• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Structure
  • Schedule
    • First Half of the Semester
      • Week 1: Overview of Course
      • Week 2: TCP/IP and Network Architecture
      • Week 3: Reconnaissance
      • Week 4: Vulnerability scanning
      • Week 5: System and User enumeration
      • Week 6: Sniffers
      • Week 7: NetCat, Hellcat
    • Second Half of the Semester
      • Week 8: Social Engineering, Encoding, and Encryption
      • Week 9: Malware
      • Week 10: Web application hacking, Intercepting Proxies, and URL Editing
      • Week 11: SQL injection
      • Week 12: Web Services
      • Week 13: Evasion Techniques
      • Week 14: Review of all topics and wrap up discussion
  • Assignments
    • Analysis Reports
    • Quizzes & Tests
  • Webex
  • Harvard Coursepack
  • Gradebook

ITACS 5211: Introduction to Ethical Hacking

Wade Mackay

Today’s Cybersecurity Management Requires A New Approach

October 2, 2016 by Ioannis S. Haviaras 3 Comments

In this article Samuel Visner & Beth Musumeci discuss that the management of cyber security in organizations today are not able to keep up with zero-day vulnerabilities that can cripple them. With the increase of devices on the internet today more of an organization’s customer information is available to hackers to infiltrate. Over the past six years cyber terrorism has increased with hacks that included organizations like JPMorgan Chase, Adobe, Target and Walgreens. According to Gartner research “44% of reference customers for endpoint protection solutions have been successfully compromised.” This shows that even though security is present on an organization that new vulnerabilities play a major role. Visner & Musumeci propose that a new approach is the only way to prevent these vulnerabilities. They propose that white-listing certain “known good” applications is the only way to effectively protect against malware. Any untrusted or unknown applications are put in an isolated container away from the network and tested before being allowed on the network. A new model like this needs to be proposed among organizations to prevent such attacks from happening in the future.

Article: http://www.darkreading.com/vulnerabilities—threats/todays-cybersecurity-management-requires-a-new-approach/a/d-id/1327011

Filed Under: Week 06: Sniffers Tagged With:

Reader Interactions

Comments

  1. Loi Van Tran says

    October 2, 2016 at 10:03 pm

    I agree that white listing is a more secure approach, but it is inherently more expensive to manage, especially for larger organizations whose number of applications seems to grow over time. You would also require a group of staff to manage, review, and test the isolated applications, thus creating more overhead. Overtime your whitelist will grow, but it doesn’t necessarily mean that the whitelisted applications won’t become infected or vulnerable over time. I think a combination of whitelisting and blacklisting would be best. For instance, you can whitelist servers, because you know exactly what the servers are suppose to do and what type of data is transmitted. If you try to white list say an end user desktop, I believe IT will be not have enough resources to continuously evaluate all the users’ needs to access certain applications and sites to perform their tasks.

    Log in to Reply
    • Ahmed A. Alkaysi says

      October 3, 2016 at 1:15 pm

      I agree Loi. A combination of white/blacklisting is best. The company should know “what is bad”, and certainly should not allow ANY app on its networks. Whitelisting an app should not mean that no attention will be paid to it, I believe it still needs to undergo vulnerability scans and have logs checked every once in a while to insure it has not been compromised.

      Log in to Reply
  2. Mauchel Barthelemy says

    October 9, 2016 at 1:38 pm

    It is true that Cyber Security Management is in need of a fresh approach, I also believe so because of the rise of “The internet of things,” Artificial Intelligence (AI) and autonomous vehicle programs. Cyber Security methodologies should evolve as rapidly as the increase of smart devices; however, I am not sure white-listing is the only way to effectively protect against malware. Networks can also be designed is a way that are more security friendly as well.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (133)
  • Week 01: Overview (1)
  • Week 02: TCP/IP and Network Architecture (8)
  • Week 03: Reconnaisance (25)
  • Week 04: Vulnerability Scanning (19)
  • Week 05: System and User Enumeration (15)
  • Week 06: Sniffers (9)
  • Week 07: NetCat and HellCat (11)
  • Week 08: Social Engineering, Encoding and Encryption (12)
  • Week 09: Malware (14)
  • Week 10: Web Application Hacking (12)
  • Week 11: SQL Injection (11)
  • Week 12: Web Services (10)
  • Week 13: Evasion Techniques (7)
  • Week 14: Review of all topics (5)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in