CASE STUDIES

A case study is a "published report about a person, group, or situation that has been studied over time."[1] If the case study is about a group, it describes the behavior of the group as a whole, not behavior of each individual in the group.

CASE STUDIES


Modern networks are designed with multiple layers of preventive and detective controls. Even with these controls, networks continue to be breached and these breaches can go unnoticed for months. While preventive measures cannot stop all attacks and exploits, detective measures should be able to identify intrusions and malicious activity in a timely manner. The ability to detect this activity depends on the kinds of intrusion monitoring systems in place and the analysts ability to recognize and act on the alerts. This paper will outline the anatomy of a common attack, simulate the steps in an attack; including elements from the recent breach of Sally Beauty Supply, and determine how an attack can be detected.
Target could have used a data loss prevention solution to mitigate the success of its infamous data breach. However, organizations typically deploy data loss prevention with simple policies and rules that detect 15- or 16-digit number strings that might represent a credit card number; this strategy, would not be effective in the case of the Target attack due to the attackers packaging the loot with Base64 encoding directly on the point of sales systems. Therefore, a security practitioner requires alternative detection measures to detect this type of anomalous activity. Data loss prevention can support an organizations ability to implement the Critical Security Controls, thereby providing the capability to detect such a sophisticated attack during the key stage of the Kill Chain model: Actions on Objective. Data loss prevention, when implemented with robust rules that reflect current attack tactics, techniques, and procedures, can reduce the likelihood of success by making it a bit more difficult to extract the valuable data.
What would soon characterize one of the worst hacks in recent history began when screenwriter Evan Goldberg and actor Seth Rogen joked about making a comedy about assassinating the leader of North Korea, Kim Jong-un.

Contact Us

#401,Manjeera Majestic Commercial

,

Hi-Tech City Road,

Kukatpally Housing Board Colony,
Kukatpally, Hyderabad,
Telangana 500072.

040-65451699

hr@cloudmachine.co.in

Recent Posts

CloudMachine enters mobile gaming platformCloudMachine enters mobile gaming platform By THE HINDU / Feb 07

Many millennials likely to quit current jobsMany millennials likely to quit current jobs By EconomicTimes / Feb 07

Copyright @ 2012 cloudmachinesoftsolutions. All rights reserved. | Admin