cyber security building defense staying …...failure to do so can lead to maximum losses. target...

16
CYBER SECURITY: BUILDING DEFENSE, STAYING AHEAD WHITE PAPER

Upload: others

Post on 24-May-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

CYBER SECURITY:

BUILDING DEFENSE, STAYING AHEAD

WHITE PAPER

Page 2: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page i © 2014 LATA GIST & LATA LATA GIST Cyber Security White Paper

TABLE OF CONTENTS

PREFACE ........................................................................................ II INTRODUCTION ................................................................................ 1 KEY CHALLENGES ........................................................................... 1 TYPES OF CYBER THREATS .............................................................. 2 CYBER SECURITY EVOLVING THREATS ............................................. 4 CRITICAL PRIORITIES FOR CYBERSPACE SECURITY ............................ 6 MANAGING CYBER RISK .................................................................. 6 CYBER SECURITY FRAMEWORK ........................................................ 8 LATA GIST CYBER SECURITY DELIVERY FRAMEWORK ..................... 9 CONCLUSION ................................................................................ 11 REFERENCES ................................................................................ 11

Page 3: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page ii

PREFACE

Protecting Critical Infrastructure from cyber attacks has emerged as one of the most significant challenges of the 21st century. Cyber crime and cyber terrorism are unseen vulnerabilities that affect nearly all of us in a myriad of ways—from personal information protection to national security concerns.

Because there are, at present, no fully established and effective solutions to the ever-increasing number and severity of cyber attacks, societies everywhere are grappling to find the most appropriate proactive remedies for mitigating, preparing for, responding to and recovering from the debilitating destruction that hackers and cyber criminals can wreak on corporations and governments.

With no assurance furthermore that such fixed cyber security solutions can be easily and quickly found, the dilemma of protecting the free flow of information worldwide is a cyber risk that the world will likely have to live with for a long time to come.

The LATA GIST Cyber Security Team is thus pleased to offer this White Paper in the hope that our collective thinking will contribute to greater awareness regarding all aspects of cyber security. Our team will continue to develop ways and means to assist our worldwide clients on cyber security. Our structured engineering approach for enhanced cyber security combined with up-to-date training program shall contribute to protecting national and corporate key infrastructure.

This White Paper is the result of efforts made by LATA GIST’s Cyber Security Team and so I wish to thank the outstanding cyber security professionals who contributed their vast expertise to this report. These include the following individuals:

From Los Alamos Technical Associates: Dr. Michael Oehler, Charles Floyd, Martin Johnson, Robert Hull, Jeanne Woodfin, Ray Bloch and Tom O’Brien.

Jeff Alvich, Strategic Management Associates Managing Director, and his Cyber Security Team including: Andrea Hoy (also Vice President, ISSA International Board of Directors); Jean Pawluk, Shannon Parks, and Kemal Piskin.

Finally, we greatly appreciate the efforts of Vik Chauhan, Vice Chairman, Cyber IPT, Network Centric Operations Industry Consortium (NCOIC).

Dr. Indu Singh, Executive Director Los Alamos Technical Associates

Global Institute for Security & Training February 2014

Page 4: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page 1 © 2014 LATA GIST & LATA LATA GIST Cyber Security White Paper

INTRODUCTION

The internet was designed to share information, not protect it. Commerce and life is now shared on the net. As organizations exploit their digital assets, they create risks which must be managed. Initially, most organizations took a defensive posture focused solely on secure information technology and digital assets. Organizations soon learned it is not practical to protect everything, every time.

The Nation’s critical infrastructures are composed of public and private network in sectors such as agriculture, food, water, public health, emergency services, government, defense industrial base, information and telecommunications, energy, transportation, banking and finance, chemicals, and postal and shipping. Cyberspace is their central nervous system.

Cyberspace is composed of hundreds of thousands of interconnected computers, servers, routers, switches, and fiber optic cables that allow national critical infrastructures to work. Thus, the healthy functioning of cyberspace is essential to nation’s economy and security.

The speed and anonymity of cyber-attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult, a task which often occurs only after the fact, if at all.

We are facing the most serious economic and national security challenge of the 21st Century:

We are being exploited at unprecedented scale by a growing arrayof state and non-state actors

Adversaries are trying to maintain a persistent, pervasive presenceacross our networks

Corporations see the world differently than the state with intellectualproperty across all sectors being stolen

Government networks are being targeted to steal sensitiveinformation and gain understanding of mission critical dependenciesand vulnerabilities

The Government must take action to protect the critical componentsupon which the economy, government, and national security arebased from potential exploitation, disruption or destruction.

KEY CHALLENGES

Our economy and national security are fully dependent upon information technology and the information infrastructure. At the core of the information infrastructure upon which we depend is the Internet, a system originally designed to share unclassified research among

“Cyber is the risk intelligent exploitation of digital assets for a strategic advantage in achieving mission success and business operations through security of information, vigilance to emerging threats and resilience of operations.”

Federal Cyber Council

Page 5: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page 2 © 2014 LATA GIST & LATA LATA GIST Cyber Security White Paper

scientists who were assumed to be uninterested in abusing the network. It is that same Internet that today connects millions of other computer networks making most of the nation’s essential services and infrastructures work. These computer networks also control physical objects such as electrical transformers, trains, pipeline pumps, chemical vats, radars, and stock markets, all of which exist beyond cyberspace.

The required technical sophistication to carry out such an attack is high—and partially explains the lack of a debilitating attack to date.

In the past, there was a single entity or one key player to be concerned about. Today’s threat may mean contending with one hacker’s code, another person who gather’s the code and sells it on their digital storefront, another person might buy the code and use it, others find vulnerabilities and keep their takeover secret till they need to use their botnets, still others, use the code to phish or pharm for identities which they turnaround and sell.

Challenges that are impacting the Cyber Security program for corporations and government institutions are:

Speed of the attacks

Sophistication of attacks

Faster detection of weakness

Distributed attacks

Paucity of Human Capital/Talent

Senior Level Support within an organization

Communications of Risk

Move from protecting the perimeter to protecting data

Cyber Security strategies and governance to address threats

Ineffective sharing of threats and mitigation information

Management oversight of 3rd Party Providers/ Supply Chain

Organizations understanding of risk

Preparation, Prevention, Mitigation, Response, Recovery

Training of personnel

Now more than ever, protecting technology assets and customer data from malicious damage and inappropriate use requires intelligent constraints on how employees, customers, and partners access the applications and data.

TYPES OF CYBER THREATS

We identify three broad classes of cyber-threats based on their objectives and targets:

1. CYBER-CRIME affects individuals in the form of identity theft, phishingor cyber vandalism. It usually exploits weaknesses in personal

CRITICAL LESSONS LEARNED: SAUDI ARAMCO CYBER ATTACK

Sophisticated and determinedcyber attackers are difficult tostop. Organizations shouldtherefore anticipate beingunder constant attack.

Avoidable non-compliance tocurrent information securitystandards leads to securityweaknesses.

Sound cybersecurityprotection must use up-to-date asset defense(protecting people,information, and technologyassets), and include training,comprehensive detection,and response/recoverytactics.

Alert security staff are able torapidly detect attacks inprogress, then fend off ormitigate those attacks –minimizing damage.

Practice security responseand use hands on drills toprove how strategiccommunication and decisionswill be done.

Execute daily backups of allcritical systems.

Page 6: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page 3 © 2014 LATA GIST & LATA LATA GIST Cyber Security White Paper

networks and affects individuals performing regular tasks while being inter-connected.

2. ESPIONAGE consists of actors ranging from individuals with monetaryinterests, groups with political agendas, to state sponsored groupsthat target intellectual property and military secrets.

3. CYBER-WARFARE attempts to impair the functioning of critical

systemsii

, including state versus state and terrorism.

A combination of cyber-warfare along with a physical (kinetic) terror attack can amplify the effect of terrorism (e.g., disabling a 911 emergency system before a public bomb attack). Due to its wide utilization for global commerce and daily communication, computer and information networks at any organization are under attack from various potential actors, as shown in the Figure x below, ranging from poorly trained or careless employees to nation states.

Figure 1: Attack Vectors From Various Actors

The diverse nature of attackers makes it very difficult to implement a single technology solution that would then drive a direct cyber security regulation or analytical risk-based insurance market.

CRITICAL LESSONS LEARNED: TARGET RETAIL STORES

CYBER ATTACK

Corporate “hard” on theoutside, “soft” on the insidesystem defenses must besupplemented by additionalsecurity or else hackers canenter core systems and steallarge amounts of data.

Security staff must be well-trained and experienced indetecting, responding to andmitigating cyber attacks.Failure to do so can lead tomaximum losses. Targetunfortunately was unaware oftheir breach until notified bythe US Secret Service -maximizing losses incurred.

Adherence to current ITsecurity standards is critical.The Payment Card IndustrySecurity Standards Council,NIST, ISO, ISACA, and othergroups recommend stringentapproaches to cyberprotection and security.

Retailers should not collectand retain unnecessaryamounts of data aboutconsumers and purchases.Unused data should alwaysbe safely disposed of.

Customer data needs to beencrypted from retail points ofsale through credit cardprocessors to the banks andback again, as well as withindatabases.

Page 7: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page 4 © 2014 LATA GIST & LATA LATA GIST Cyber Security White Paper

CYBER SECURITY EVOLVING THREATS

MOBILE DEVICES (NEW PLATFORM)

With the rapid increase in the use of mobile devices and improved functionality of smartphones and tablets, so will the use of these new platforms to execute malware. The executable applications infected with malware on the mobile devices could use the phone as a surveillance tool to gather more information. Governments and business are allowing the use of bring your own device (BYOD) into the workplace. Mobile devices are a direct link to personal and company information.

THE CLOUD

Cloud networks allow users to access data almost anywhere. Attackers may choose to use this for stealing of data, hijacking connection or causing a Denial of Service (DoS) attacks to prevent use or redirecting connection to a malicious site.

SOCIAL MEDIA

Social media sites allow complete strangers to gain more access of information about others by making the fraud more credible. With the speed of information and access to an individual’s entire social network this allows fraudsters to gain valuable information about the individual. A common way that a fraudster may mislead a user on Facebook, is my posting a message saying did you see this photo in which the user will click on the link that could be malicious content. Many of us use LinkedIn that contains our work history, schools we attended or professional organizations, making credible conversations with fraudsters that claim they are from our alumni association or professional organizations to gather further information.

EXPLOIT KITS

Exploit Kits are readily available, often found in the undergrounds or black-market channels. These kits could be purchased by anyone and requires no knowledge of how an exploit works. The exploits kits are equivalent to “For Dummies” book series for cyber assault world. These kits are pre-written code to target applications with a history of known security exploits or software that is not up-to-date. These exploit kits are used by the less sophisticated technical hackers. Nearly 70% of exploit kits originate from Russia.

TARGETED ATTACKS

The targeted and sophisticated attacks are capturing headlines and gaining popularity. There’s a higher payoff for cyber attacks on an enterprise level. Groups of cyber criminals and/or protestors target government and businesses website to bring awareness to their cause. These Hacktivists are likely here to stay in the future. Nation-state

Page 8: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page 5 © 2014 LATA GIST & LATA LATA GIST Cyber Security White Paper

sponsored cyber attacks called “Cyber warfare” or Advanced Persistent Threats (APT) attacks are difficult to defend.

Governments and businesses need to protect their networks by staying current on the latest exploits and trends on cyber security to defend against these attacks.

TOP COMPUTER HACKERS

1. Amorphous Group: Eastern European group used malware tosnatch Target point-of-sale 40M customer’s data directly of thecards magnetic strip systems to credit, debit cards along withencrypted PIN numbers and 70M records containing customers’information. US Secret Service alerted the Target officials in mid-December 2013. Estimated total damage to banks and retailerscould exceed $18B. The malware, known as a memory scraper, hasbeen coined “Kaptoxa” after a word in its code — Kaptoxa isRussian slang for “potato” and is often used by undergroundcriminals to refer to credit cards.

2. Albert “segvec” Gonzalez: Part of the TJX & Marshalls identity theft ring that stole 36M credit card numbers. The cost of the hack is thought to exceed $400M USD.

3. ASTRA (Real Identity Classified): Greek mathematician who stoleand sold weapons technology data. Jailed for causing damages ofover $360M.

4. Anonymous: Hackivist group that campaigns for internet freedom.The Chinese government, the Vatican, the FBI and the CIA are justsome of its many targets.

5. Kevin Mitnick: Hacked the Pentagon, Nokia and Motorola. Huntedby the FBI and served five (5) years in jail. Once banned from usingthe internet and touching a keyboard for three (3) years.

6. Kevin Poulsen: Rigged a radio station call-in contest to win aPorsche. Jailed after breaking into federal databases and obtainingclassified US Air Force information.

7. Jonathan James: Forced NASA to shut down its network afterstealing software that controlled the living environment on theInternational Space Station.

8. Mathew Bevan and Richard Pryce: Hacked US military computersand used them to infiltrate foreign systems. Nearly sparked aninternational incident between the USA and North Korea.

9. Adrian Lamo: Hacked Yahoo, Microsoft, Google and the New YorkTimes. He went into hiding after turning WikiLeaks suspect, BardleyManning, over to the FBI.

Quantified Business ImpactAnalyses Identifying impactsand results of all potentialthreats.

Depicts time critical functions,recovery priorities, and inter-dependencies to aid decisionmakers in:

setting most effective timeobjectives for restoration

assigning priorities forresource allocation.

Page 9: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page 6 © 2014 LATA GIST & LATA LATA GIST Cyber Security White Paper

10. LuzSec: Group that has attached Sony, News International, theCIA, the FBI and Scotland Yard. Several high-profile members havebeen arrested.

11. Gary McKinnon: Infiltrated 97 US military and NASA computers,installed hacking software and deleted files. McKinnon was lookingfor evidence of UFOs.

CRITICAL PRIORITIES FOR CYBERSPACE SECURITY

We recommend the following priorities in devising the National Cyber Defense:

1. A National Cyberspace Security Response System

2. A National Cyberspace Security Threat and Vulnerability ReductionProgram

3. A National Cyberspace Security Awareness and Training Program

4. Securing Governments’ Cyberspace

5. National Security and International Cyberspace

6. Cyber Security Global Cooperation Framework

The first priority focuses on improving our response to cyber incidents and reducing the potential damage from such events. The second, third, and fourth priorities aim to reduce threats from, and our vulnerabilities to, cyber attacks. The fifth priority is to prevent cyber attacks that could impact national security assets and to improve the international management of and response to such attacks. Finally, the sixth priority will be essential since Cyber Security is a global challenge, not just national issue.

MANAGING CYBER RISK

With the increasing cost and volume of data breaches, cyber security is quickly moving from being considered by business leaders as a purely technical issue to a larger business risk.

A comprehensive cyber security risk management program should engage the organization at all levels. The board of directors governs cyber security risks and threats by working with executive management to establish Key Performance Indicators (KPIs). The KPIs should be used to evaluate and monitor cyber security risk and threats. Senior leadership should assume the responsibility for implementing and maintaining the risk infrastructure people, process, and technology needed to manage and monitor cyber threats effectively. Business Units and function owner should conduct risk management and monitoring activities.

Page 10: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page 7 © 2014 LATA GIST & LATA LATA GIST Cyber Security White Paper

The key methods for managing cyber security risks include:

1. Effective use of resources2. Internal controls3. Information sharing4. Technical improvements5. Aligning risks in classifications6. Behavioral/organizational improvements7. Continuous monitoring and mitigation8. Due diligence and risk management9. Testing and vulnerability assessments10. Refreshing cyber security strategies to address business needs and

threats11. Cyber security insurance

Cyber security is a concern for governance and a part of adequate risk management program. Whether an organization has a Risk Committee, or if they rely on an Audit Committee or other committees, there are two questions to ask to assess cyber security preparations: are the mitigation measures in place; and does the organization continuously monitor their performance. The goal is to combine constant automated diagnostic network monitoring with straightforward mitigation strategies that address the most frequently exploited vulnerabilities.

Below is the sample scale with estimates of probabilities for threats considered for Cyber Security Risk Assessment.

LEVEL PROBABILITY RISK DESCRIPTION

Rare Less than once every 2

years Low likelihood of significant

negative impact

Possible Less than once a year Moderate likelihood of

significant negative impact

Unlikely Once or twice a year Limited likelihood of

significant negative impact

Likely More than twice but less than ten times per year

Considerable likelihood of significant negative impact

Almost Certain

Ten time a year or greater High likelihood of significant

negative impact

Figure 2: Cyber Security Risk Assessment Estimate of Probabilities

ESTIMATE OF PROBABILITIES

Page 11: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page 8 © 2014 LATA GIST & LATA LATA GIST Cyber Security White Paper

CYBER SECURITY FRAMEWORK

NIST CYBER SECURITY FRAMEWORK

U.S. President Obama issued Executive Order 13636, “Improving Critical Infrastructure Cyber security,” on February 12, 2013, which established that, “it is the Policy of the United States to enhance the security and resilience of the Nation’s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties.” In enacting this policy, the Executive Order calls for the development of a voluntary risk-based Cyber security Framework – a set of industry standards and best practices to help organizations manage cyber security risks. The resulting Framework, created through collaboration between government and the private sector, uses a common language to address and manage cyber security risk in a cost-effective way based on business needs without placing additional regulatory requirements on businesses.

The Framework focuses on using business drivers to guide cyber security activities and consider cyber security risks as part of the organization’s risk management processes. The Framework consists of three parts: the Framework Core, the Framework Profile, and the Framework Implementation Tiers. The Framework Core is a set of cyber security activities, outcomes, and informative references that are common across critical infrastructure sectors, providing the detailed guidance for developing individual organizational Profiles. Through use of the Profiles, the Framework will help the organization align its cyber security activities with its business requirements, risk tolerances, and resources. The Tiers provide a mechanism for organizations to view and understand the characteristics of their approach to managing cyber security risk. The Framework Core provides a set of activities to achieve specific cyber security outcomes, and references examples of guidance to achieve those outcomes. The Core is not a checklist of actions to perform. It presents key cyber security outcomes identified by industry as helpful in managing cyber security risk. The Core comprises four elements: Functions, Categories, Subcategories, and Informative References, depicted below.

Page 12: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page 9 © 2014 LATA GIST & LATA LATA GIST Cyber Security White Paper

Figure 3: The NIST Cyber Security Framework Core elements

The Framework is designed to complement existing business and cyber security operations. It can serve as the foundation for a new cyber security program or a mechanism for improving an existing program. The following sections present different ways in which organizations can use the Framework.

LATA GIST CYBER SECURITY DELIVERY

FRAMEWORK

There are three critical concerns common to all levels of cyber attacks. First, networking creates vulnerability. Everyone from individuals to corporations to nations must be ever-vigilant to protect networked information that could be used against them. Second, protection keeps getting harder because there are more hackers, more sophisticated hackers, and more networks interconnected seamlessly to defend. Finally, hackers only have to find the weakest link in the network. They are often added by artificially intelligent tools that can identify and break that link. For example, there are a growing number of so-called black hat providers of hackers tools offered on the Internet cheaply.

Page 13: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page 10 © 2014 LATA GIST & LATA LATA GIST Cyber Security White Paper

We can draw three key lessons from recent cyber security incidents:

1. There is an urgent need to establish a clear set of cyber securityguidelines and specific goals and objectives for corporations andgovernments with critical infrastructure.

2. Governments must be alert to protect their national networksthrough a variety of methods that include security codes,surveillance systems and eventually the employment of artificiallyintelligent “smart ware” to track down cyber terrorist and cybercriminals. These initiatives by governments must also addresscorporate data protection as well.

3. While promoting free global trade in information services and easeof access to key networks by private, corporate and governmentalusers, nations must strike a proper balance between nationalsecurity and individual liberties.

LATA GIST uses an established Cyber Security Delivery Framework to assist its global clients in securing cyber space as shown below:

Figure 4: LATA GIST Cyber Security Delivery Framework

Cyber Security Assessment by quantifying enterprise wide risk through LATA’s design based threat methodology we are able to map specific component vulnerability categorically to specified threats. This affords the most comprehensive mitigation strategy development and cost estimating culminating in a detailed cost benefit analysis summary.

Cyber Security Strategy and Policy to counter and mitigate the determined risks (environment) that have the most adverse effect on your business, resources and reputation caused by potential interruption is vital. Our team helps develop cyber security governance including new strategy and policy to prevent, protect and mitigate.

Cyber Security Roadmap beginning with program initiation and management that includes resilience strategy, recovery objectives, production and operation continuity, operational risk management and crisis management plans GIST conducts full spectrum business continuity. Included in the Roadmap are cyber architecture and technical plan.

Page 14: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page 11 © 2014 LATA GIST & LATA LATA GIST Cyber Security White Paper

Cyber Security Pilot and Implementation through expert vendor agnostic third party maximizes return on investment. Quality control and cost benefit is measured in terms of tangible risk reduction for each mitigation strategy. Transparent and smooth integration of all component and ancillary systems combats potential loss of production and operating efficiency. Cyber Security pilot program is a way to ensure new strategy and plans are validated to meet organizational needs.

CONCLUSION

We are rushing toward tomorrow at an incredible speed. The advent of Internet, social media and the new electronic technologies promise us change at an incredible pace. The new electronic technologies and ways to use them can provide us promise or peril—sometimes both at the same time. Cyberspace has offered main kind direct pathways to rapidly building a knowledge-based society. The cyber criminals and cyber terrorist are bent on hijacking such enormous benefits to our societies. Creating cyber defense and staying ahead of these criminal minds seems to be the only option left for us to control and secure the information highway.

REFERENCES

1. The Safe City: Living Free in a Dangerous WorldDr. Joseph N. Pelton and Dr. Indu B. Singh, 2013

2. Joint Security Awareness Report (JSAR-12-241-01B) Shamoon/ DistTrackMalware (Update B)ISC-CERT Industrial Controls Computer Emergency Response TeamOctober 16, 2012 | last revised: January 03, 2014

3. ITP Hack or Attack? Shamoon and the Evolution of Cyber Conflict” workingpaper:Christopher Bronk, and Eneken Tikk-Ringas, February 1, 2013

4. In Cyberattack on Saudi Firm, U.S. Sees Iran Firing Back

New York Times, October 23 2012

5. Targeted attacks against the Energy SectorSymantec, January 2014

6. Fact Sheet: Quick Facts About Target | Target CorporateTarget press release, December 19, 2013

7. Target Confirms Unauthorized Access to Payment Card Data in U.S. StoresTarget press release, December 19, 2013

8. Target Provides Update on Data Breach and Financial PerformanceTarget press release, January 10, 2014

9. Payment Card Issue :response & resources related to Target's data breachTarget customer response, December 2013 – present

Page 15: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page 12 © 2014 LATA GIST & LATA LATA GIST Cyber Security White Paper

10. Target Struck in the Cat-and-Mouse Game of Credit TheftThe New York Times, December 20, 2013

11. A Sneaky Path into Target Customers WalletsThe New York Times, January 18, 2014

12. Neiman Marcus Data Breach Worse Than First SaidThe New York Times, January 23, 2014

13. Cards Stolen in Target Breach Flood Underground MarketsKrebs on Security, January 27, 2014

14. Teenager is author of Blackbox / Kaptoxa Malware

IntelCrawler, January 17, 2014

15. Data Breaches What the Underground World of Carding RevealsKimberly Perritti

Cybersecurity standards enable organizations to use security techniques to minimize the number of successful cybersecurity attacks. These guides provide general outlines as well as specific techniques for implementing cybersecurity in both general enterprise and in the energy sector.

1. API Standard 780 Security Risk Assessment Methodology for the Petroleumand Petrochemical IndustriesAmerican Petroleum Institute, May 2013

2. COBIT 5 Business Framework for the Governance and Management ofEnterprise ITISACA, November 2013

3. ISO/IEC 27000 series collection: Information Security ManagementSystemsInternational Organization for Standardization

4. ISC-CERT Improving Industrial Control Systems Cybersecurity with defensein depth strategiesISC-CERT, October 2009

5. NIST Guide to Industrial Control Systems (ICS) SecurityNIST, April 2013

6. NIST Information Security Handbook: A Guide for ManagersNIST, March 2007

7. NIST Security and Privacy Controls for Federal Information Systems andOrganizationsNIST, April 2013

Page 16: CYBER SECURITY BUILDING DEFENSE STAYING …...Failure to do so can lead to maximum losses. Target unfortunately was unaware of their breach until notified by the US Secret Service

Page ii

Global Institute for Security & Training (GIST) 45240 Business Court Sterling, VA 20166-6703 USA

Phone: 1 (703) 709-9430 Fax: 1 (703) 709-9450 www.latagist.com