International Standards Report PDF

Title International Standards Report
Author Lancetwriter Kerio
Course DISCRETE MATHEMATICS
Institution Karatina University
Pages 5
File Size 81.8 KB
File Type PDF
Total Downloads 84
Total Views 127

Summary

good...


Description

International Standards Report

1

International Standards Report Warren Buffington, Lanre Dosumu, Dylan Haines, Mcgennings Imoroa, Alisha Johnson CYB 670 Capstone in Cybersecurity January 27, 2021

International Standards Report Over the past few decades, the international community has accepted that malicious cyber incidents and operations have transcended from the local and state level to the international level. The

International Standards Report

2

international community has created alliances, legal framework, and committed their countries to initiatives centered around the principles determined to provide support and standardization designed to enhance intelligence sharing among the global community. The Five Eyes Alliance (FVEY) is one such program to “improve cyber event incident response across the extended community of the countries involved: United States, Australia, New Zealand, Canada, and United Kingdom” (Underwood, 2020). The FVEY’s have established best practices to apply when conducting incident response measures or when breaches occur. These include: the collection and removal of relevant information, logging and data, and avoiding issues that can result in additional compromise once the case is closed. International Incident Response Standards Among other measures, FVEY has suggested key responses to investigating the network incase of a breach. First is the indicators of compromise (IOC) search. The idea behind this is to “collect knowbad indicators of compromise from a broad variety of sources, and search for those indicators in the network and find hosts” (Lord, 2020). In other words, IOC searches look for pieces of forensic data, found in system log entries or files, that identify potential malicious activity. Ultimately, this allows for the assessing of results for malicious activity to eliminate false positives. Another is frequency analysis. Frequency analysis leverage datasets to calculate normal traffic patterns in both network and host systems. It would be crucial to use these predictive algorithms to identify activity that is inconsistent with normal patterns. Certain variables including, timing, source and destination location, port utilization, protocol, and other attributes. Next is pattern analysis. This “analyzes data to identify repeating patterns that are indicative of either scripts or routine human threat activity” (Underwood, 2020). Filtering out data allows for the elimination of normal activity and evaluating the remaining data for the suspicious or malicious activity. Last is anomaly detection. The concept is to “conduct an analysis review of collected data to identify errors” (Underwood, 2020). In other words, security threats are detected based on packet signatures and continuous monitoring of a network for unusual events or trends. International Standards for Suspicious Activity

International Standards Report

3

In addition to the incident response standards, when investigating a network, the FVEY recommended implementing standards for identifying suspicious activity. These standards are comprised of a list of the following: ●

Running Processes



Running Services



Parent-Child Process Trees



Integrity Hash of Background Executables



Installed Applications



Local and Domain Users



Unusual Authentications



Non-Standard Formatted Usernames



Listening Ports and Associated Services



Domain Name System (DNS) Resolution Settings and Static Routes



Established and Recent Network Connections



Run Key and other AutoRun Persistence



Scheduled Tasks



Artifacts of Execution (Prefetch and Shimcache)



Event logs



Anti-virus detections

These standards of identifying suspicious activity can benefit nations not only within the FVEY’s, but other nations as well.

Research and Development Standards

The quorum must be up to five members from the FVEY nations to attend the meeting. These are the members of the security research and development council. The meeting held must be in line with expanding intelligence in the Defense under Homeland Security department agency to safeguard the cybersecurity threats of FVEY nations. (Verrico, 2019, July 25). The intention of the meeting and research

International Standards Report

4

is to foster enough gathering of information security concerns that serves the needs of all FVEY countries. It helps in developing trusted collaboration between FVEY members and its partners. It must not interfere with FVEY members to continuing implementing national policies and standards.

Common Mistakes Although there are crucial standards that can benefit the international community, there are common mistakes made in response to breaches. These mistakes can include, mitigating the affected systems before responders can protect and recover data, preemptive credential resets, failure to preserve or collect log data, or fixing the symptom instead of the root cause. Ultimately, all of these mistakes can impact a nation's network infrastructure, or more importantly, the relationship between the FVEY nations.

International Standards Report

5 References

D. (n.d.). National Cyber Awareness System. Retrieved January 28, 2021, from https://uscert.cisa.gov/ncas/alerts

Lord, N. (2020, December 01). What are Indicators of Compromise? Retrieved January 28, 2021, from https://digitalguardian.com/blog/what-are-indicators-compromise

Underwood, K. (2020, September 01). Five Eyes Nations Release Cybersecurity Principles. Retrieved January 28, 2021, from https://www.afcea.org/content/five-eyes-nations-releasecybersecurity-principles

Verrico, J. (2019, July 25). News release: DHS S&T hosts five eyes security partners to discuss multilateral RDT&E. Department of Homeland Security Science and Technology. Retrieved from https://www.dhs.gov/science-and-technology/news/2019/07/25/news-release-dhs-sthosts-international-security-partners...


Similar Free PDFs