StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Advanced Persistent Threats against RSA Tokens - Essay Example

Cite this document
Summary
The paper 'Advanced Persistent Threats against RSA Tokens' tells that Today, where every technology interrelated to Information technology involves the ‘.com’ phenomenon; the Internet is relatively an evolving field. Extensive use of computing technology has aid different scale organizations to achieve targets…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER96.1% of users find it useful
Advanced Persistent Threats against RSA Tokens
Read Text Preview

Extract of sample "Advanced Persistent Threats against RSA Tokens"

? Full Paper Introduction Today, where every technology interrelated to Information technology involves the ‘.com’ phenomenon; Internet is relatively an evolving field, which is constantly changing. Extensive use of computing technology has aid different scale organizations to achieve targets. Every now and then, there is a news of a major security breach resulting in an invasion of personal privacy data such as credit card details, emails and vice versa. In spite of securing the networks, workstations and data centers, with the most updated and advanced security modules, there is still a probability of a new threat to break into the network and void data integrity. In addition, hackers and cyber criminals are exploring efficient codes day by day to advance the hacking tools, in order to breach in to classified information, banks and website customer details, steal emails etc. In the end, the mission critical data are compromised, resulting in severe losses for organizations. In this report we will focus on digital signatures and their importance as well as the history, current state, and challenges that still need to be overcome. Vulnerabilities Existed in the System / Attack Methods Computer network intrusions are becoming very sophisticated and advanced and they have enforced a challenge for modern computer network based organizations. Likewise, a new class of challengers called now as ‘Advanced Persistent Threats’ (APT) demonstrates a well-planned and sponsored, highly skilled hackers targeting highly classified data for gaining competitive edge specifically in corporate businesses, law firms, military networks, national or international politics (Cole, 2012). Likewise, these highly skilled cyber criminals utilize sophisticated tools and methods that are constructed to disrupt computer network defense semantics without being detected. As per Mr. Mike Cloppert, is a Co-Chair of the cyber threat intelligent summit says that the cyber threat intelligence can facilitate organizations to maintain an information classification and protection mechanism based on the priorities of these cyber criminals. As a result, the likelihood of success for these hackers will become low. Moreover, organizations can than plan accordingly for the targeted information and can counter these complex advanced persistent threats. Information security management team requires authentic and on time information for constantly monitoring new and potential threats and techniques. Likewise, exploiting the received information will improve a resilient defense posture of an organization. The number of RSA tokens implemented up till now exceeds 40 million and another 250 million are mobile software, as that leads the market for enabling two factor authentications (Dumas, 2012). Likewise, in two factor-authentications, password is generated that grants access to users on the network. The RSA token are common in financial institutions and government agencies for processing transactions. Three Methods to Protect against APT The Chief Security Officer for a corporate organization will adopt a common defense strategy that will lead to preparation of business and mitigating risks, as per IT security authorities. However, some of the APT for example Stuxnet integrates a portfolio of penetration methods and techniques. These combined penetration methods can be countered individually and can be easily defended. By practicing the baselines effectively will enable baseline security that will minimize the likelihood of hackers or cyber criminals managing a vulnerability management mechanism, security patch management for keeping security patches up to data and continuous monitoring of the IT security architecture for the organization’s infrastructure. Likewise, adopting best practices will facilitate organizations to perceive APT’s to some extent and other attempts such as hacking or human threats intentional/ un-intentional can be detected and prevented. Moreover, for protection against APT’s, a in depth defense mechanism along with advanced detection techniques, a resilient APT incident response planning and recovery planning along with security awareness session is essential. These practices will prepare organization to counter these advanced threats. Adopting a standard and certifying such as ISO27001 certification will also ensure protecting the Confidentiality Integrity and Availability of data within the organization. There are certain requirements to fulfill before achieving the certification such as establishing and maintaining an asset register, establishing and maintaining risk management plan, establishing and maintaining statement of applicability, establishing and maintaining configuration and record management, establishing and maintaining Business Continuity Plan etc. furthermore, effective policies and procedures along with guidelines must be in place in accordance to the ISO27001 standard. For maintaining effectiveness, security awareness sessions and surveillance internal audits are conducted to measure the compliance for each business functions that is available in the ISO27001 scope (Calder, 2005). Types of Technologies would Help Alleviate the Problems It is very important for organizations to review the assets marked as critical in the risk register. The executive and senior management along with the corporate communication function need communication for ensuring the PR messages are submitted for lowering the damage to the brand. Everyone from top to bottom, designation wise, must be trained and aware of the latest security trends in order to report incident within the organization. Likewise, everyone should be aware of security risks associated with any incident or potential attacks and their consequences. As mentioned earlier, if the organization certifies to one of the information security standards such as ISO27001, policies, procedures and adequate controls will be implemented. Advanced Persistent Threats have already exploited vulnerabilities in corporate organizations such as RSA, Iran’s nuclear reactors, Google incorporated and Sony Corporation as well. It is obvious that no one is safe from these intelligent and customized attacks tailored only for disrupting businesses and makes them suffer. These threats can be countered individually by making an intelligent defense mechanism. Three Techniques for Protection against APT As stated by the IT security specialist, the three methods are suggested in order to defend (Advanced Persistent Threat) APT risk in large organizations. In fact, simple security techniques cannot provide required protection for large organizations for APT as the threats are getting stronger. The advanced threats are the combination of high infiltration procedures. The main objective of most APTs is to obtain zero-day vulnerabilities for instance, the APTs like Stunxnet. However, these threats are detectable if considered independently. In addition, the techniques that are used by many advanced threats are well known and can be defend easily. In order to reduce the risk of possible threats, the organizations along with IT security providers must maintain proper level of security, updating security patches and frequent testing of security bearings. This will help an organization to identify the number of APTs, system hacking or accidental security breaches. Moreover, organizations must have an in-depth defense analysis for possible threats, on time risk identification capabilities, incident response map regarding APT, security training sessions and an incident recover map. This will help the organization to deal with the threats and to respond rapidly over the ongoing problem in order to save the asset from possible security threat. In addition, the organizations have to conduct re-evaluation procedures to reduce future security breaches. Furthermore, business procedures are made to reduce future risk. This can be implemented by correct allocation of finances and resources for the defense of expensive assets present in the organization. The security breach in RSA was accomplished by obtaining SecurID through phishing emails. The RSA has revealed that the security lapse is accomplished via formerly develop unpatched Adobe Flash hole. The emails were sent to the lower grade officers with the subtitle named “2011 Recruitment Plan”. The Elinor Mills, head of new technologies related to consumer identity protection at RSA wrote in his blog that the hackers sent these phishing emails last mint within the period of two days. These phishing emails contain Excel file attachments that states that the hacker has implemented a customized remote administration tool that is called as Poison Ivy Remote Administration Tool (Varsalone & McFadden, 2011). Likewise, this tool grants external remote administration request for accessing the system. Moreover, after gaining access, the hacker may execute many commands on the hacked system. This is a more common attack that is difficult to detect. The attack on RSA is known as APT i.e. Advance Persistent Threat. In addition, these types of threats mainly focus on the source code and other useful data to collapse organizations valuable network operations and IT infrastructure. These kinds of attackers gather information for several months before final attack. However, these times the attack was identified as well as defends by the RSA and their team. The head of new technologies and consumer identity protection says, “Since RSA detected this attack in progress, it is likely the attacker had to move very quickly to accomplish anything in this phase.” These threats are sent through emails or other social networks. The attackers use key loggers, snooping techniques to target specified employees. Furthermore, the attackers are using an unpatched hole through which they enter into company’s computer as stated by Google and several other organizations. These attackers were identified in China and used internet explorer to steal organizations valuable assets. References Cole, E. (2012). Advanced persistent threat : Understanding the danger and how to protect your organization. Burlington: Elsevier Science. Calder, A. (2005). The case for ISO 27001 IT Governance Ltd. Dumas, B. M. (2012). Information technology and society Taylor & Francis. Varsalone, J., & McFadden, M. (2011). Defense against the black arts: How hackers do what they do and how to protect against it Taylor & Francis. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Case Study 1: Advanced Persistent Threats Against RSA Tokens Essay”, n.d.)
Case Study 1: Advanced Persistent Threats Against RSA Tokens Essay. Retrieved from https://studentshare.org/information-technology/1487464-case-study
(Case Study 1: Advanced Persistent Threats Against RSA Tokens Essay)
Case Study 1: Advanced Persistent Threats Against RSA Tokens Essay. https://studentshare.org/information-technology/1487464-case-study.
“Case Study 1: Advanced Persistent Threats Against RSA Tokens Essay”, n.d. https://studentshare.org/information-technology/1487464-case-study.
  • Cited: 0 times

CHECK THESE SAMPLES OF Advanced Persistent Threats against RSA Tokens

Security risks to on-line banking and e-commerce

Even though, many online-businesses have nowadays implemented strong technologies that monitor their networks against suspicious activities but this does not guarantee that hackers will not succeed and most of the times, it is too late to know as heavy damage has already been done.... Different types of online attack methods and tools have also been overviewed as well as the remedies to avoid threats.... Moreover, different types of online attack methods and tools have also been overviewed as well as the remedies to managing and avoiding such threats....
46 Pages (11500 words) Coursework

The Quality of Service Provided by the Integrated Services Architecture

The paper "The Quality of Service Provided by the Integrated Services Architecture" defines the ways the HTTP protocol attempts to improve performance for HTTP applications, advantage introduced by pipelining, a conditional GET request, three different Internet protocols for email retrieval, etc....
28 Pages (7000 words) Assignment

Unified Threat Management: A Defensive Suite for the 21st Century

It is no longer the 1990s, where the omnipresent and singular concern was… Even individual end-users behind home networks face a bevy of threats from spam, scammers, fraudulent offers, spyware (whether illicit or created by “legitimate” companies), malware, viruses, keyloggers, identity theft, credit and debit card interceptions and fraud, and Making distinctions between these threats is often an exercise in futility: Thus, the birth of the UTM movement....
13 Pages (3250 words) Essay

Hackers Gain Access to RSAs SecurID Tokens

From analyzing the statements of RSA's CEO it is clear that they were aware of advanced persistent threats for some time.... The article “Hackers Gain Access to RSA's SecurID tokens” reveals that hackers have breached the security of the renowned security and cryptography Company RSA.... Also, the statements made by RSA's CEO at the RSA Security Conference in San Francisco earlier this year describes that such attacks as part of an evolving threat landscape that has shifted from wholesale crime to targeted attacks that steal high-value information (Jackson, Hackers gain access to RSAs SecurID security tokens, 2011)....
2 Pages (500 words) Essay

Security Risks to On-line Banking and E-commerce

hellip; From this paper, it is clear that many online-businesses have nowadays implemented strong technologies that monitor their networks against suspicious activities but this does not guarantee that hackers will not succeed and most of the times, it is too late to know as heavy damage has already been done.... Even though many online-businesses have nowadays implemented strong technologies that monitor their networks against suspicious activities but this does not guarantee that hackers will not succeed and most of the times, it is too late to know as heavy damage has already been done....
41 Pages (10250 words) Essay

Defining Provocation and Its Historical Context

This study will examine the law on provocation and the developmental changes within the law that are now operative when relying on this as a defense.... The study will also look at the historical use of provocation in order to compare this with the modern day application of the defense.... hellip; It is anticipated that this study will reveal that provocation as a defense is not clearly and consistently applied and that the court will take many factors into account when deciding whether to accept the defense of provocation....
39 Pages (9750 words) Essay

What Are Advanced Persistent Threats and How to Prevent Them

This research paper "What Are advanced persistent threats and How to Prevent Them" focuses on modern information technology and cybersecurity threat.... APTs have grabbed international headlines due to their ability to effectively target both enterprises as well as governmental networks which can generate considerable national security threats....
20 Pages (5000 words) Research Paper

Development of a Classroom Token Economy

List of ReinforcersReinforcements are the meaningful objects, privileges, and activities that individuals exchange for their tokens.... Upon successful initiation of the program, the tokens should be reduced gradually to allow the target to display the desired behavior or task independently without the use of tokens.... The students should be able to exchange their tokens for something attractive and desirable and they should be allowed to choose their own rewards....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us