Unit introduction Our increasing reliance on computer systems and the data they contain makes us vulnerable to attacks from cyber criminals, and also to the loss of these systems if there is an accident or a natural disaster. As IT system security is improved, more sophisticated methods of attack are developed, and it is important that organisations have robust plans in place to deal with a cyber security incident before it occurs. All IT professionals require a good understanding of the current threats to systems, how to apply appropriate and effective protection methods and how to manage a cyber security incident.
In this unit, you will examine the many different types of cyber security attacks, the vulnerabilities that exist in networked systems and the techniques that can be used to defend an organisation’s networked systems. You will investigate the techniques used to assess risks and ways of planning to deal with the results of a cyber security incident and recover systems following an incident. You will examine scenarios, carry out risk assessments and prepare protection plans before protecting networked systems. You will also examine evidence from cyber security incidents and relevant security documentation, using the evidence to make recommendations for improvement. To complete the assessment tasks within this unit, you will need to draw on your learning from across your programme.
As IT systems evolve, there is an increasing need for IT professionals to protect networked systems and the information they contain, while providing enhanced features and benefits for organisations, customers and individuals. This unit will help prepare you for IT courses in higher education and for technician-level roles and apprenticeships in a variety of related areas.
This unit is externally assessed by a task set and marked by Pearson. The set task will be completed under supervised conditions in sessions:
Part A is five hours and Part B is four hours.
Part A must be completed before Part B and both parts need to be completed during the three-week assessment period set by Pearson. The set task will assess learners’ ability to design appropriate cyber security measures for networked systems and to analyse a security incident. The number of marks for the unit is 80.
The tasks will be marked using a levels-based mark scheme that is located in the sample assessment materials.
The availability of the task is December/January and May/June each year. The first assessment availability is May/June 2018. Sample assessment materials will be available to help centres prepare learners for assessment.
Assessment outcomes
AO1 Demonstrate knowledge and understanding of technical language, security threats, system vulnerabilities and security protection methods, and implications resulting from successful threats
AO2 Apply knowledge and understanding of security threats, system vulnerabilities, and security protection methods and implications in order to risk assess systems and select appropriate tools to secure them
AO3 Analyse forensic evidence data and information to identify security breaches and manage security incidents
AO4 Evaluate protection methods and security documentation to make reasoned judgments and draw conclusions about their efficacy
AO5 Be able to plan a secure computer network and manage security incidents with appropriate justification
Scale of the cyber threat
2017 was punctuated by cyber attacks on a scale and boldness not seen before. This included the largest recorded cyber heist, the largest DDoS attack and the biggest data breach ever being revealed (2 NCSC/NCA – The Threat to UK Business report 2016/2017) .
For more information about the cyber threat or for news on the latest cyber incidents, visit
ncsc.gov.uk/index/report
twitter.com/ncsc (@NCSC)
nationalcrimeagency.gov.uk/news
nationalcrimeagency.gov.uk/publications
twitter.com/NCA_UK (@NCA_UK)
twitter.com/CyberProtectUK (@cyberprotectUK)
actionfraud.police.uk/news
Employee sabotage and theft, including of physical equipment or data, and damage such as fire, flood, power loss, terrorism or other disasters
Case study - a 37-year-old former IT staff member for the U.S. subsidiary of Japanese drug company, Shionogi, pleaded guilty to remotely infiltrating and sabotaging the company's IT infrastructure this past February. The damage scrambled the company's operations for days and cost Shionogi more than $800,000 in damages, according to IDG News Service. The former employee, Jason Cornish, logged in to the network using a hidden virtual server he had previously created, then wiped out the company's virtual servers one by one, taking out e-mail, order tracking, financial and other services, according to IDGNS and court filings. IDGNS also reported that Cronish's former boss at Shionogi refused to turn over network passwords and was eventually fired.
Prevention strategies;
1. Create and maintain good documentation for networks and resources.
2. Maintain "super administrator" access where possible a company can maintain the highest level of control over the systems to prevent infiltration.
3. Have fast and clear change procedures for administrative passwords so that no worker can make system changes once they leave the company.
4. Use IT tools that allow you to set thresholds and alerts when there are unexpected activities inside the network to aid in the detection of possible sabotage events.
Employees may remove data using USB or external devices to hold a company to ransom or sell it to competitors.
Hardware equipment may also be vulnerable, this has the ability to be physically removed or deliberately damaged through a number of ways, fire, water.
Why might an employee commit sabotage or theft of a business’s computer systems or data?
Unauthorised access by employees and other users to secure areas and administration functions, including security levels and protocols
It is vital that companies consider the use of access levels and privileges that are provided to its staff and employees. Password policies must be put in to place to protect the system from brute force attacks where individuals can cycle through passwords to gain access. Systems can be put in to place to protect the company that for example locks out the users from the system after a sequence of wrong password attempts.
Weak cyber security measures and unsafe practices, including security of computer equipment and storage devices, security vetting of visitors, visiting untrustworthy websites
When visiting a website or
Accidental loss or disclosure of data, including poor staff training and monitoring.
Employees who aren’t aware of their cyber security obligations are prone to ignore relevant policies and procedures, which could lead to unintentional disclosures of data or successful cyber attacks.
There is also the threat of phishing and ransomware (which is often delivered through phishing emails). CyberEdge’s report found that spear phishing – sending malicious emails that claim to be from a legitimate source – dominates traditional phishing scams.
Create an information leaflet (A5) with examples for the following, employee sabotage and theft.
Malicious software (malware), including spyware, adware, ransomware; viruses, including worms, rootkits and trojans o hacking, including commercial, government, individuals.
Ransomware
Classic case of ransomware hit the NHS in 2017 where almost all systems were hit. Any machine not affected was required to remain off until the issue was resolved, so to stop any further infection or spreading of the original error
Trojans
Sabotage, including commercial, government, terrorism, individuals.
Social-engineering techniques used to obtain secure information by deception.
Social engineers take advantage of human behavior to pull off a scam. If they want to gain entry to a building, they don't worry about a badge system. They'll just walk right in and confidently ask someone to help them get inside. And that firewall? It won't mean much if your users are tricked into clicking on a malicious link they think came from a Facebook friend or LinkedIn connection.
I’m not one to turn down a free dinner, but I wouldn’t go as far as Kyle Baldinger did to get one.
Kyle saw a tweet that said “If you go to dinner alone always ask for a table for two. Look sad as you eat and you almost always get a free dessert”.
So, he thought he’d give it a go, and live-tweeted what happened.
[Warning: long image]
If you’d rather not read the whole thing, the short version is that Kyle bagged himself a free dinner after fooling a restaurant into believing he was stood up.
Whilst this example is playful is demonstrates the ways in which social engineering can be used to gain an advantage.
Social engineering has proven to be a very successful way for a criminal to "get inside" your organization. Once a social engineer has a trusted employee's password, he can simply log in and snoop around for sensitive data. With an access card or code in order to physically get inside a facility, the criminal can access data, steal assets or even harm people.
What are the ways in which an employee could give out information?
Operational loss, including manufacturing output, service availability and service data
Financial loss, including organisational, compensation and legal liability
Reputation loss, including lack of service and employee or customer information
Intellectual property loss, including new product design or trade secret.
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|
0
Just a Minute - At the end of the lesson teachers ask learners to summarise their learning. The comparison of these summaries against learning objectives informs planning.