Question

Aurter PRO- Document - Word * Search abdulle al Fle Home Insert Design Layout References Malings Review Vic Help Share Commen

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Sol:

Deter

  • Deny adversaries access to the information and other resources they require to conduct attack planning
  • Persuade adversaries from conducting an attack through emphasis of the likelihood of failure and capture
  • Project a sufficiently hostile view of the environment to an adversary so as to make an attack difficult or too unachievable to progress
  • Amplify the effectiveness of security measures and messaging

Examples

  • Messaging on the corporate website about the effectiveness of security measures (including the monitoring of visitors/cookies to enhance the user experience)
  • Limiting the information available about the asset forcing a physical reconnaissance visit to the asset (increasing the likelihood of detection)
  • Ensuring that the approaches to and areas around the asset are clear, easily monitored and that there is an appropriate challenge by the security officers or staff to unknown individuals (‘Can I help you’)
  • Messaging for the entire attacker journey, from the website through to the physical approaches to the site, that provide reassuring messages about the security measures in place.

Detect

  • To identify threat or attack behaviours at every stage of an attack – planning, reconnaissance, deployment
  • Initiate an appropriate response to a threat or attack as early in the attack timeline as possible
  • Monitor for the loss of information or assets which have been moved off site

Examples

  • Detecting hostile reconnaissance through the monitoring and detection of suspicious activities on the corporate website and visits to the asset
  • Implement a CCTV monitoring system covering beyond the site perimeter to identify an attack team approaching
  • Use an information/asset logging system to identify patterns of information/assets not being returned or accounted for

Delay

  • Maximising the time between the detection of an attack (at any of the stages in the attack timeline) and an attack reaching an asset’s perimeter
  • Limit availability/access to information in order to prevent an adversary developing an optimised attack plan – thereby increasing the attack timeline and further increasing the chances of detection

Examples

  • Monitor the area beyond the perimeter enabling early detection and maximising delay time for an adversary to transition the ground
  • Ensure an adversary requires multiple or extended visits to a site to gather information for an attack plan – increasing the risk of detection and extending the attack planning timeline

Mitigate

  • Maximise stand-off to any form of attack
  • Minimise single points of failure beyond your perimeter
  • Understand the potential effects of an attack on the surrounding environment and its impact on your site

Examples

  • Use of vehicle security barriers to enforce an appropriate stand-off distance
  • Use of resilient power supply, preventing single point of failure
  • Locating key servers at the core of the building
  • Use of local business/security forums to discuss impacts of attacks on neighbours and potential mitigations that could be used

Response

  • Determine what external response is required to the range of threats your site faces and ensure measures are in place to initiate the response
  • Where appropriate exercise your plans with external response forces, including communicating with neighbours

Examples

  • Establish an out-of-hours system to deliver a nominated keyholder to the site within an appropriate time frame
Add a comment
Know the answer?
Add Answer to:
Aurter PRO- Document - Word * Search abdulle al Fle Home Insert Design Layout References Malings...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Ateneo Documenti Word U : Insert Design Layout References CB-11-AAA Mailing Review ViewH elp Search Share...

    Ateneo Documenti Word U : Insert Design Layout References CB-11-AAA Mailing Review ViewH elp Search Share com 4 ABD AD Aabba Abc AaB Aalbot Atce ABD ABCD Abce dobro obce AMBICO MODE Dr. Replace Editing A baseball player is offered as year contract which pays him the following amounts at the end of each year: Year 1: 5900,000; Year 2: $1,200,000; Year 3: $1,500,000 Years 4 & 5:51.8 million each. Instead of accepting the contract, the player asks for a...

  • AutoSave om File Home on X Cut 6 Insert - O X 0 Design Layout References...

    AutoSave om File Home on X Cut 6 Insert - O X 0 Design Layout References Mailings Calibri (Body) - 11 - A A A A E B ru x , * A.D.A. Review View Comments Documenti - Word Ibekwe, Kemi Search ABCD AaBbccdd AaBb AaBbcc AaB AaBUCCO A36cdd ABCD 1 Normal No Spac.. Heading 1 Heading 2 Tibe Subtitle Subtle Em Emphasis Paste Help 21 - Copy Share Find Replace - Format Painter Clipboard 15. Dictate Paragraph Styles ng...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT