Network Security Monitoring Processes
Please look at the killing with keyboards file then answer the following questions in the context of the best practice concepts covered in chapter 11 and the security professional proficiencies covered in chapter 13. Identify what is at risk here, 5 possible threats and 5 vulnerabilities in this scenario. Analyze measures that could be taken to reduce the risks.
Attached
Killing with Keyboards Websites, Blogs and Other Sources
of Program Information and Identity Theft
Meet Chris Husband, father of two, weekend little league coach He is a talented and dedicated engineer for Bright Company
In the year 2010 Chris will kill 238 U.S. Soldiers
because of a decision he made tonight
On rare occasions At night Chris will log on to engineering community web sites and blogs, just to stay current with the industry
EaglesFan54
Chris works for a defense contractor and has listened to all of the security briefings. He knows to be careful about what he tells anyone.
Chris never uses his name and rarely posts anything at all. When he does, he only uses his on-line name.
09/13/2004EaglesFan54 I know for a fact that WIRENUT207 is dead wrong, but I cant say how I know. You really need to go back and get some updated information, but thats all I can say about it.
05/11/2005EaglesFan54 Kyle Boldgers new book Beyond Advanced Electronics is by far the best industry book I have read in 10 years. Everyone should check it out.
02/18/2006EaglesFan54 I dont agree at all that the HLT5807 chip is out of favor. Even the military uses it on their major new programs.
Meet Alice She is 16, and for the last two years her government has been teaching her English Alice has done well, so eight months ago they started to teach her to use a computer and to search the Internet
Just like every day, Alice is using Google today. Searching for words and phrases from a list her government gave her.
Alices favorite English word is Google
Alice knows if she works hard for five years and creates lots of files for her government, they will move her family to a nicer apartment and maybe even send her to more school.
Today, Alice found Chris
02/18/2006EaglesFan54 I dont agree at all that the HLT5807 chip is out of favor. Even the military uses it on their major new programs.
USA-15-4138
The day started great for Chris The team he leads hit a major program milestone, and each was given an unexpected performance bonus. For Chris it was one step closer to his retirement fishing cabin.
Yet another half day spent in a quarterly security update briefing. Chris promised his team he would talk to senior management about not wasting their time on these anymore.
And then the day went bad
It did give the team an excuse to get some good coffee for a change
After the briefing his team walked across the parking lot to the new American Tea that was just built. It catered to the large Bright Co. team that worked at their site.
While in line Chris complained to one of his team, Do they really think a person with a Secret clearance needs to be reminded about this stuff? And no one goes dumpster-diving any more! These security guys have no clue what theyre talking about.
Chris was still angry about the briefing
The store offered free Wi-Fi (wireless Internet access), six free small quiet rooms to make phone calls,
and a 15% discount to Bright Company employees (just show your employee badge at the time of purchase).
It was a great place to unwind
Alices progress was slow and steady Her group leader often repeats that the searchers need to be very patient. It may take weeks to find something important, but each petal helps you identify the flower it came from.
Each piece of the puzzle provides a new search opportunity
EaglesFan54
09/13/2004 EaglesFan54 I know for a fact that WIRENUT207 is dead wrong, but I cant say I how I know. You really need to go back and get some updated information, but thats all I can say about it.
05/11/2005 EaglesFan54 Kyle Boldgers new book Beyond Advanced Electronics is by far the best industry book I have read in 10 years. Everyone should check it out.
02/18/2006 EaglesFan54 I dont agree at all that the HLT5807 chip is out of favor. Even the military uses it on their major new programs.
I cant say how I know
Book suggestion: Beyond Advanced Electronics
military and major new programs
Eagles Beyond Advanced Electronics
Alice followed the information from one website to another
What seemed like unimportant information from one site was the start of the Google search leading to other sites.
Chris Raddick Philadelphia, PA
I cant say how I know
Book suggestion: Beyond Advanced Electronics
Customer ReviewsGreat Industry Read, May 7, 2005
Reviewer: Chris Raddick The #1 Eagles Fan (Philadelphia, PA) – See all my reviews
Even items which are now deleted from web sites can still be searchable within the Google cache (history)
Chris Raddick Philadelphia Eagles
The search results produced even more new sources to follow
Email: Chris Raddick [email protected], Phone: (215) 555-1784; Email: Beth Raddick [email protected], Phone: (215) 555-3159 www.payouthleagefootball.net/division1/parentlisting.html
Web Youth League Families Philadelphia Little Eagles
Chris whole team from Bright celebrated Bright Night with players from the Eagles. The company sponsored night. www.cableco.com/alltheraddicks.com/brightnight.htm
The Raddick Family Bright Night with the Eagles
MySpace Profile – Kyle Raddick, 16 years old, Male, Philadelphia, PA www.myspace.com/kyleraddick
Chris Raddick
Beth Raddick
Kyle Raddick
Chris Raddick (215) 555-1784 (cell phone?) [email protected] (employer?)
Kyle Raddick, 16 (son?) MySpace (blog) website
Beth Raddick (wife?) (215) 555-3159 (home phone?)
[email protected] alltheraddicks.com (website?)
Chris with Kelli BrightChris with Kelli Bright
Chris Raddick Philadelphia Eagles
Each new site produces more information Web
Chris whole team from Bright celebrated Bright Night with players from the Eagles. The company sponsored night. www.cableco.com/alltheraddicks.com/brightnight.htm
The Raddick Family Bright Night with the Eagles
Family and club web sites can be used to find new information or confirm data
The Bright StarsThe Bright Stars
Bright Company sponsored
Bright Company sponsored
Bright Night with the Eagles
Bright Night with the Eagles
Beth making new friends!
Beth making new friends!
Reverse Phone Number Search (215) 555-1784
The information was all there, on sites Chris had never visited or posted
information to Results 1 listing matching (215) 555-1784
Christopher Raddick 1359 Lost Way Philadelphia, PA (215) 555-1784
Search Again Modify Search Printer Friendly Results 1 listing matching (215) 555-3159
Elizabeth Raddick 1359 Lost Way Philadelphia, PA (215) 555-3159
Search Again Modify Search Printer Friendly
And eventually Alice was done searching
Chris Raddick
Beth
Kyle
www
www
www www
www
www
www
www
www Bright
Co.
It was a great day for Alice Her leader rewarded Alice for completing her 200th file. She was allowed to recommend a family member to join her at school. Soon Alice would have the honor of teaching her thirteen year old sister all she had learned about computers and Google.
The information about Chris was now available for use as needed
USA-15-4138
Christopher (Chris) Allen Raddick, Born 1954 Married, two children (see family attachment) 1359 Lost Way, Philadelphia, PA; Ph. cell 215.555-1784 Employed: Defense Contractor, The Bright Co. Engineer, Sports Teams: Eagles football; Childrens Sports Coach; Drinks Alcohol; Sails; Water-skis; Home Mortgage, $234,177; First Federal Bank; Vehicles: 2004 Chevrolet Camaro, 1999 Volvo Wagon
In early 2008 Alices government became aware that a vulnerability exists in technology which may have been integrated into certain U.S. defense projects. To benefit from the information, they needed to know for sure.
Later that same year, Chris attended an for defense and related industries.
Although held at the unclassified level, conference attendance was very restricted. Every attendee required a government sponsor.
The hotel conference center had guards outside the meeting rooms, and conference badges had to be worn when attending sessions.
Chris sat in the hotel bar He was tired after four days of conference At the other end of the bar Chris noticed a guy wearing an Eagles hat. He had seen him several times around the hotel in the last several days. In the restaurant, lobby and elevators. Chris walked over. Eagles! In this town? Chris said. I know, Im getting grief from everyone, the man replied. Not from me. Im actually a diehard Chris said. Youre kidding me! The man introduced himself as Tom. Well thats definitely worth a beer, Tom said smiling. Greatly appreciated, Chris said. You at the conference? Tom nodded. First week out of my lab in two years. Chris grinned. DOD project? Chris asked, drinking his beer. Sorry, cant say, Tom replied. You know, that always sounds bad no matter how you say it. Nothing personal. Chris smiled No problem. Really, I totally understand.
Tom insisted on buying dinner They talked sports and generally about work, careful not to say too much.
Tom bought a second pitcher of beer, reminding Chris that Toms company was more than happy to pay his expense account since he traveled so rarely.
I was actually hoping to hear if anyone else was thinking of using Claridens new Digital Signal Processors, Tom mentioned casually. I hate being the first program to use a new chipset. Dont worry then, Chris said, Army is using them. Tom grinned. You must be working on that new Army program. Cant say, Chris said smiling, but you definitely dont need to worry that your program will be the first military program to use it.
Dinner was now over Tom was very pleased that it has gone so smoothly. He had the confirmation he needed, and would even be able to contact Chris again if need be.
He had told Chris that he had to leave the conference the next morning to catch an early flight. No risk of having to explain why he was not registered to attend the conference.
Tom never even had to threaten Chris with the picture in his pocket, designed to show Chris how close Toms supporters had come to using Chris family as motivation.
2009 was a very good year!
Kyle Raddick, Chris and Beths oldest son had joined the Army. They were very proud of him. Chris took extra pride in knowing what he contributed to the success of the Armys new system.
For Chris and his family…
For Alices government… Alices government used the information they had developed from Chris about the system vulnerability to trade with another government, who was very interested in using it against the United States.
In the year 2010
Chris will lie in bed and watch the news tonight, and worry about the life of his son.
What will you do the next time all of those security warnings seem like they apply
only to someone else.
Another 238 U.S. Soldiers were killed.
Five Discussion
Topics
The information and scenarios in the were all true. The characters and the vulnerability were
the only fiction
I am no one they care about That may be true for now, but you never know when one on-line posting will bring YOU to their attention.
Chris was just another name in a file until they needed some inside information about his program. It never occurred to him that an intelligence agency would target him for a piece of information, but they did.
Some things to think about Chris had no idea that just confirming that the Clariden DSP chip was in use would be enough to hurt or kill. But that one small piece of information was the last piece in the puzzle that the enemy was putting together.
While Chris thought he was careful, it is difficult to know exactly what an adversary is looking for, and if what you have may be of benefit.
1
I dont have ANY adversaries! Feel like all of this war and terrorist or adversary talk is about someone else?
Take a quick look at some other groups that use these exact same on-line information gathering techniques.
Some things to think about Former girlfriends, boyfriends, divorced spouses. Angry neighbors, people you only knew casually. Disgruntled co-workers, employees, temporary workers.
Identity thieves. (Try a Google search on your name.) Pedophiles seeking information to convince your children that they should be trusted
Anyone else who might want a little information about you, even just to know you better than you want them to.
2
Im smarter than the enemy Its a common feeling. People interviewed often say they know they are smarter than some guy who is now just sitting in a cave hiding from us.
Chris knew he was smarter than any adversary when he used careful expressions like, I cant say how I know.
Some things to think about In addition to small radical groups, our adversaries are some of the largest nations in the world, who are willing to spend BILLIONS of dollars to gain an economic advantage. Information theft is a good investment for them, even if they just trade it for something they want.
Some of the worlds best intelligence agencies are training young people as experts to go and gather information for them. You are up against the experts!
3
I dont post on the Internet Not posting may help you somewhat, but it is just one example of how you can come to the attention of someone with bad intentions.
Another source is unencrypted email messages which are either misrouted, intercepted, or gathered by adversaries on discarded or poorly protected backup tapes. Stealing backup tapes is a common occurrence.
Some things to think about Remember that Chris did not know about all of the information sources that had information about him. He only thought about the sites he dealt with. Most of the others you dont have control over, but you do have control to encrypt email and post as little account information as you can on web sites.
4
What about the Coffee Shop? The coffee shop was a reminder that while there are good business reasons to target defense contractors, etc., as customers, those methods are also good ways to gather sensitive information. Most front businesses will not be called Terrorist Coffee so you need to pay attention to the less obvious.
Some things to think about Free Internet also provides a way to capture network traffic, including personal email passwords that are often similar to work passwords. Every puzzle piece helps them. Free Quiet Rooms encourage sensitive conversations in rooms that may have listening devices. By showing a badge, bad guys know any time a facility changes its badge, and when new security like smart chips are rolled out. If they have infiltrated a facility, they know to update their fake badges by the next day.
5
Dont feel hopeless
Increasing your awareness that you really are a potential target, remembering that being clever in a conversation or email is very likely to fail, limiting what you can on the Internet, and encrypting all email
and drive storage you are able to Really can make the difference!
This briefing was developed by Raytheon in conjunction with
The Boeing company Future Combat Systems Office of the CIO, for Policy and Standards.
In addition
We would like to acknowledge the
National Security Agencys IOSS www.IOSS.gov
For their leadership and training which inspired the idea for this series
Are you busy and do not have time to handle your assignment? Are you scared that your paper will not make the grade? Do you have responsibilities that may hinder you from turning in your assignment on time? Are you tired and can barely handle your assignment? Are your grades inconsistent?
Whichever your reason is, it is valid! You can get professional academic help from our service at affordable rates. We have a team of professional academic writers who can handle all your assignments.
Students barely have time to read. We got you! Have your literature essay or book review written without having the hassle of reading the book. You can get your literature paper custom-written for you by our literature specialists.
Do you struggle with finance? No need to torture yourself if finance is not your cup of tea. You can order your finance paper from our academic writing service and get 100% original work from competent finance experts.
Computer science is a tough subject. Fortunately, our computer science experts are up to the match. No need to stress and have sleepless nights. Our academic writers will tackle all your computer science assignments and deliver them on time. Let us handle all your python, java, ruby, JavaScript, php , C+ assignments!
While psychology may be an interesting subject, you may lack sufficient time to handle your assignments. Don’t despair; by using our academic writing service, you can be assured of perfect grades. Moreover, your grades will be consistent.
Engineering is quite a demanding subject. Students face a lot of pressure and barely have enough time to do what they love to do. Our academic writing service got you covered! Our engineering specialists follow the paper instructions and ensure timely delivery of the paper.
In the nursing course, you may have difficulties with literature reviews, annotated bibliographies, critical essays, and other assignments. Our nursing assignment writers will offer you professional nursing paper help at low prices.
Truth be told, sociology papers can be quite exhausting. Our academic writing service relieves you of fatigue, pressure, and stress. You can relax and have peace of mind as our academic writers handle your sociology assignment.
We take pride in having some of the best business writers in the industry. Our business writers have a lot of experience in the field. They are reliable, and you can be assured of a high-grade paper. They are able to handle business papers of any subject, length, deadline, and difficulty!
We boast of having some of the most experienced statistics experts in the industry. Our statistics experts have diverse skills, expertise, and knowledge to handle any kind of assignment. They have access to all kinds of software to get your assignment done.
Writing a law essay may prove to be an insurmountable obstacle, especially when you need to know the peculiarities of the legislative framework. Take advantage of our top-notch law specialists and get superb grades and 100% satisfaction.
We have highlighted some of the most popular subjects we handle above. Those are just a tip of the iceberg. We deal in all academic disciplines since our writers are as diverse. They have been drawn from across all disciplines, and orders are assigned to those writers believed to be the best in the field. In a nutshell, there is no task we cannot handle; all you need to do is place your order with us. As long as your instructions are clear, just trust we shall deliver irrespective of the discipline.
Our essay writers are graduates with bachelor's, masters, Ph.D., and doctorate degrees in various subjects. The minimum requirement to be an essay writer with our essay writing service is to have a college degree. All our academic writers have a minimum of two years of academic writing. We have a stringent recruitment process to ensure that we get only the most competent essay writers in the industry. We also ensure that the writers are handsomely compensated for their value. The majority of our writers are native English speakers. As such, the fluency of language and grammar is impeccable.
There is a very low likelihood that you won’t like the paper.
Not at all. All papers are written from scratch. There is no way your tutor or instructor will realize that you did not write the paper yourself. In fact, we recommend using our assignment help services for consistent results.
We check all papers for plagiarism before we submit them. We use powerful plagiarism checking software such as SafeAssign, LopesWrite, and Turnitin. We also upload the plagiarism report so that you can review it. We understand that plagiarism is academic suicide. We would not take the risk of submitting plagiarized work and jeopardize your academic journey. Furthermore, we do not sell or use prewritten papers, and each paper is written from scratch.
You determine when you get the paper by setting the deadline when placing the order. All papers are delivered within the deadline. We are well aware that we operate in a time-sensitive industry. As such, we have laid out strategies to ensure that the client receives the paper on time and they never miss the deadline. We understand that papers that are submitted late have some points deducted. We do not want you to miss any points due to late submission. We work on beating deadlines by huge margins in order to ensure that you have ample time to review the paper before you submit it.
We have a privacy and confidentiality policy that guides our work. We NEVER share any customer information with third parties. Noone will ever know that you used our assignment help services. It’s only between you and us. We are bound by our policies to protect the customer’s identity and information. All your information, such as your names, phone number, email, order information, and so on, are protected. We have robust security systems that ensure that your data is protected. Hacking our systems is close to impossible, and it has never happened.
You fill all the paper instructions in the order form. Make sure you include all the helpful materials so that our academic writers can deliver the perfect paper. It will also help to eliminate unnecessary revisions.
Proceed to pay for the paper so that it can be assigned to one of our expert academic writers. The paper subject is matched with the writer’s area of specialization.
You communicate with the writer and know about the progress of the paper. The client can ask the writer for drafts of the paper. The client can upload extra material and include additional instructions from the lecturer. Receive a paper.
The paper is sent to your email and uploaded to your personal account. You also get a plagiarism report attached to your paper.
PLACE THIS ORDER OR A SIMILAR ORDER WITH US TODAY AND GET A PERFECT SCORE!!!
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Nursing Area is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download