Unit 10 Cyber Security (2022)
Unit 10 Cyber Security (2022)
Mr.Dilanka
Assessor Internal Verifier
Unit 04: Cyber Security
Unit(s)
Assignment title Providing a suitable security solution for BND (German Foreign Intelligence Services)
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded
match those shown in the assignment Y/N
brief?
• Constructive?
Y/N
• Linked to relevant assessment
criteria? Y/N
Give details:
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
LO3. Examine the effectiveness of information assurance concepts applied to ICT infrastructure
Pass, Merit & Distinction P5 M3
Descripts
Resubmission Feedback:
Pearson
Higher Nationals in
Computing
Cyber Security
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous
page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the before
mentioned compulsory information will result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions will
not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may
apply (in writing) for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then
be asked to complete an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD
referencing system to avoid plagiarism. You have to provide both in-text citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced
to A REFERRAL or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it
as my own without attributing the sources in the correct way. I further understand what it means to
copy another’s work.
Unit Tutor
Submission Format:
The submission is in the form of an individual written report. This should be written in a concise, formal business
style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections
as appropriate, and all work must be supported with research and referenced using the Harvard referencing system.
Please also provide an end list of references using the Harvard referencing system.
The German Foreign Intelligence Services was founded during the Cold War in 1956 as the
official foreign intelligence agency of West Germany, which had recently joined NATO, and
in close cooperation with the CIA. It is also known as the Bundesnachrichtendienst (BND).
The new BND headquarters in Berlin, near the former Berlin Wall. The German Foreign
Intelligence Services website has recently been hacked by the hacker group “CLAY”. The
group used multiple ways to hack the website including social engineering to get login
details.
‘EMC Cyber’ is a reputed cyber security company based in Sri Lanka that is delivering
security products and services across the entire information technology infrastructure. To
identify the vulnerabilities of the GFIS existing system the top management of EMC Cyber
has recruited you as a consultant to identify and provide solutions for the vulnerabilities that
exist within the website. You are an independent cyber security consultant hired by EMC
Cyber that when through a cyber-security breach in the recent past. You are expected to do a
background study of the organization and the incident and provide a report to the board of
directors that convinces them to allocate more resources for cyber security. Further, you need
to consult the BND on how to develop the website and systems in the future so that it can
fight back against future hacks.
In your investigation, you have observed that the last Risk Assessment has been conducted
one month ago and no revision has been made afterward. Apart from that,
1.1 Review the types of malicious and criminal cyber activity BND may face, in the current
context. Give a comprehensive explanation of Business and society’s reliance on
technology and Why technology is a target for cybercrime. Your explanation should be
included the impact of cyber security on protecting businesses and society.
1.2 Investigate the potential targets of cybercrime in the BND environment and analyze the
concept of digital systems as ‘targets’ and ‘tools’ as related to cyber security, giving valid
pieces of evidence based on the BND website and other services.
Activity 02
2.1 Describe security threats and hazards to the BND system and evaluate types of malicious
cyber activity and the action that can be taken to neutralize cyber threat actors.
2.2 Using the threats and hazards identified in section (2.1) investigate the common attack
techniques and recommend how to defend against them in order to minimize security risks by
analyzing and mitigating the risks. Your answer should assess the role of threat intelligence
when defending against common attack techniques.
Activity 03
Write an article (Max 4 pages) on the topic ‘Information assurance concepts’. In the article
you have to explore how information assurance concepts can mitigate threats and
vulnerabilities in ICT infrastructure and assess how information assurance could enhance the
cyber resilience of BND ICT infrastructure. The article furthermore must show the
effectiveness of information assurance concepts applied to BND ICT infrastructure. Provide
valid pieces of evidence based on the BND ICT infrastructure.
Activity 04
4.1 Describe security standards, regulations, and their consequences across different sectors
and design a presentation-based training material for BND company staff. (Student must
develop a PowerPoint-based presentation that illustrates the recovery plan with applicable
security standards and regulations within 15 minutes of time including justifications and
reasons for decisions and options used).
4.2 Investigate and identify the types of responses that have been implemented by different
organizations in response to cyber security threats and analyze the role of criminals and other
laws in deterring cybercrime. Evaluate your answer by providing the proper explanations.
Acknowledgement
I take this opportunity to express my sincere gratitude to everyone who supported me
throughout the Cyber Security Assignment. I am thankful for their aspiring guidance,
invaluably constructive criticism, and friendly advice during the assignment work. I am
sincerely grateful to them for sharing their truthful and illuminating views on several issues
related to this assignment. I express my heartfelt thanks to Mr.Dilanka sir for support and
guidance throughout this assignment. I would also like to thank the entire ESoft Management
for having given me the opportunity to complete a valuable assignment.
Table of Contents
Activity 01...........................................................................................................................................16
1.1 Cyber-Crime and Cyber threat actors........................................................................................16
1.1.1What is meant by cybercrime?............................................................................................16
1.1.2Types of Cyber crime...........................................................................................................16
1.1.3 Meaning of Cyber Threats..................................................................................................21
1.1.4 Threat actors in the Cyber..................................................................................................21
Types of malicious and criminal cyber activity BND may face...................................................22
1.2 Comprehensive explanation of Business and society’s reliance on technology........................25
1.2.1 Why Technology is a Target for Cybercrime.......................................................................25
1.1 Impact of Cyber Security on Protecting businesses and Society.......................................26
1.2 Investigate the potential targets of Cybercrime in the BND..............................................27
How the attackers hacked the system by using vulnerabilities as tools...................................29
1.2.2 Understanding Cyber security matters considering the concerns listed above..................30
1.2.4 The relationship between Cybercrime’s targeted nature and business and society’s
dependency on technology.........................................................................................................31
Businesses’ reliance on technology............................................................................................32
1.2.5 Operational Efficiency, Cooperation, and Communication.................................................32
1.2.6 Digital systems are thought of as “Targets” and “Tools”....................................................33
Activity 02...........................................................................................................................................34
2.1. Describe security threats and hazards to a system or services process...................................34
2.1.1. Password Cracking for Wi-Fi..............................................................................................36
2.2. investigate common attack techniques and recommend how to defend against them...........39
2.2.1. All the Above-mentioned attack can benefit from the following advice...........................39
2.2.2. Assess the role of threat intelligence when defending against common attack techniques.
....................................................................................................................................................43
Activity 03...........................................................................................................................................46
Activity 04...........................................................................................................................................50
4.1. Describing Security standards, regulations, and their consequences in sectors of an
organization....................................................................................................................................50
4.2 Examining how criminal and other laws work to prevent cybercrime......................................57
4.2.1 Research the different types of countermeasures that have been implemented owing to
cyber security risks and compare the countermeasures taken by an alternative organization...59
Figure 1 Types Of CyberCrime.............................................................................................................17
Figure 2 Types Of Malware.................................................................................................................23
Figure 3 Web Application FireWall......................................................................................................40
Figure 4 Cloud Security.......................................................................................................................42
Figure 5 Data BackUp..........................................................................................................................43
Figure 6 Information Assurance Concept............................................................................................46
Figure 7 Concept.................................................................................................................................47
Figure 8 Vulnerabilities in ICT..............................................................................................................48
Figure 9 Information Assurance..........................................................................................................49
Figure 10 Company recovery Plan.......................................................................................................50
Figure 11Part Of The BND...................................................................................................................51
Figure 12 Analayzation........................................................................................................................51
Figure 13 Analyzation and information collection...............................................................................52
Figure 14 Security Measures...............................................................................................................52
Figure 15 Information Collection.........................................................................................................53
Figure 16 Creative research and technology.......................................................................................53
Figure 17 Security Measures...............................................................................................................54
Figure 18 Security Measures...............................................................................................................54
Figure 19 IT Support............................................................................................................................55
Figure 20 It Support............................................................................................................................55
Figure 21 Safty Procedures..................................................................................................................56
Figure 22 Reasons to discuss these.....................................................................................................56
Figure 23 Responses............................................................................................................................59
Figure 24 Response.............................................................................................................................60
Figure 25 Responses............................................................................................................................61
Figure 26 Responses............................................................................................................................62
Figure 27 responses............................................................................................................................63
Figure 28 Responses............................................................................................................................64
Figure 29 Responses............................................................................................................................65
Figure 30 Responses............................................................................................................................66
Activity 01
1.1 Cyber-Crime and Cyber threat actors
The term 'Cybercrime' is generic and denotes a host of activities considered criminal in
nature, whose essence is the fact that these are principally committed within cyberspace and,
in most instances, using highly advanced and sophisticated technologies. Cybercrimes can be
divided into several categories, each having its distinctive features in methodologies,
objectives, and eventual results. Knowledge of different categories of cybercrimes is very
significant for shielding persons, groups, and government authorities from impending digital
risks in an increasingly connected world. (cybertalents, 2024)
Figure 1 Types Of CyberCrime
1. Financial cybercrimes
Phishing - It ranks among the most dangerous categories of cybercrimes,
where fakers use emails and text messages with the express aim to control or
deceive the subject into disclosing sensitive information. Often, these
comprise such basic things as passwords, credit card access codes, and other
forms of bank account access that are crucial in ensuring security over
financial and personal identity. (cybertalents, 2024)
Identity theft - Identity theft is usually a serious and pervasive crime where
one's personal and financial information is taken and then used in other
malicious ways or to gain financially. This normally occurs when a thief
acquires sensitive information from the victim himself: either his Social
Security number, birth date, address, or even credit card number, through
phishing scams, data breaches, and even physical theft of personal documents.
With this at hand, the thief can substitute one's identity and create new credit
accounts, make purchases, or sometimes even commit various crimes under
the victim's name and surname. The aftermath of identity theft might prove to
be really brutal: financial loss, damage to credit scores, and emotional trauma.
Identity theft may also lead to further illegal activities: tax fraud, medical
identity theft, or even human trafficking. It is, therefore, in line with
significance that individuals take personal initiatives pertaining to the
protection of their personal information, such as checking credit reports, using
difficult-to-guess passwords, and not letting confidential information get out
online.
Credit card Fraud - Credit card fraud can be described as one kind of financial
fraud in which some unauthorized person uses a stolen, lost, or fake credit
card and draws fraudulent transactions that result in the financial loss of a
cardholder and a merchant. This may occur through several means, such as
card skimming, phishing scams, or physical stealing of credit cards. FRAUDS
use the stolen information to make online purchases, create fake credit cards,
and even draw cash from an ATM machine. Furthermore, such fraudsters steal
credit cards to commit identity theft to pose as credit card holders in person or
over the internet and carry out some criminal activities. Consequences of
credit card fraud could range from financial loss to damage to one's credit
score and further to some serious legal consequences. It is now necessary that
one should keep an eye on credit card statements, report suspicious
transactions, and exercise general precaution to safeguard credit card
information by using a secured online connection and avoiding phishing
scams. Financial Loss, Damaged Credit Scores, and Emotional Distress.
Moreover, it opens the door to other illegal actions such as tax fraud, medical
identity theft, and even human trafficking. Considering this, the first steps
toward protecting their personal information are to be taken through
monitoring their credit reports, using strong passwords, and exercising caution
in posting sensitive information on the internet. (cybertalents, 2024)
Malware Attacks - One of the major threats of the BND is malware attacks
because the information can be leaked and systems sabotaged leading to huge
losses. Malware is therefore a category of menacing programming on
computers with an objective of unleashing havoc on the system in as well as
the network it belongs. It may be transmitted via e-mail, from the use of
infected software download links and compromised network connection. After
getting a foothold in a system, malware enables the attacker to breach the
system’s security, extract information or interrupt the system operation.
1. Ransomware Attacks
2. Trojan Attacks
3. Virus Attacks
4. Spyware Attacks
5. Adware Attacks
Phishing is generally a very targeted attack in which the hacker uses advanced
methods to present message that look like they were coming from a trusted
source. For instance, an attacker may forward an email which looks like being
from a company, for example a bank or a government institution, requesting
the receiver to give personal details or click on a link which downloads
malware. The moment the recipient gives the information or clicks on the link
given by the attacker, the latter is free to access the systems and steal
information or install malware.
Financial Gain - Hackers can obtain confidential details, including monitoring, and
will take advantage of the situation. As more and more consumers are engaging in
online transactions or using the card to pay for goods and services, the criminals can
learn how to take advantages of the weaknesses in the technology to steal the
financial details to defraud the card holders and banks.
Political Motivation - The cyberspace is used by attackers to compromise critical
businesses, steal classified documents or get involved in political decisions. For
instance, nation states and hacktivists may decide to use cyber-attacks so as to realize
their political ambitions leading to serious repercussions in terms of country’s safety
and international peace.
Revenge or Malice - To inflict injury or disrupt operations through cyber assaults is a
common scenario among cybercriminals who may be driven by revenge or
wickedness. They may have personal issues that incite a grudge against someone else
due just to an individualistic rationale like ideology, thrill-seeking or maybe even
hating society.
High Return on investment - The internet has many profitable avenues for
cybercrime, which are usually low-risk and offer high-profit margins. Hence,
organized crime groups as well as other cybercriminals have been lured into this
environment.
For the German Foreign Intelligence Services (GFIS), it’s essential to have proper cyber
security practices as they are vital in safeguarding classified information, averting financial
damage and maintaining the sovereignty of a nation. Investing in strong cyber security
measures will help GFIS to avert any potential breaches, safeguard their systems and data
while maintaining stakeholder confidence. (kala, 2023 june 30)
Due to the high-risk environment that the BND has been operating in, it has become a target
to hackers. Websites of the organization and its local area networks are vulnerable to
different types of cybercrimes.
Sensitive information
Classified Documents - The BND deals with top secret, secret, confidential
information and documentation in matters to do with national security, diplomacy and
intelligence. It can be analogous that enemies to hospitals may attempt to access these
documents to compromise relevant information.
Disruption of Operation
Website Defacement - A web page of the BND can be easily defaced, which can be
used for malicious purposes such as spreading viruses, phishing for data or simply to
cause damage to the organization. Website def a cement is a form of cybercrime where
an attacker modifies the content of a website in a manner that was not authorized by the
owner of the website. This can lead to negative perception by the public, revenue loss
as well as regulatory fines and sanctions. As for the websites defaming, in the context
of the BND, this is very dangerous, because it might lead to the compromising of state
security and loss of trust in the organization. Furthermore, the infrastructure of the
BND, its digital systems can be instrumental in cybercrime – in the attack on other
organizations, surveillance, distribution of malware and viruses. This is why the
organization needs to pay a lot of attention to implementing effective protocols to
ensure the protection of their computer systems and data. (imperva, 2023/12/20)
Denial Of Service (DoS) Attacks - A Denial of Service (DoS) attack can be described
as a cybercrime where an attacker launches several traffic at the target system from
numerous sources with a view to making the application or the network unresponsive to
legitimate users. This can make the BND website or systems unreachable which may
lead to loss of reputation, loss making and usually disrupts the business. (cloudflare,
2023)
Ransomware Attacks - Ransomware attacks pose a threat because they hold the
BND’s digital systems at risk: data may be encrypted; the organization’s operations
may be impaired; and there may be financial repercussions. Ransomware is one of the
most dangerous forms of malware because it encrypts a victim’s data or a device and
only releases it after the ransom has been paid. (cyber.gov.au, 2024)
Reputation Damage - Reputational risk is also a risk that affects the BND because it
reduces its reputation among the citizens of the country as well as international
partners. For example, the loss due to DoS and ransomware attacks includes
reputation, which is not easy to regain and may take a toll on the BND for a long
time.
Espionage - The most important threat for the work of the BND is espionage, since it
may lead to leakage of classified data and affect the functionality of operations. Cyber
espionage for instance is a great danger to the BND since it can be employed to
siphon sensitive data, cause interferences and marshal an advantage.
Phishing Attacks: Attackers might create phishing emails and spread them among
the BND employees. Such emails can carry infected attachments or links. Since no
training or development activities have been tracked, employees will not identify
these phishing emails as dangerous and thus open phony content that may enable
malware infection or unauthorized access.
1.2.2 Understanding Cyber security matters considering the concerns listed above.
In a digitally connected world, it is security that is the biggest secret. With the
increased dependence on technology, the impact of and the level of difficulty
regarding cyber security threats are increasing day by day. In view of the growing
threat, in this landscape, robust procedures are paramount in preventing data leakage
of sensitive data, private information, and infrastructure that is highly salient.
Besides, it would prevent losses through frauds, identity theft, and data breaches.
Where cybersecurity plays a significant role in preserving national security and
ensuring continuous Governments and organizations are performing their operations.
Now, in this time of rapid advancement in technology, Cybersecurity is the necessary
defense to the potentially disastrous effects of cyberattacks on all people,
organizations, and nations.
Securing Internet of Things devices: IoT device security: IoT devices are
still vulnerable to DDoS attacks and Botnets. Efficient cybersecurity ensures
personal data security and the integrity of IoT devices in both homes and
businesses.
1.2.4 The relationship between Cybercrime’s targeted nature and business and society’s
dependency on technology
The German Foreign Intelligence Services case study has shown the way businesses
shape technology. The businesses in the cybersecurity and technology sectors are
important to know the use of technology that intelligence agencies like the BND will
have in the future. These firms assist in the development and provision of advanced
cybersecurity, surveillance, and data protection solutions, which are very important in
intelligence operations. The collaboration between the BND and the IT companies in
the corporate world fosters creativity for Continuous development of technological
instruments to gather intelligence, this is further manifested by the interaction below,
showing how Business and technology go hand in glove, with business at the helm,
followed by technology, eventually affecting the effectiveness of any intelligence
operation.
Automation powered with technology and data analytics are an essential cog in the
wheel for modern organizational operations. Automation means better precision,
simplification of processes, and This reduces manual labor. Data analytics enables
decision-making and resource Allocation: inventory optimization through the
leverage of key insights from large amounts of databases. Cost efficiency, effective
resource management, operational
These technological advancements increase the efficiency of doing business through
simplification.
Targets
Infrastructure: BND relies on various digital settings, including It relies on
network protocols, servers, and data centers to enable its operations.
Information Distribution depends on these settings. Also, the analysis and
storage of information depend on the same settings. Cognition might be
damaged in a cyberattack that disrupts or destroys these systems.
Tools
Looking into and Viewing: Digitally advanced techniques are employed by BND to
conduct observation and examination of activities. This could involve snooping on
someone, following them, or watching what people do online. To gather intelligence,
these instruments are essential.
Activity 02
2.1. Describe security threats and hazards to a system or services process
Security Threat can be explained as any act or process that has the potential of posing a
danger or a threat to an organization’s personnel, data or archives. Security threats could be
threats that involve a physical threat to the company and its assets, products or services, or
can be threats that involve hacking or including malware, ransomware.
A person or persons involved in an act or process that is characterized by A cyber threat actor
(CTA) is an entity or individual whose primary intent is aggression with animosity or hostile
behavior and that seeks to cause harm by utilizing computers, devices, systems, or networks.
It is quite shocking that they do not possess similar capacity, equipment, training, and
support for their activities even if they differ in terms of capacity and efficiency. Systems,
services, or processes are threatened by security risks and hazards that endanger the
confidentiality, integrity or availability of computer systems, services or processes. They may
stem from diverse sources and are directed towards various aspects of the computer-
supported system of an organization. (imperva.com, 2023/12/20)
Based on the analysis of BND website and systems, the following security threats and
hazards have been identified.
Social engineering - Social engineering is a main threat to the BND system and
Website. The exposure of the system to such attacks is evident from the recent hack
by a group known as the “CLAY” who recently got the login details of a user through
social engineering.
Malware and Ransomware - The BND system and website can be threatened by
Malware and ransomware. Malware is a term used to describe software that is
designed to be malicious to a system, while ransomware is a subset of malware that
blackmails a user to grant them access to their files.
DDOS - Denial-of-Service (DoS) Attacks: use a set of coordinated strategies as
agreed to increase the notch of the attack. A data breach is defined as unlawful
acquisition or exposure of sensitive data including credit card numbers, customers’
lists, or intellectual property.
1. Brute Force Attack: Another type of attack is also known as brute force where all the
possible characters are attempted in the hope to have an idea of the password.
Although this method takes a longer span of time it is often used in conjunction with
other methods. Brute force attacks can be carried out with the help of certain
applications namely Air crack-ng or John the Ripper.
2. Network Sniffing: A network sniffer “sniffs” or in other words can capture data
transmitted through the network for information for example where the data is
coming from, which device it is coming from, the protocol it is using among others.
These details can be allergist with network administrator to assist in enhancing its
environment.
3. Social engineering: Manipulating the human psyche is what social engineering is all
about. This method allows people to get into buildings, systems and obtain
information without using any technological hacking techniques. A social engineer,
for instance, could call an employee pretending to be a person from IT support and
ask him to divulge his password instead of looking for weaknesses in the software.
Inside Threats
Malicious actions or carelessness on the part of employees at a company who
are authorized to access vital systems or data.
Ransomware attacks
Suggestion:
Update and Patches: Install and update software commonly so that no known
vulnerabilities can be exploited.
Email cleaning: use filtering to prevent harmful add-ons from entering your
inbox.
Malware Attacks
Suggestion:
Suggestion:
Use a Web Application Firewall: The WAF is a collection of mechanisms that form
its security mechanism: intercepting and stopping the attacks from successfully going
through in the web application for SQL injection, cross-site scripting, and CSRF
attacks. Thus, German Foreign Intelligence Services can shield their web applications
from malicious traffic using WAF; hereby, minimizing the opportunities for data
breaches and unauthorized access. It can detect and prevent such attacks in real time.
The WAF would act like an additional layer of security between the internet and the
web application.
Load balancing: Distribute traffic among multiple servers to reduce the impact of an
assault. (cloudflare, 2023)
Password Cracking Wi-Fi
Suggestion:
Setting up unique passwords for each program is a great way to improve overall
security, and regularly updating them will keep your defenses against both internal
and external attacks strong.
2.2. investigate common attack techniques and recommend how to defend against them.
In the given paper, I have performed various analyses of common attack techniques that
might have been used by this hacker group, "CLAY," in breaching this website.
2.2.1. All the Above-mentioned attack can benefit from the following advice.
Web Application Firewall (WAF)
Among the important security measures to help protect the BND website from common web
attacks are Web Application Firewalls. WAFs are network-based and serve to filter incoming
traffic of a website that may be malicious. The tool can detect and prevent such cases of SQL
Injection, Cross-Site Scripting, and Cross-Site Request Forgery, among others. By applying a
web application firewall, GFIS can reduce the chances of compromising the website due to
some web-based attacks and ensure the confidentiality, integrity, and availability of
information assets. (CloudFlare, 2023)
A
SQL Injection-type attacks have the potential to reveal and compromise the database.
Attacks of this type of XSS can steal user credentials or inject malware.
CSRF attacks, which force users to perform actions that users do not intend to do.
This can be used to upload malicious files, compromising the security of the website.
Improved security posture provides real-time protection against known and unknown
threats.
Reduced risk of data breaches and cyber-security incidents
Compliance with relevant regulatory requirements but not limited to: PCI-DSS and
GDPR.
Better exposure of website traffic with detailed logging and analytics.
DDoS Protection
Considering the above, effective DDoS protection for the website of the BND is very critical
in ensuring its availability and security. With a DDoS attack targeted at it, the website of the
BND would go into debilitating loss regarding general critical operation, information
compromise, and erosion of public trust. To minimize these risks, the BND has been able to
install advanced DDoS protection measures: filtering traffic, rate limiting, and IP blocking-
mechanisms that would monitor for potential attacks in real time and quickly respond.
Further, the BND has been cooperating with domestic authorities on threat intelligence
sharing in relation to DDoS attacks, coordinating their respective responses considering
effectively defending against such a type of threat. (cloudflare, 2023)
Cloud Security
Among the paramount concerns for any organization moving to the cloud, the security in the
cloud secures sensitive data and applications from a slew of threats and vulnerabilities. A
good strategy for cloud security requires people, processes, and technology together to ensure
the
confidentiality, integrity, and availability of the resources based on cloud. This includes but
is not limited to enforcing strong IAM policies, encryption of data at rest and in transit,
regular security audits, and penetration testing for vulnerability detection and exploitation.
Figure 4 Cloud Security
Organizations should also take up CSPM approaches to gain visibility into cloud security
configurations and use cloud security gateways and CASBs to extend security controls into
cloud-based applications and services. This layered cloud security approach can help
organizations in mitigating the chances of cloud-based threats for secure adoption of cloud
computing. (kaspersky.com, 2020/05/13)
Backing up data
The backup of data is one of the most important aspects in the field of data management,
ensuring business continuity with minimum data losses due to hardware failure, software
corruption, or cyber-attacks. One may interpret a robust strategy pertaining to data backups
as the creation of multiple copies of data at different locations regarding integrity and
availability. That is, the 3-2-1 backup strategy: three copies of data on two types of media,
with one offsite.
Figure 5 Data BackUp
Besides that, an
organization can use cloud-based backup services. This is a resource which can easily be
scaled up or down without any issues, hence allowing flexibility and cost-effectiveness.
Regular testing and verification of backups are also very important to provide an assurance
that in case of a disaster, data will be recovered. It can be argued that if an organization
adopts a proper strategy of data backup, then it ensures there is no loss or unavailability of
data with the organization.
2.2.2. Assess the role of threat intelligence when defending against common attack
techniques.
In this connection, the most vital role of thorough threat intelligence is in the protection
against the typical attack approaches due to the evidence-based body of knowledge about the
attackers’ inclinations, intentions, and courses of action. It makes it possible to prevent such
attacks to minimize chances of a successful invasion by hackers. Threat intelligence supports
several practices and utilization models including vulnerability management, risk
management, incident handling and overall security operations. It brings into an organization
accurate STT to identify the attackers, their goals and objectives, unveil the APT and assist
cybersecurity specialists to comprehend the actions and choices of the threat actors.
Sources of threat intelligence encompass the security feeds, legal and other documents
made available by the industry and media. They give initial indications of new attacks
moves, malware pressures, and vulnerability. This allows administrations to manage the
controls for defenses and discovery tools as they wish. Through the awareness of new
threats in the network, administrations can easily monitor and check the elaborate attacks
they have developed by reducing the possible loss and damage to their procedures and
data.
Threat intelligence contains detail information in how the different techniques, tactics,
and procedures (TTPs) which cybercriminals employ work. Organizations management
will be able to understand the environment within which they operate. The right attack
methods make it possible for managers to develop strategies of counteraction to new
dangers. It is easier for them to create more realistic security strategies, establish access
control and improve upon the techniques used to detect intrusions.
3. Handling Vulnerabilities
Threat intelligence is very useful for incident response teams in that it helps them to
determine the range and scale of an attack. It gives ways and means adopted by such
people and signs that indicate that they have compromised an organization. These include
so called Input-Output-Cubes (IOCs) that contribute to the analysis and handling of
incidents. Based on a threat level, real incident response can decrease an attack impact
and stop negotiation further. Further, it accelerates the process in which these
administrations get to assimilate the lesson from the event and regain their earlier state of
security.
From progressive threat intelligence perspectives, one can infer the identification and
passion of threat actors. Perhaps, it could be useful for administrations to change its
defensive strategy depending on the targets and associates of the attackers.
Acknowledging data can make a world of difference to management so they are able to
know whether they are up against state actors, hackers, cyber criminals or insiders.
Situational understanding is achieved, and the ways towards handling any situation are
formulated with this knowledge in consideration.
In fact, threat intelligence can be considered a fundamental part of real cyber security. It
legitimizes BND to remain ahead of typical attack approaches by supplying proper,
related and illegitimate information. By leveraging concerning threat intelligence, BND
can enhance their threat discovery and reply to competences, reduce susceptibilities and
develop more potent protection strategies to shield their methods and information.
Figure 12 Analayzation
Figure 13 Analyzation and information collection
Figure 20 It Support
Figure 21 Safty Procedures
Any illegal action that can be performed using a computer, device, or network is termed as
cybercrime.
documents, and international forms of communication. Criminal law, as well as other laws,
have a great significance in preventing cybercrime within this digital era. Crimes that involve
illegal activities using digital technologies and computer systems are what describe
cybercrimes. These laws help in preventing cybercrimes in several ways. The first way is that
criminal law defines what constitutes cybercrime. They run organized crimes chalked on
cyber activities such as online fraud, cybercrime, identity theft, and hacking, among others.
Since the laws explain what amounts to a cybercrime, they do give the law enforcement
agencies something to work from in their investigations and respectively,
act. Cybercrime laws set expectations for the public, private and governmental sectors in how
computers, the Internet, and other digital technologies are used. It encompasses evidence,
criminal procedure and other aspects of cyberspace criminal justice, and precautions against
cybercrime that may create harm to individuals, organizations, and infrastructure. Thus,
substantive, procedural, and preventive laws comprise this area of Law on cybercrime.
(Department, 2024/08/30)
1. Common Law: These legal systems derive their laws from established practice and
the legal precedent, which is the decision in a case that subsequently is binding upon
a court and subordinate courts. These laws, which are those that arise because of court
rulings or legal precedents, are regulated distinctively and are referred to as case law.
(Department, 2024/08/30)
2. Civil law: The legal systems have laws or statutes that are codified, consolidated, and
comprehensive on basic rights, duties, tasks, and patterns of behavior. Basic units of
these judicial systems are their own constitutions and laws. (Department, 2024/08/30)
3. Customary law: Refers to those accepted and established behavioral norms which
people of the same culture consider to be the law - opinion juris. According to
international law, customary law provides the code on how states relate, and the
practices involved in those relations, and it is legally binding on all states.
(Department, 2024/08/30)
4. Religious law: The latter refers to laws inspired by religion or setting religious texts
as a source of authority and guidance in law.
5. Legal pluralism: In addition, this kind of judicial system may contain two or more of
these legal systems, including common, civil, customary, and religious law.
4.2.1 Research the different types of countermeasures that have been implemented
owing to cyber security risks and compare the countermeasures taken by an alternative
organization.
The many kinds of responses that have over time been used in counter-threats against cyber-
Security.
This section will develop the analysis of the research, both on quantitative and qualitative
levels. Results of this poll It was sent to a company that applies intelligent technologies to
maintain compliance with security while offering easy access to workstations for clinicians,
making workflow easier. The result of the survey is as follows:
How familiar you are with cybersecurity Threats?
15 responses
Responses
13%
Very Familiar
33% Somewhat Familiar
Basic Familiarity
Not Familiar at All
27%
27%
Figure 23 Responses
How Quickly do you respond to cyber security threats?
15 responses
Response
7%
33%
Figure 24 Response
How capable you are of developing a comprehensive response strategy to cyber security
threats?
15 responses
Responses
Very Capable
Capable
33%
Somewhat Capable
47% Limited Capability
Not Capable
7%
13%
Figure 25 Responses
Do you have any training in responding to cyber security threats?
15 responses
Responses
20%
Yes
Somewhat
47% No
33%
Figure 26 Responses
How often does your organization require its employees to change their password?
15 responses
Responses
7% 7% Every 1 month
Every 2 months
13% Every 3 moths
20%
Every 6 months
Once A Year
We don’t have a Password change
policy (Never)
20% 33%
Figure 27 responses
How is the Security of your online account maintained?
15 responses
Responses
7%
Two-Factor Authentication
Strong/Unique Passwords
40% Regular Monitoring
33% Use Up to date anti Virus
20%
Figure 28 Responses
What specific cyber security concerns have you found to be more pressing than others?
15 responses
Responses
20%
Yes
No
80%
Figure 29 Responses
If the answer to the above is yes, list the specific cyber security threats that require
additional focus.
12 Responses
Responses
33%
Figure 30 Responses
From the first chart, 26% are "Somewhat Familiar" or have "Basic Familiarity," while
33% of the total surveyed were "Very Familiar" with cybersecurity issues.
The third chart states that thirty-three percent of respondents have a "Limited
Capability, while a total of 46 of respondents feel "Very Capable" of creating a
thorough response strategy to cybersecurity threats.
The pie chart, therefore, indicates that, out of the total number of respondents, 20%
have some training, 33.3% have some training, while 46% have no training at all in
responding to cyber-security risks.
The highest frequency among the options provided is thirty-three percent of the
respondents, the pie chart reveals that are obliged to change their passwords every
three months.
Accordingly, the pie reveals that 40 percent of the respondents use means of security
for their online accounts. using strong or unique passwords, while thirty-three percent
use two-factor authentication. authentication, twenty percent monitor their accounts
on a regular basis, and the least percentage use up-to-date antivirus software.
The pie chart reveals that 80% of respondents believe some cybersecurity issues
While some threats are more pressing than others, twenty percent disagree.
In the pie chart, ransomware attacks are standing as the number one cybersecurity
threat for thirty-three percent followed by spear and phishing attacks at twenty-five
percent, insider advanced persistent threats take sixteen percent as zero-day
vulnerabilities take eight percent.
As such, even though this company is not fully secured from all types of
cybersecurity threats, the figures and information collated above show that they are
indeed striving to expand their cybersecurity level.
Link For Presentation - Cyber Security.rar
References
Blog, C., n.d. CyberTalents Blog. [Online]
Available at: https://cybertalents.com/blog/cyber-crime-investigation
[Accessed 18 09 2024].
Kaspersky, November 06, 2019. What is Cybercrime and How to Protect Yourself?. [Online]
Available at: https://www.kaspersky.com/resource-center/threats/what-is-cybercrime
[Accessed 26 09 2024].