Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

Discussion: Cyber Attacks Protecting National Infrastructure

Discussion: Cyber Attacks Protecting National Infrastructure

Week 7 :oHw defense-in-depth and awareness re complimentary techniques to detect emerging threats and strengthen countermeasures.

Chapter 8

Collection

Cyber Attacks Protecting National Infrastructure, 1st ed.

2

• Diligent and ongoing observation of computing and networking behavior can highlight malicious activity – The processing and analysis required for this must be done

within a program of data collection

• A national collection process that combines local, regional, and aggregated data does not exist in an organized manner

Copyright © 2012, Elsevier Inc.

All rights Reserved

C h a p te

r 8 –

C o lle

c tio

n

Introduction

3

Fig. 8.1 – Local, regional, and national data collection with aggregation

Copyright © 2012, Elsevier Inc.

All rights Reserved

C h a p te

r 8 –

C o lle

c tio

n

4

• At local and national levels data collection decisions for national infrastructure should be based on the following security goals – Preventing an attack

– Mitigating an attack

– Analyzing an attack

• Data collection must be justified (who is collecting and why)

• The quality of data is more important than the quantity

Copyright © 2012, Elsevier Inc.

All rights Reserved

C h a p te

r 8 –

C o lle

c tio

n

Introduction

5

Copyright © 2012, Elsevier Inc.

All rights Reserved

C h a p te

r 8 –

C o lle

c tio

n

Fig. 8.2 – Justification-based decision analysis template for data collection

6

• Metadata is perhaps the most useful type of data for collection in national infrastructure – Metadata is information about data, not what the data is

about

• Data collection systems need to keep pace with growth of carrier backbones

• Sampling data takes less time, but unsampled data may be reveal more

Copyright © 2012, Elsevier Inc.

All rights Reserved

C h a p te

r 8 –

C o lle

c tio

n

Collecting Network Data

7

Copyright © 2012, Elsevier Inc.

All rights Reserved

C h a p te

r 8 –

C o lle

c tio

n

Fig. 8.3 – Generic data collection schematic

8

Copyright © 2012, Elsevier Inc.

All rights Reserved

C h a p te

r 8 –

C o lle

c tio

n

Fig. 8.4 – Collection detects evidence of vulnerability in advance of notification

9

• National initiatives have not traditionally collected data from mainframes, servers, and PCs

• The ultimate goal should be to collect data from all relevant computers, even if that goal is beyond current capacity

• System monitoring may reveal troubling patterns

• Two techniques useful for embedding system management data – Inventory process needed to identify critical systems

– Process of instrumenting or reusing data collection facilities must be identified

Copyright © 2012, Elsevier Inc.

All rights Reserved

C h a p te

r 8 –

C o lle

c tio

n

Collecting System Data

10

Copyright © 2012, Elsevier Inc.

All rights Reserved

C h a p te

r 8 –

C o lle

c tio

n

Fig. 8.5 – Collecting data from mainframes, servers, and PCs

11

Security Information and Event Management

• Security information and event management (SIEM) is the process of aggregating system data from multiple sources for purpose of protection

• Each SIEM system (in a national system of data collection) would collect, filter, and process data

• Objections to this approach include both the cost of setting up the architecture and the fact that embedded SIEM functionality might introduce problems locally

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Blackboard Experts only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Blackboard Experts are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Blackboard Experts is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Blackboard Experts, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.