More Subjects
Week 8 Discussion - Strategies For Addressing Global Threats
_Y bjbj 29 9 228 @,L@2p@(@(@@@BBBZZZZZZZHZ-BBBBBZ@@HZPEPEPEB@@)YpPEBZPEPESLU@6_DC.UY02UHarCaHUUaWBBPEBBBBBZZPEBBB2BBBBaBBBBBBBBB2 Strategies for Addressing Global Threats
Author Name(s), First M. Last, Omit Titles and Degrees
Institutional Affiliation(s)
Author Note
Include any grant/funding information and a complete correspondence address.
Introduction
Cyber terrorism is a growing strategic threat to businesses and organizations dealing with banking and financial services. Cyber terrorism is of varying types and individuals or groups involved in such activities have agendas different than an ordinary hacker or cyberbullies. According to statistics, almost 122,000 people lost their lives due to terrorist activities in just the previous 3 years and insured losses reached up to 173 million (Michel Kunreuther, 2018). These causalities and damages are directly linked with their malicious activities related to financial and IT sectors and departments as only in 2016, they undertook 346 attacks on the global supply chain. It has been reported that terrorist organizations are using of computing techniques and expertise in order to launch attacks against their targets. In this background paper, several techniques and practices of prevention are discussed for the implementation in PBI-FS, the financial service acquired by Padgett-Beale.
Analysis
Cyber terrorists gave been using different platforms for launching attacks on financial services over the years. It is important to understand and have a clear idea of these activities in order to prevent them in the future. Mobile Banking is one of the popular attack vector used in previous years by cyber terrorists. They do so by using Trojans and viruses using mobile applications of Marcher/Android by virtue of auto-install vulnerabilities. Along with that, SMS fishing, encapsulating Trojans in the form of updates, fake web addresses or emails are also used frequently for this purpose ADDIN ZOTERO_ITEM CSL_CITATION citationIDIfTwejcC,propertiesformattedCitation(Littl3field, 2018),plainCitation(Littl3field, 2018),noteIndex0,citationItemsid521,urishttp//zotero.org/users/local/5OlhLovK/items/IZ377F8Y,urihttp//zotero.org/users/local/5OlhLovK/items/IZ377F8Y,itemDataid521,typewebpage,abstractContents n2. Executive Summary n2.1 Keywords n3. Introduction n3.1 Aim and methodology n4. What is cyber terrorism n4.1 Origins and,container-titleMedium,languageen,noteLibrary Catalog littlefield.co,titleCyber Terrorism understanding and preventing acts of terror within our cyber space,title-shortCyber Terrorism,URLhttps//littlefield.co/cyber-terrorism-understanding-and-preventing-acts-of-terror-within-our-cyber-space-26ae6d53cfbb,authorfamilyLittl3field,given,accesseddate-parts2020,3,2,issueddate-parts2018,2,28,schemahttps//github.com/citation-style-language/schema/raw/master/csl-citation.json (Littl3field, 2018). Another kind is an extortion attack to extort banks and financial services where a person calls a bank or organization and ask for an amount of 1Million for the information they managed to steal.
Phishing attacks have also become abundant due to advancements in the cybersecurity industry. Previously, to launch a phishing attack, a hacker had to build a site write or develop malware programs to launch the campaign against the potential target. Nowadays, the task has become easier because of the availability of hacking toolkits which can be purchased and used for exploitation (SECUREWORKS, 2017). Other common related threats include Network traveling worms, social engineered Trojans and advanced persistent threats.
In order to prevent these potential attacks, there are few recommendations for PBI-FS for consideration.
The organization needs to have an efficient threat intelligence system to have a proactive approach to the security program.
The organization must have a mechanism to track threats that are specific to the nature of the business.
Leveraging automation tools is one of the effective solutions for monitoring and detection (Carter, 2017).
Frequent workshops and seminars for cybersecurity training of the employees to update them about advance techniques and practices.
Conclusion.
Cyber terrorism should not be underestimated in view of recent incidents and breaches in the financial sector. A company can prevent these threats by applying early and effective mitigation and detection steps to reduce the risk of cyber-attacks by criminals and terrorists. Apart from the steps mentioned above, the upper management must make sure that employees are well aware of security requirements. The reason is that employees are comparatively a weaker link in the chain of cybersecurity and may become responsible for cyber-attack or data theft.
References
Michel Kerjan, E., Kunreuther, H. (2018). A successful (yet somewhat untested) case of disaster financing Terrorism insurance under TRIA, 20022020.Risk Management and Insurance Review,21(1), 157-180.
SECUREWORKS. (2017, 5 12). Cyber Threat Basics, Types of Threats, Intelligence Best Practices. Retrieved from SECUEWORKS HYPERLINK https//www.secureworks.com/blog/cyber-threat-basics https//www.secureworks.com/blog/cyber-threat-basics
Littl3field. (2018, February 28). Cyber Terrorism Understanding and preventing acts of terror within our cyber space. Medium. https//littlefield.co/cyber-terrorism-understanding-and-preventing-acts-of-terror-within-our-cyber-space-26ae6d53cfbb
Carter, W. (2017). Forces Shaping the Cyber Threat Landscape for Financial Institutions.
STRATEGIES FOR ADDRESSING GLOBAL THREATS PAGE MERGEFORMAT 5
Running head STRATEGIES FOR ADDRESSING GLOBAL THREATS PAGE MERGEFORMAT 1
()b / o ) P m q G
x5hhhWhhhLQhh
h
hChRh_lhQhCYBfHphq hCYhzh hdhhihgh
hFhhhxh3)bDVn FgdHgdCgdCgd
gd
gd56fgzCDCDUVLshhRh0RhIh4hQhCYBfHphq h-ChhHhh4shIEhhmHnHuhhRhChh/hhrhhR hR hR jhR U200gdgdgdIgdIsl78zppbpWPhhh6hhIh0JmHnHujhUmHnHuh6mHnHuhmHnHuhQh,BfHphq ,hQhi6BfHphq 2hihiBOJQJJfHphq hQhiBfHphq hihhwXhohkq
gdQdgdgdi0178H0gdgd@AXYZksokgShk0JmHnHuhQhFPJhhwshxjh0JUmHnHuhk0JmHnHu h0Jjh0JU hQ0J hF0JhADjhADUhQhhhQh BfHphq hQhaZiBfHphq hQhBfHphq gdi
gdQhQhhADhws hx0Jjh0JUmHnHu8 01hpQ0/ s666666666vvvvvvvvv66666666666666666666666666666666666666.666666666666nN66666666666666666666666666666666666666666666666666666666666666666p626FVfv2.6FVfv6FVfv6FVfv6FVfv6FVfv6FVfv 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@ 0@PJ_HmH nH sH tH VVA
Normald CJKH_HaJmH nHsH tHT@Tj Heading 1@a5OJPJQJJRRj@ Heading 2@5OJPJQJJNN0@ Heading 3@5OJPJQJJTT0@ Heading 4@56OJPJQJJNN0@ Heading 5@6OJPJQJJZZFj Heading 6(@BOJPJQJJphnnnGj Heading 7(@6BOJPJQJJphnnnbbHj Heading 8(@BCJOJPJQJJaJphh hIj Heading 9 (@6BCJOJPJQJJaJphDA DDefault Paragraph FontRiR
0Table Normal4 l4a(k (
0No ListTT
Section Title@aOJPJQJJ2@20Headerd2/20Header CharKH0W0Strong5B 1B0Placeholder Text Bph@@@f Bf0No Spacing,No IndentdCJ_HaJmH nHsH tHN/QNHeading 1 Char5KHOJPJQJJN/aN@Heading 2 Char5KHOJPJQJJD@rDTitle amOJPJQJJ@/@S Title CharKHOJPJQJJ.X .@Emphasis6N/N0@Heading 3 Char5KHOJPJQJJT/T0@Heading 4 Char 56KHOJPJQJJN/N0@Heading 5 Char6KHOJPJQJJRR 0Balloon TextdCJOJQJJaJR/R 0Balloon Text CharCJKHOJQJJaJ APBibliography 0xTx j0 Block Text NYYYOYYYPYYYQYYY6BphYYY6B6 0 Body Text x8/80Body Text CharKHP2 0Body Text 2 x/A0Body Text 2 CharKHBQRB 0Body Text 3 xCJaJD/aD 0Body Text 3 CharCJKHaJLMrL (0Body Text First IndentR/R0Body Text First Indent CharKHHCH 0Body Text Indent)xhF/F)0Body Text Indent CharKHPNP ,0Body Text First Indent 2V/V0Body Text First Indent 2 CharKHLRL .0Body Text Indent 2-xhJ/J-0Body Text Indent 2 CharKHTST 0 0Body Text Indent 3/xhCJaJR/R/ 0Body Text Indent 3 CharCJKHaJPP 0Caption1d6BCJaJph88 30Closing2d4/1420Closing CharKHFBF 5 0Comment Text4dCJaJF/QF4 0Comment Text CharCJKHaJ@jAB@ 70Comment Subject65R/qR60Comment Subject Char5CJKHaJ(L( 90Date8./.80 Date CharKHRYR 0Document MapdCJOJQJJaJR/R 0Document Map CharCJKHOJQJJaJFF 0E-mail SignaturedF/F0E-mail Signature CharKHDD 0
Footnote TextdCJaJH/H 0Footnote Text CharCJKHaJtt 0Envelope Address@dD/@OJPJQJJ 0Envelope ReturnAdCJOJPJQJJaJ2 2C0FooterBd2/12B0Footer CharKHpCpp Table Grid7VD0DdSTable Grid Light7VE0EdR/aRHeading 6 CharBKHOJPJQJJphnnnX/qXHeading 7 Char6BKHOJPJQJJphnnnZ/Z Heading 8 CharBCJKHOJPJQJJaJph/ Heading 9 Char6BCJKHOJPJQJJaJphDD K0HTML AddressJd6D/DJ0HTML Address Char 6KHe M 0HTML PreformattedLdCJOJQJJaJ/L 0HTML Preformatted CharCJKHOJQJJaJ8 8
0Index 1Nd88
0Index 2Od88
0Index 3Pd8
8
0Index 4Qd88
0Index 5Rd88
0Index 6Sd88
0Index 7Td88
0Index 8Ud88
0Index 9VdpPP 0
Index HeadingW5OJPJQJJttY
Intense Quote/XhhN@@@ P@@@ a6Bph@@@P/PXIntense Quote Char6BKHph@@@0/0 0List
Zhm424 0List 2
m434 0List 3
8m444 0List 4
m454 0List 5
m0List Bullet _FmB6B 0
List Bullet 2
FmB7B 0
List Bullet 3
aFmB8B 0
List Bullet 4
bFmB92B 0
List Bullet 5
cFmFDBF 0
List ContinuedxhmJERJ 0List Continue 2exmJFbJ 0List Continue 3fx8mJGrJ 0List Continue 4gxmJHJ 0List Continue 5hxm1List Number iFmBB 0
List Number 2
jFmBB 0
List Number 3
kFmBB 0
List Number 4
lF mBB 0
List Number 5
mF mD@D List Paragraph
nm- p 0 Macro Text(o
@
d(CJKHOJQJJ_HmH nHsH tHN/No 0Macro Text CharCJKHOJQJJaJI r0Message HeaderIqdM NOPQ8OJPJQJJ/q0Message Header CharKHOJPJQJJq D2D 0Normal (Web)sOJQJJB 0
Normal Indent tO v0Note Headingud/au0Note Heading CharKHNZrN x 0 Plain TextwdCJOJQJJaJN/Nw 0Plain Text CharCJKHOJQJJaJNNzQuoteya6Bph@@@@/@y Quote Char6BKHph@@@4K4 0 Salutation/0Salutation CharKH@ 0 Signatured8/80Signature CharKHL,L 0Table of Authorities @@ 0Table of FiguresP.P 0TOA Heading x5OJPJQJJ22
pTOC 4d22
pTOC 5d22
pTOC 6d22
pTOC 7d22
pTOC 8d22
pTOC 9d 0Endnote ReferenceH@ @PFootnote ReferenceHA0 APA ReportV0j4d
OJQJ@@pTable/Figure
mM
Plain Table 1qV0j@ j j
44d,5555B B 0Comment ReferenceCJaJBB 0Endnote TextdCJaJF/F 0Endnote Text CharCJKHaJb 0 HTML CodeCJOJQJaJBd B 0
HTML KeyboardCJOJQJaJFg F 0HTML TypewriterCJOJQJaJH1 HPIntense Emphasis6Bph777TA TEIntense Reference5@BphYYYH HjpTOC Heading@ aaJ FV a F j0FollowedHyperlinkBphYYY2Or 2Title 2 a6U 60 HyperlinkBph___PKContent_Types.xmlN0EH-J@ULTB l,3rJBG7OVa(7IRpgLr85vuQ8CX6NJCFB..YTe55 _g -Yl6NPK6_rels/.relsj0Qv/C/(hO Chvxp_P1H0ORBdJE4bq_6LR70O,En7Lib/SePKkytheme/theme/themeManager.xmlM @w7c(EbCA7K
Y,
e.,H,lxIsQ ,jGW)E 8PKRtheme/theme/theme1.xmlYF/lMBql4F3 iCCiH/6MwFcd
4IsNXp xpop,
we.pC0pm 8MQoDBF1vtp.4IPaQ4qm0qnAy0bfULlRJ3TlNS)a)Cv.xys@oE@)xRe_-4PHI.rm3g--PP
Yu),j-BXRH8@I7E10(2O4kLEzqO2POuz_gx7svnB2,E3p9GQd H
xuv 0F,FKsO3wvfSVbsyX p5veuw 1z@ l,ib
IjZ29LZ15xl.(zmd@23ln-@iDtd6lB63yy@tHjpUyeXry3sFXI
O5YYS.7bdn671.
tn/w/t6PssL.JiN AI)t2Lmx(-ixQCJuWlQyI@
m2DBAR4 wnaQ
W0xBdT/.3-FbYLKK6HhfPQh)GBms_CZys
v@c)h7JicFS.NP
eI Q@cpaAV.9HdHVXAYrApxSL93U5U
NC(pu@d4)t9M4WP5flk_X-CwTB Y,
AoYezxTVOlp
/gTpJ
EG,
AozAryerb/Ch,Eoo.
YgJW____RVW/79AkWjZuk y_Zklc,bUvPK
theme/theme/_rels/themeManager.xml.relsM 0woo5
6Q
,.aic21hqm@RNdo7gK(MR(.1rJT8VAHubP8g/QAs(LPK-Content_Types.xmlPK-60_rels/.relsPK-kytheme/theme/themeManager.xmlPK-Rtheme/theme/theme1.xmlPK-
theme/theme/_rels/themeManager.xml.relsPK xml version1.0 encodingUTF-8 standaloneyes
aclrMap xmlnsahttp//schemas.openxmlformats.org/drawingml/2006/main bg1lt1 tx1dk1 bg2lt2 tx2dk2 accent1accent1 accent2accent2 accent3accent3 accent4accent4 accent5accent5 accent6accent6 hlinkhlink folHlinkfolHlink/2VVV5s5fz7zQ4X9QST @H 0( 0( B S (())aabb
@kk@())aabbmqC
D
@knmRlk6jco8bah iL4_ZJhB.eOZT V pm tsr ..888..OJQJo(OJQJo(888OJQJo(OJQJo(888o(.888OJQJo( Article . Section .PP()pp()PP)PP))PP.0p0p.hOJQJo(hHhppOJQJJo(hHoh@@OJ QJ o(hHhOJQJo(hHhOJQJJo(hHohOJ QJ o(hHhOJQJo(hHhPPOJQJJo(hHoh OJ QJ o(hHhh))88)()()pp() .@@.. Article . Section .PP()pp()PP)PP))PP.0p0p.hh.PP.....xx.... ..... X X......
.......
88........
.........tsrTZJV pm.eO dYZ
r
H7bAMw@(R9OF-mLA.TWYnBdeThj6lr s_vwcpDH( gFA
kqzW@_g_l68D-hV55Q-CADH4rOLQ0RU4UWiaZik4swsyRIECYCSDI
jRM oMr,EA0krW9nnc4RhwXR5d/MxiR y __Grammarly_42____i__Grammarly_42___14H4sIAAAAAAAEAKtWckksSQxILCpxzi/NK1GyMqwFAAEhoTITAAAATH4sIAAAAAAAEAKtWcslP9kxRslIyNDYyMje1NDU2M7M0szA2NDBU0lEKTi0uzszPAykwqgUAOOoZSwAAAA@(@8@Unknown GAx Times New Roman5Symbol3.Cx ArialABCambria Math 8SimHeiSO(SimSunSO9.)Segoe UI9 @ Consolas Cx Courier NewWingdingsB1hII0NQHP Pr2xxbCUserszarrarhafeezghoriAppDataRoamingMicrosoftTemplatesAPA style report (6th edition).dotx(Strategies for Addressing Global Threats Zack GoldMorningH
Oh0, H ht
,Strategies for Addressing Global ThreatsZack Gold APA style report (6th edition)Morning2Microsoft Office Word@F@6_@6_I.,D.,Thp
)Strategies for Addressing Global ThreatsTitleh0t(0_PID_HLINKSZOTERO_PREF_1ZOTERO_PREF_2AB5https//www.secureworks.com/blog/cyber-threat-basicsdata data-version3 zotero-version5.0.84session idf7TrZYNB/style idhttp//www.zotero.org/styles/apa localeen-US hasBibliography1 bibliographyStyleHasBeenSet0/prefspref namefieldType valueField/pref nameautomaticJourn0alAbbreviations valuetrue//prefs/data
(),-./0123456789@ABCDEFGHIJLMNOPQRTUVWXYZfabcdeRoot Entry Fa6_1TableaWordDocument2SummaryInformation(KDocumentSummaryInformation8SMsoDataStore6_6_GVXG3LPP2 6_6_Item PropertiesJ3GMFPSF2W2 6_6_Item qPropertiesU
()CoverPageProperties xmlnshttp//schemas.microsoft.com/office/2006/coverPagePropsPublishDate/AbstractSTRATEGIES FOR ADDRESSING GLOBAL THREATS/AbstractCompanyAddress/CompanyPhone/CompanyFax/CompanyEmail//CoverPagePropertiesxml version1.0 encodingUTF-8 standaloneno
dsdatastoreItem dsitemID55AF091B-3C7A-41E3-B477-F2FDAA23CFDA xmlnsdshttp//schemas.openxmlformats.org/officeDocument/2006/customXmldsschemaRefsdsschemaRef dsurihttp//schemas.microsoft.com/office/2006/coverPageProps//dsschemaRefs/dsdatastoreItemxml version1.0 encodingUTF-8 standaloneyes
bSources SelectedStyleAPASixthEditionOfficeOnline.xsl StyleNameAPA Version6 xmlnsbhttp//schemas.openxmlformats.org/officeDocument/2006/bibliographybSourcebTagArticle/bTagbSourceTypeJournalArticle/bSourceTypebGuidA9826F97-9AB6-4323-9880-F46D9FA5FDF4/bGuidbTitleArticle Title/bTitlebYearYear/bYearbJournalNameJournal Title/bJournalNamebPagesPages From - To/bPagesbAuthorbAuthorbNameListbPersonbLastLast Name/bLastbFirstFirst,/bFirstbMiddleMiddle/bMiddle/bPerson/bNameList/bAuthor/bAuthorbRefOrder2/bRefOrder/bSourcebSourcebTagLast/bTagbSourceTypeBook/bSourceTypebGuid60AAA012-579D-4CB3-B717-40E27E8995F9/bGuidbTitleBook Title/bTitlebYearYear/bYearbCityCity Name/bCitybPublisherPublisher Name/bPublisherbAuthorbAuthorbNameListbPersonbLastLast Name/bLastbFirstFirst,/bFirstbMiddleMiddle/bMiddle/bPerson/bNameList/bAuthor/bAuthorbRefOrder3/bRefOrder/bSourcebSourcebTagSEC17/bTagbSourceTypeInternetSite/bSourceTypebGuidD6802D0D-A2D3-4B43-AC18-85C86F7F1D5F/bGuidbAuthorbAuthorbCorporateSECUREWORKS/bCorporate/bAuthor/bAuthorbTitleCyber Threat Basics, Types of Threats, Intelligence amp Best Practices/bTitlebYear2017/bYearbInternetSiteTitleSECUEWORKS/bInternetSiteTitlebMonth5/bMonthbDay12/bDaybURLhttps//www.secureworks.com/blog/cyber-threat-basics/bURLbRefOrder1/bRefOrder/bSource/bSources
xml version1.0 encodingUTF-8 standaloneno
dsdatastoreItem dsitemIDA0462977-7CC1-4C83-BDA7-A3E04857335B xmlnsdshttp//schemas.openxmlformats.org/officeDocument/2006/customXmldsschemaRefsdsschemaRef dsurihttp//schemas.openxmlformats.org/officeDocument/2006/bibliography//dsschemaRefs/dsdatastoreItem F Microsoft Word 97-2003 Document MSWordDocWord.Document.89qCompObjr
More Subjects
Join our mailing list
@ All Rights Reserved 2023 info@freeessaywriter.net