{"id":133,"date":"2024-09-16T16:26:15","date_gmt":"2024-09-16T16:26:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2024-12-06T15:32:51","modified_gmt":"2024-12-06T15:32:51","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jayceclancey\/it-cyse-200t-2\/","title":{"rendered":"Here are a couple of papers I have done in this course IT\/CYSE 200T"},"content":{"rendered":"\n<p>Jayce Clancey<br>CYSE 200T<br>Professor Duvall<br>11\/10\/24<br>BLUF: With a limited budget prioritizing these three key factors will highly reduce cyber<br>threats. Risk Assessment First, Prioritize Training, and Implement Secure Technology.<br>In a limited budget you want to do the best you can to keep the cybersecurity department<br>up and running. Not only just running, but efficient and protective. As a Chief<br>Information Security Officer this is how I will approach having a budgeted department.<br><\/p>\n\n\n\n<p>1. Risk Assessment First<br>\u25cf I would start with this first to identify high value assets and the threats that<br>are most likely to happen, making sure that we are spending our money on<br>the most vulnerable systems.<br>2. Prioritize Training<br>\u25cf Human error is a big reason as to why cyber attacks happen. Due to this<br>reasoning I will put as much money as I can into training employees to<br>make it less likely that they perform an error.<br>3. Implement Secure Technology<br>\u25cf I would implement Firewalls, MFA, Email filtering, amd basic monitoring<br><\/p>\n\n\n\n<p>In conclusion, having a balanced approach with this budget will provide a strong and safe<br>cyber department. This will better the chances of a cyber threat being contained or not<br>happening at all.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>Jayce Clancey<br>October 27, 2024<br>CYSE 200T<br>BLUF: \u201cSupervisory Control and Data Acquisition (SCADA) refers to Industrial Control<br>Systems used to control infrastructure processes, facility-based, processes, or industrial<br>processes\u201d http:\/\/www.scadasystems.net<br>1. Cybersecurity Threats<br>\u25cf Unauthorized Access<br>Hackers may attempt to get into unauthorized access to control systems,<br>potentially corrupt systems, steal data, or cause harm.<br>2. Infrastructure getting old<br>\u25cf Many critical infrastructure systems are outdated and may be not fully<br>updated to handle present technology cyber threats. This can lead to the<br>systems failing and increased risk to cyber threats<br>3. Physical Attacks<br>\u25cf Critical infrastructure systems are also open to physical threats like<br>sabotage, terrorism, or natural disasters. These can damage the<br>infrastructure directly .<br>Conclusion: SCADA systems are important for a lot of very important things, but they are<br>very vulnerable to all types of attacks ranging from cyber attacks to physical attacks.<br>These can be maintained by upgrading and protecting systems.<br>Advantages and Disadvantages Of Scada: Explained.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>My team and I, talked about why the SolarWinds attack mattered.<\/p>\n\n\n\n<p><strong>Team 1<\/strong><\/p>\n\n\n\n<p><strong>Team members: David Daniel, Hannah Johnson, Jayce Clancey, and Tiani Reynolds<\/strong><\/p>\n\n\n\n<p><strong>CYSE 200T<\/strong><\/p>\n\n\n\n<p><strong>October 7, 2024<\/strong><\/p>\n\n\n\n<p><strong>The SolarWinds Compromise and Its Significance<\/strong><\/p>\n\n\n\n<p><strong>Location of information:&nbsp;<a href=\"https:\/\/www.techtarget.com\/whatis\/feature\/SolarWinds-hack-explained-Everything-you-need-to-know\">https:\/\/www.techtarget.com\/whatis\/feature\/SolarWinds-hack-explained-Everything-you-need-to-know<\/a><\/strong><\/p>\n\n\n\n<p><strong>BLUF<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Hackers targeted SolarWinds placing a harmful code into the management software and Orion IT monitoring system. Both of these systems are used by thousands of people and companies around the world which lead to many companies being hacked as well as supply chains, causing even organizations within the government to experience the effects.<\/strong><\/p>\n\n\n\n<p><strong>What was the Attack<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Solar winds compromise was a supply chain cyber operation conducted by Russian threat group ATP29. They used tactics such as password spraying, token theft, API abuse, spear phishing, and other supply chain attack strategies to compromise the data of more than 30,000 public and private organizations including local, state, and federal agencies that used the Orion Network management system to manage their IT resources. The hack exposed the inner workings of Orion users, allowing the hacker to gain access to the data and networks of their customers and partners. The hack lasted from August 2019 through January 2021, and was also known as the \u201cSUNBURST\u201d attack.<\/strong><\/p>\n\n\n\n<p><strong>Why was this important?<\/strong><\/p>\n\n\n\n<p><strong>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;This was important because it was a wake-up call for the global cybersecurity community. It forced organizations to update their security practices and highlighted their weaknesses. It helped organizations locate what they need to update to make things more secure to ensure that an attack like this doesn&#8217;t happen again.<\/strong><\/p>\n\n\n\n<p><strong>Conclusion<\/strong><\/p>\n\n\n\n<p><strong>In conclusion, the SolarWinds compromise was a huge Russian supply chain attack which compromised 30,000 public and private organizations including local, state, and federal agencies. Even though this was a huge attack and organizations spent a lot of money to come back from this attack, these companies used this as a learning opportunity to improve their systems to minimize cyber risks in the future.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Jayce ClanceyCYSE 200TProfessor Duvall11\/10\/24BLUF: With a limited budget prioritizing these three key factors will highly reduce cyberthreats. Risk Assessment First, Prioritize Training, and Implement Secure Technology.In a limited budget you want to do the best you can to keep the cybersecurity departmentup and running. Not only just running, but efficient and protective. As a ChiefInformation&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jayceclancey\/it-cyse-200t-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29530,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/users\/29530"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":308,"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/pages\/133\/revisions\/308"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jayceclancey\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}