{"id":141,"date":"2023-10-22T23:52:12","date_gmt":"2023-10-22T23:52:12","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2025-04-24T02:36:32","modified_gmt":"2025-04-24T02:36:32","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kylehickman\/cyse-300\/","title":{"rendered":"CYSE 300"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\">Introduction to Cybersecurity<\/h2>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Research Paper #1<\/h2>\n\n\n\n<p>When I was looking back on the last ten years at all the cybersecurity breaches, I keep looking at the Microsoft incident in January 2021. \u201cOne of the largest cyber-attacks in US history, over 30,000 US businesses were affected by a sweeping attack on the Microsoft Exchange email servers, one of the largest email servers in the world\u201d (Chin, K. 2024). \u201cA sweeping attack is a network scanning technique used to determine which of a range of IP addresses map to live hosts.\u201d (Hanna, K. T 2021). \u201cThe hackers were able to exploit four zero-day vulnerabilities that allowed them to gain unauthorized access to emails from small businesses to local governments\u201d (Chin, K. 2024). Zero-day vulnerabilities are a hole in an operating system that the developer is unaware of.<\/p>\n\n\n\n<p>\u201cFor three months, hackers took advantage of a few coding errors to allow them to take control of vulnerable systems. They only needed two conditions to break into each individual company\u2019s email servers. One being connection to the internet, and secondly on premises locally managed systems\u201d (Chin, K. 2024). After they gained access, they requested access to data and took over servers. Microsoft recommended five actions to mitigate the consequences and prevent a future incident. \u201cApply a hot patch to security devices to automatically block exploration attempts using signatures from the threat actors exploit while you work to upgrade and patch the devices. Conduct an asset inventory to identify all affected Microsoft Exchange servers deployed in the organization. Run version checks to see if they have been patched. Apply appropriate patches where possible, if a patch isn\u2019t possible you should secure behind a security device to detect and prevent an exploit. Finally, they recommended to apply advanced scanning leveraging known indicators of compromise to detect leave behinds and anomalous behaviors resulting from a successful breach\u201d (Solutions, A. C.2021).<\/p>\n\n\n\n<p>\u201cIn July 2021, the Biden administration, along with the FBI accused China of the data breach. Then Microsoft followed suit and named a Chinese state-sponsored hacker group called Hafnium as the culprit behind the attack\u201d (Chin, K. 2024).<\/p>\n\n\n\n<p>References<br>Chin, K. (2024). Biggest data breaches in US history (updated 2024): Upguard. RSS.<br>https:\/\/www.upguard.com\/blog\/biggest-data-breaches-us<br>Hanna, K. T. (2021, June 18). What is a ping sweep (ICMP sweep)?. Networking.<br>https:\/\/www.techtarget.com\/searchnetworking\/definition\/ping-sweep-ICMP-sweep<br>Solutions, A. C. (2021, December 23). Best of 2021 &#8211; what we can learn from the 2021 Microsoft<br>Data breach. Security Boulevard. https:\/\/securityboulevard.com\/2021\/12\/what-we-can-<br>learn-from-the-2021-microsoft-data-breach\/<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Research Paper #2<\/h2>\n\n\n\n<p>After being asked to design a security policy for a corporate information system that stores very sensitive data, that must be protected it is important to cover the major issues that should be addressed in the security policy. It is crucial to go over what a security policy is before going over what I believe is important to be included in. \u201cA security policy is a document that spells out the rules, expectations, and overall approach that an organization uses to maintain the confidentiality, integrity, and availability of its data\u201d (Grimmick, R. 2023). While there are many aspects that go into creating a security policy here are five that stood out to me.<\/p>\n\n\n\n<p>First is making sure that your purpose and objectives are clear. \u201cRemember that many employees have little knowledge of security threats and may view any type of security control as a burden\u201d (Grimmick, R. 2023). Secondly realistic and enforceable policies. While you would like to make sure that you have the most secure policy there is, unfortunately you cannot be overly secure because your employees must be able to get into the system as well. Also, you cannot be overly lenient because no one would take your policy seriously if no repercussions are in order. Third is to make sure your information is up to date. \u201cSecurity policy updates are crucial to maintaining effectiveness. While the program or master policy may not need to change frequently, it still should be reviewed on a regular basis\u201d (Grimmick, R. 2023). Fourth is a remote access policy. \u201cRemote access employees are often encouraged to use their phones to check their work emails outside of business hours as well as the increase in people working from home\u201d (Irwin, L. 2022). Finally, you need to have clear definitions of the important terms. \u201cRemember that the audience for a security policy is often non-technical. Concise and jargon- free language is important technical terms should be clearly defined\u201d ( Grimmick, R. 2023).<\/p>\n\n\n\n<p>When designing your security policy there are a lot of important elements you need to add to it these were the five, I believe to be the most important ones. It is also important to <\/p>\n\n\n\n<p>remember who you are designing the security policy for employees and their knowledge and<br>skill level. Also remember to make a realistic, enforceable, and clearly defined policy so your employs will take it seriously as well as understand what you are accomplish with your security policy.<\/p>\n\n\n\n<p>References<br>Grimmick, R. (2023, April 6). What is a security policy? definition, elements, and examples.<br>Varonis. https:\/\/www.varonis.com\/blog\/what-is-a-security-policy<br>Irwin, L. (2022, October 18). 5 information security policies your organization must have. IT<br>Governance USA Blog. https:\/\/www.itgovernanceusa.com\/blog\/5-information-security-<br>policies-your-organization-must-have<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Cybersecurity Research Paper #1 When I was looking back on the last ten years at all the cybersecurity breaches, I keep looking at the Microsoft incident in January 2021. \u201cOne of the largest cyber-attacks in US history, over 30,000 US businesses were affected by a sweeping attack on the Microsoft Exchange email servers,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kylehickman\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":27873,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kylehickman\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kylehickman\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kylehickman\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kylehickman\/wp-json\/wp\/v2\/users\/27873"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kylehickman\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/kylehickman\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":366,"href":"https:\/\/sites.wp.odu.edu\/kylehickman\/wp-json\/wp\/v2\/pages\/141\/revisions\/366"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kylehickman\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}