From Air Conditioner to Data Breach
暂无分享,去创建一个
This paper examines the 2013 Target Data Breach in detail with the intent of developing some lessons learned that can serve security educators. The Target Data Breach originated in the network of a trusted vendor and then spread to Target's network. The rush to put more objects on the Internet is introducing many vulnerabilities into networks, so Target's experience of being attacked from a "trusted" source is likely to be repeated from many new sources. This paper then discusses the concept of a "kill chain" and how it could be of use to defenders. Finally, it discusses the relevance of the cyber castle metaphor to the design of hybrid networks and some approaches to building secure hybrid networks.
[1] G. Markowsky,et al. Using the Castle Metaphor to Communicate Basic Concepts in Cybersecurity Education , 2011 .
[2] Eric Michael Hutchins,et al. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains , 2010 .
[3] M G Lay,et al. Connected Car , 2019, Handbuch Digitale Wirtschaft.