktimir
chandani/2018/08/28/laughing-all-the-way-to-the-bank-cybercriminals-targeting-us-financial-institutions/#434798c06e90
Moon, A. (2019, March 27). Report finds rise in state-sponsored cyber attacks on financial firms. Retrieved from https://www.insurancejournal.com/news/international/
2019/03/27/521824.htm
Nandikokur, G. (2019, August 8). Singapore sets cybersecurity requirements for banks. Retrieved from https://www.bankinfosecurity.asia/singapore-sets-cybersecurity-requirements-for-banks-a-12891
National Institute of Standards and Technology, U.S. Department of Commerce. (2019). National Vulnerability Database NVD Dashboard. Retrieved from https://nvd.nist.
gov/general/nvd-dashboard
National Institute of Standards and Technology, U.S. Department of Commerce. (2019). NVD CWE Slice. Retrieved from https://nvd.nist.gov/vuln/categories
Osborne, C. (2015, June 2). Financial sector takes up to 176 days to patch security flaws. Retrieved from https://www.zdnet.com/article/financial-sector-takes-176-days-on-average-to-patch-security-vulnerabilities/
Pavate, A. & Nerurkar, P. (2014, February). Performance analysis of cloud based penetration testing tools. International Journal of Engineering Research & Technology, 3(2). Retrieved from https://content.umuc.edu/file/6aa8bfb8-7053-4fed-94f6-2547e454c501/1/web/viewer.html?file=https://content.umuc.edu/file/78786842-34dd-4b71-adf9-c874d276102e/1/PerformanceAnalysisofCloudBasedPenetrationTesting
Tools.pdf
Quinn, C. (2018). The Emerging Cyberthreat: Cybersecurity for Law Enforcement. Police Chief online. Retrieved from https://www.policechiefmagazine.org/the-emerging-cyberthreat-cybersecurity/
Randazzo, M. R., Keeney, M., Kowalski, E., Cappelli, D. M., & Moore, A. P. (2005). Insider threat study: Illicit cyber activity in the banking and finance sector. Retrieved from https://kilthub.cmu.edu/articles/Insider_Threat_Study_Illicit_Cyber_Activity_in_the_Banking_and_Finance_Sector/6574517
Saraydayran, J., Benali, F., & Paffumi, L. (2011). A Survey on new Threats and Countermeasures on Emerging Networks. Intrusion Detection Systems, 195. Retrieved from http://cdn.intechweb.org/pdfs/14364.pdf
Schaffer, P. (2018, March 20). The cost of a cybersecurity breach for financial institutions. Retrieved from https://www.itspmagazine.com/from-the-newsroom/the-cost-of-a-cybersecurity-breach-for-financial-institutions
Schwartz, M. J. (2019, August 7). North Korean hacking funds WMD programs, UN report warns. Retrieved from https://www.bankinfosecurity.com/north-korean-hacking-funds-wmd-programs-un-report-warns-a-12884
Souppaya, M. & Scarfone, K. (2013, July). Guide to malware incident prevention and handling for desktops and laptops [Special Publication 800-83, Revision 1]. National Institute of Standards and Technology, U.S. Department of Commerce. Retrieved from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-83r1.pdf
Souppaya, M. & Scarfone, K. (2012, February). Guidelines for securing wireless local area networks (WLANs) [Special Publication 800-153]. National Institute of Standards and Technology, U.S. Department of Commerce. Retrieved from https://csrc.nist.gov/
publications/detail/sp/800-153/final
SpeedTest. (2019, June). SpeedTest Global Index China. Retrieved from https://www.speedtest.net/global-index/china
SpeedTest. (2019, June). SpeedTest Global Index India. Retrieved from https://www.speedtest.net/global-index/india
SpeedTest. (2019, June). SpeedTest Global Index Iran. Retrieved from https://www.speedtest.net/global-index/iran
SpeedTest. (2019, June). SpeedTest Global Index Israel. Retrieved from https://www.speedtest.net/global-index/israel
SpeedTest. (2019, June). SpeedTest Global Index Pakistan. Retrieved from https://www.speedtest.net/global-index/pakistan
SpeedTest. (2019, June). SpeedTest Global Index Russia. Retrieved from https://www.speedtest.net/global-index/russia
SpeedTest. (2019, June). SpeedTest Global Index South Korea. Retrieved from https://www.speedtest.net/global-index/south-korea
SpeedTest. (2019, June). SpeedTest Global Index Syria. Retrieved from https://www.speedtest.net/global-index/syria
SpeedTest. (2019, June). SpeedTest Global Index United States. Retrieved from https://www.speedtest.net/global-index/united-states#fixed
Stadnik, W. (2019). The changing face of disaster recovery for financial institutions. Retrieved from https://disaster-recovery.cioreview.com/cxoinsight/the-changing-face-of-disaster-recovery-for-financial-institutions-nid-9586-cid-106.html
Stonefly. (2017, October). Business continuity and disaster recovery for financial services providers. Retrieved from https://stonefly.com/blog/business-continuity-disaster-recovery-financial-services
SWIFT. (2019). About us. Retrieved from https://www.swift.com/about-us
SWIFT. (2019, February 12). The evolving cyber threat to the global banking community. Retrieved from https://www.swift.com/news-events/news/the-evolving-cyber-threat-to-the-global-banking-community
SWIFT & BAE Systems. (2017). The evolving cyber threat to the banking community. Retrieved from https://www.baesystems.com/en/cybersecurity/feature/the-evolving-cyber-threat-to-the-banking-community
UMGC. (n.d.). Contingency planning for disaster recovery. Retrieved from https://lti.umuc.edu/contentadaptor/topics/byid/6a06f595-0225-494f-aa5e-713213cf47e5
UMGC. (n.d.). Cyber security awareness month – day 31 – business continuity and disaster recovery. Retrieved from https://content.umuc.edu/file/6aa8bfb8-7053-4fed-94f6-2547e454c501/1/web/viewer.html?file=https://content.umuc.edu/file/11c0a5ee-479b-45b0-a42b-512032d68ed3/1/CyberSecurityAwarenessMonthDay31BusinessContinuity
andDisasterRecovery.pdf
UMGC. (n.d.). Encryption technologies: pros and cons. Retrieved from https://lti.umuc.edu/contentadaptor/topics/byid/ab3e322d-23c1-4e51-80d2-368ef5a3c143
U.S. Department of Homeland Security. (n.d.). Financial services sector. Retrieved from https://www.dhs.gov/cisa/financial-services-sector
U.S. Department of Homeland Security. (2013). NIPP 2013 Partnering for critical infrastructure security and resilience. Retrieved from https://www.dhs.gov/sites/default/
files/publications/national-infrastructure-protection-plan-2013-508.pdf
U.S. Department of the Treasury, Office of Financial Research. (2017, December 5). 2017 Annual report to congress. Retrieved from https://www.financialresearch.gov/annual-reports/files/OFR_AR2017_Ch2.pdf
U.S. Department of the Treasury, U.S. Department of Homeland Security, Financial Services Sector Coordinating Council, & Financial and Banking Information Infrastructure Committee. (2015). Financial services sector-specific plan 2015. Retrieved from https://www.dhs.gov/sites/default/files/publications/nipp-ssp-financial-services-2015-508.pdf
The Web Application Security Consortium. (n.d.). Improper Input Handling. Retrieved from
http://projects.webappsec.org/w/page/13246933/Improper%20Input%20Handling

Get help from top-rated tutors in any subject.
Efficiently complete your homework and academic assignments by getting help from the experts at homeworkarchive.com