CST 610: Cyber Threats and Exploitation in Financial Systems Project

Verified

Added on  2022/08/24

|11
|792
|22
Project
AI Summary
Read More
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
C S T 6 1 0 9 0 4 3
CY B E R S PA C E A N D
C Y B E R S E C U R I T Y
F O U N D AT I O N
N A M E O F T H E S T U D E N T
N A M E O F T H E U N I V E R S I T Y
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
NETWORK SECURITY:
The network security stands for all of the
procedures and policies which is used by a
network administrator for mitigating the risks
that can come to a network. It includes policies
for recording and finding a possible breach and
policies that is needed to make response to the
events (Perlman, Kaufman & Speciner, 2016).
Document Page
MISSION CRITICAL SYSTEMS:
There are various mission critical components
that are included:
Perimeter router
DMZ
DNS server
Web server
Email server
Central switches.
Document Page
PENETRATION TESTING:
The pen testing can process automatically with the help of
software applications or it can be performed manually.
The procedure involves in gathering data and information.
The primary objective of the pen testing is actually to
identify the weakness of the security. The pen testing can
also utilized for testing the security policy of the
organisation
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
FINANCIAL SECTOR:
The primary threats of cyber security in the finance
related sector are as follows:
Unencrypted data
New automation technology without Security
Unprotected Third Party Services
Unsecured Mobile banking
A constantly changing threat landscape.
Document Page
INDUSTRIAL CONTROL
SYSTEMS:
The ICS is one of the collective terms that is mainly
utilized for describing various types of associated
instrumentation and control systems that include the
systems, devices, controls and networks that are utilized
for operating as well as for automating the industry
related procedures. There are various types of industry
control systems. The types of them are as per following:
Supervisory Control and Data Acquisition (SCADA)
Distributed Control System (DCS)
Actual ICS implementation
Document Page
LAW ENFORCEMENT:
The threats can include malicious codes, direct attacks
and internal threats. The network security is the
combination of multiple defence layers at the edge as
well as in the network. The DHS can work with the LAW
enforcement can combat the cyber crime by many ways
that includes various programs:
The Homeland Security Information Network (HSIN)
Project iGaurdian
Stop. Think. Connect. ™ Campaign.
Cyber awareness coalition.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
LIFE CYCLE OF A CYBER
THREAT
The life cycle of a cyber threats are as follows:
Phase 1: Reconnaissance
Phase 2: Initial compromise
Phase 3: Command & control
Phase 4: Lateral movement
Phase 5: Target attainment
Phase 6: Exfiltration, corruption, and disruption.
Document Page
CONTINGENCY PLANNING
FOR THE DISASTER
RECOVERY: There are a series of plans and documents which are related as
well as conducted usually in the order of the development that is
initial, are given below:
Threat assessment
Vulnerability assessment
Risk assessment
Risk management plan (RMP)
Business impact assessment (BIA)
Business continuity plan (BCP)
Incident response plan (IRP)
Disaster recovery plan (DRP)
Devolution plan
Document Page
REFERENCES:
Backes, M., Hoffmann, J., Künnemann, R., Speicher, P., & Steinmetz, M. (2017). Simulated penetration testing and mitigation
analysis. arXiv preprint arXiv:1705.05088, 6.
Baloch, R. (2017). Ethical hacking and penetration testing guide. Auerbach Publications.
Luskind, Y., Zeng, G., & Dias, C. (2019). U.S. Patent No. 10,237,965. Washington, DC: U.S. Patent and Trademark Office.
Macaulay, T., & Singer, B. L. (2016). Cybersecurity for industrial control systems: SCADA, DCS, PLC, HMI, and SIS. Auerbach
Publications.
Perlman, R., Kaufman, C., & Speciner, M. (2016). Network security: private communication in a public world. Pearson
Education India.
Pozzobon, E., Weiss, N., Renner, S., & Hackenberg, R. (2018). A Survey on Media Access Solutions for CAN Penetration Testing.
Lewis, T. G. (2020). Critical infrastructure protection in homeland security: defending a networked nation . John Wiley & Sons.
Liu, Z., & Wang, N. (2019, December). A New Experiment Teaching Mode for Network Security & Law Enforcement Major to
Meet the Need of New Engineering Talent Training. In 2019 3rd International Conference on Education, Economics and
Management Research (ICEEMR 2019) (pp. 214-217). Atlantis Press.
Mena, J. (2016). Machine learning forensics for law enforcement, security, and intelligence. Auerbach Publications.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
chevron_up_icon
1 out of 11
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]