Skip to content

Latest commit

 

History

History
100 lines (72 loc) · 2.22 KB

File metadata and controls

100 lines (72 loc) · 2.22 KB

Cybersecurity Capstone: Breach Response Case Studies

  1. Incident Management Response and Cyberattack Frameworks
  2. Phishing Scams
  3. Point of Sale Breach
  4. 3rd Party Breach
  5. Ransomware

Incident Management Response and Cyberattack Frameworks

  • NIST recommendations for IR (Incident Response):

    • Establish formal IR capability
    • Create IR policy
    • Develop IR plan based on IR policy
    • Develop IR procedures
    • Establish policies & procedures regarding IR information
    • Consider relevant factors when selecting IR team model
  • NIST IR lifecycle:

    • Preparation
    • Detection & Analysis
    • Containment, Eradication & Recovery
    • Post-incident activity

Phishing Scams

  • Types of phishing scams:

    • Phishing
    • Spear phishing
    • Whaling

Point of Sale Breach

  • For PoS (Point of Sale) Security, the PCI DSS (Payment Card Industry Data Security Standard) is the main payment card industry info security standard; with the goal to protect cardholder data & sensitive authentication data.

  • Security controls & processes for PCI DSS requirements:

    • Build & maintain secure network & systems
    • Protect cardholder data
    • Maintain vulnerability management program
    • Implement strong access control measures
    • Regularly monitor and test networks
    • Maintain Information Security policy
  • PoS malware examples:

    • Alina
    • vSkimmer
    • Dexter
    • FYSNA
    • Decebel
    • BlackPOS

3rd Party Breach

  • Types of 3rd party breaches

    • Cloud-based
    • Payment
    • JavaScript library

Ransomware

  • Ransomware - malware that infects computer systems, restricting user access; users are told that unless a ransom is paid, access will not be restored.

  • Types of ransomware:

    • Crypto
    • Locker
    • Leakware/Doxware
  • Ransomware attack vectors:

    • Phishing
    • RDP (Remote Desktop Protocol)
    • Software vulnerabilities
    • Malicious links
  • Prevention:

    • Backup
    • Update software & passwords
    • Antivirus
    • Beware of links
  • Ransomware examples:

    • Locky
    • WannaCry
    • Bad Rabbit
    • Ryuk
    • Troldesh
    • Jigsaw
    • CryptoLocker
    • Petya
    • GoldenEye
    • GandCrab