Cyber Threat Intelligence Plan
Cyber Threat Intelligence Plan
https://www.WesternDigital.com/ Cameron W
March 11, 2019 CSOL 580
Cyber Threat Intelligence Plan
Executive Summary
This document will cover Western Digital Corporations' security posture, with the goal of identifying possible
risks and provide risk mitigation recommendations. First, it will cover the most common methods of delivery of
attacks. Then the top common cyber threats Western Digital must mitigate. After which the threat actors that
could be behind such attacks will be defined. This will lay the groundwork for the greatest threats to our
business, leading to what are our greatest concerns related to cyber threats. Once these details have been
outlined, its import before any recommendation to discuss the assets Western Digital has to understand why and
what we are trying to protect. The final part of this document will discuss methods in which we can employ to
mitigate the risks Western Digital Corporation faces, as these will act as recommendations to improve our
security posture.
Methods of Delivery
Malware:
Methods of Delivery
Malware: Using malicious software to steal data from victims.
Social Engineering:
Social Engineering: Attackers manipulate people into revealing
information or believing a message and clicking on a malicious
link.
Hacking:
Hacking: Exploiting holes or gaps in software or hardware.
Credential Compromise:
Credential Compromise: Passwords/managers use common
passwords or are vulnerable to theft.
Malware - 49% Web Attacks:
Social Engineering - 25%
Hacking - 21% Web Attacks: Attackers exploit websites by stealing information
Credential Compromise - 19% through gaps or holes within the website.
Web Attacks - 18%
DDoS - 5% DDoS:
DDoS: Attackers attack websites or companies network to shut
down operations.
Cyber Threats
Social Engineering Threats:
Phishing: A form of Social Engineering that uses email or malicious websites to solicit personal
information from an individual or company by posing as a trustworthy organization or entity.
Spear Phishing: Spear Phishing is a targeted form of Phishing in which fraudulent emails target specific
organizations to gain access to confidential information.
Vishing: This telephone version of Phishing is sometimes called Vishing. Vishing relies on "Social
Engineering" techniques to trick you into providing information that others can use to access and use your
important accounts. People can also use this information to assume your identity and open new accounts.
Network Threats:
Injection: Injection threats happen when malicious input is entered in a, for example, a login field and can
be executed by the application. The attacker can manipulate the application to behave in unusual manners,
often gaining access to information they would not or should not have access to. These threats are
elementary to execute and can cause great harm; however, they are also straightforward to fix, which leads
to them being overlooked by developers.
Broken Authentication: Broken Authentication happens due to poor application architecture and
development. This means the application is built in a flawed way that allows attackers to access information
such as passwords, user sessions, and maliciously use this information for their gain.
Sensitive Data Exposure: Sensitive Data Exposure is like Broken Authentication; however, the difference
is that the data that should be protected through encryption is otherwise not. This allows attackers to take the
information in a non-encrypted form.
Security Misconfiguration: Security Misconfiguration is like the previous two; however, it differs in that it
is one of the most common attack vectors due to lack of security management and implementation. This is
most commonly a result of an application not using standard security practices such as encrypting your web
session.
Threat Actors
Hackers:
Black Hat Hackers: Like all hackers, black hat hackers usually have extensive knowledge about breaking
into computer networks and bypassing security measures. They are also responsible for writing malware,
which is a method used to gain access to these systems.
Intentions: Their primary motivation is usually for personal or financial gain, but they can also be involved
in cyber espionage, protest, or perhaps are just addicted to the thrill of cybercrime. Black hat hackers can
range from amateurs getting their feet wet by spreading malware, to experienced hackers that aim to steal
data, specifically, financial information, personal information, and login credentials. Not only do black hat
hackers seek to take data, but they also try to modify or destroy data as well.
Phishers:
Phishers: A form of social engineering that uses email or malicious websites (among other channels) to
solicit personal information from an individual or company by posing as a trustworthy organization or
entity. Phishing attacks often use email as a vehicle, sending email messages to users that appear to be from
an institution or company that the individual conducts business with, such as a banking or financial
institution, or a web service through which the individual has an account.
Intentions: The goal of a phishing attempt is to trick the recipient into taking the attacker's desired action,
such as providing login credentials or other sensitive information. For instance, a phishing email appearing
to come from a bank may warn the recipient that their account information has been compromised, directing
the individual to a website where their username and/or password can be reset. This website is also
fraudulent, designed to look legitimate, but exists solely to collect login information from phishing victims.
Hacktivists:
Hacktivist: Hacktivism is the act of misusing a computer system or network for a socially or politically
motivated reason. Individuals who perform hacktivism are known as hacktivists.
Intentions: Hacktivism is meant to call the public's attention to something the hacktivist believes is an
important issue or cause, such as freedom of information or human rights. It can also be a way for the
hacktivists to express their opposition to something by, for instance, displaying messages or images on the
website of an organization they believe is doing something wrong.
Cyber Espionage:
Cyber Espionage: Is the act of acquiring secrets and information without permission and knowledge of the
owner. This attack is targeted at companies to steal Trade Secrets to know what a rival company is
producing.
Intentions: Cyber Espionage's goal is to steal what their rivals are doing in the hope that they can either
reproduce their product and compete or improve the product, so they outperform the competitor. However,
the goal is the same, to steal information and use it to further the business.
Insider Threat:
Insider Threat: An insider threat is most simply defined as a security threat that originates from within the
organization being attacked or targeted, often an employee or officer of an organization or enterprise.
Intentions: Some intentions are to use their access to sensitive information for personal or financial gain.
Others are because they feel the company wronged them, so they either steal or destroy the information to
get back at the company.
Frequency
Top Challenges
of Attacksin Cyber Concerns to Western Digital
Security
5%
Possiblity
80%
of Breach
Western Digital Greatest Concerns:
40% 70%
60%
40%0.35 Intelligential Property Theft
35% 50% If Western Digital were to suffer a breach, via one of the attack vectors
40% listed above in Threat and Threat Actors, we could incur significant losses
30% 30%
26%
in our intellectual property and expenses (this will be discussed further
20%
55%
25% 10% below). Also, any damage in any R&D secrets could give our competitors a
0% significant edge as well as knowledge of how we conduct internal/external
20% business.
ng
nt
es
di
le
s
un
ty
at
ici
Ta
0.15
il i
re
ol
fF
15%
Th
P
ko
ua
Vi
of
te
c
Another primary threat concern Western Digital could suffer from is our
La
en
of
n
d
tio
ck
um
k o Ina
La
isti
fD
5%
c
La
our reputation as well as cost the company millions in legal fees as well as
0% breach costs.
90 Days 1 Year 3 Years
Reasons to be Concerned with Cyber Threats
Damage to Company Operations:
Most companies rely heavily on the data they can collect to be used for intelligence to make educated
business decisions, and this is no different for Western Digital. This data can also be used for customer
dealings, such as a transaction to the exchange of goods. If Western Digital were to be hit by a Cyber
Breach, this could affect the company's operations to conduct business both in making educated business
decisions to better the future of the company but as well as customers/business ability to buy and sell our
products affecting revenue.
cost to recover from a breach can be quite extensive because we will lose time and money due to normal
operations being hindered during an investigation plus tracking and finding evidence. However, the costs
will also include reputation costs by which we would have to build a new public relations campaign. On top
of those processes, the lawsuits, fines, and regulatory actions leveraged against Western Digital will ensue
additional cost. It is estimated that a company of our size could lose five million dollars if we were to have a
severe breach. These costs would be in part of the investigation, hiring new IT members to help, overtime of
employees, customer/partner/employee business lost, lawsuits, fines, regulatory actions, as well as
rebuilding our reputation. Any breach can affect a company for over two years after the breach.
Company Assets
Personal Information: Financial Data:
Customer/Partner/Employee data Consumer Credit Card Data
1) Names (Customers and Partners) Payment types
2) Email Addresses (Customers and Partners) Bank Account Information
3) Payment Information (Credit Card Information) Confidential Business Information:
4) Physical Addresses (Home or Business
Addresses) Non-public Information (Trade Secrets)
5) Billing Information (Transaction History) Financial Data and Financial Concerns
6) Company Information (Who bought what) Data that released ill-timed could harm business
Intellectual Property: o Protects Functional or Ornamental Features
Trade Secrets IT Systems and Infrastructure
o Protects Secret Information Servers:
Trademarks Networking Infrastructure
o Protects Brand Cloud Assets
Copyrights Operational Systems:
o Protects work of Authorship
Patents System Credentials
Factory System
Cyber Threat Intelligence automatically investigate all attacks and learn from the attacks in our network
environment. Threats are analyzed in minutes, empowering our team to outpace the enemy with smarter,
faster responses than without Cyber Threat Intelligence.
Cyber Threat Intelligence will orchestrate defenses with custom alerts of compromise generated by threats
from our network systems, allowing us to defend against future attacks and current attacks proactively.
Cyber Threat Intelligence will get ahead of attackers with groundbreaking intelligence provided by the third
party of threat analysts, security researchers, experts, and white hat's to secure our network. Collecting
information from the cyber community, analyzing it into sufficient intelligence we can act on.
Final Statements
It is recommended that Western Digital from the high levels of the company understand the cyber threats it
faces daily. If this plan were to be implemented, it would significantly improve the security posture and help
mitigate any possible attacks that are to come against Western Digital. The cost of a breach dramatically
outweighs the cost to implement standard and proper security policies and practices. Cybersecurity has become
a world concern, and we must protect our assets from harm as well as provide the assurance to our customers
and clients that we take security very seriously through action and not reaction.
References
MITRE (January 10, 2010). Risk Mitigation, Planning, Implementation, and Progress Monitoring. Retrieved at
https://www.mitre.org/publications/systems-engineering-guide/acquisition-systems-engineering/risk-management/risk-
mitigation-planning-implementation-and-progress-monitoring
OCPatentLawyer (2019). Four types of intellectual property you can use to protect your idea and how to use the.
Retrieved at https://ocpatentlawyer.com/four-types-intellectual-property-protect-idea/
Norton (2019). What is the Difference Between Black, White, and Grey Hat Hackers? Retrieved at
https://us.norton.com/internetsecurity-emerging-threats-what-is-the-difference-between-black-white-and-grey-hat-
hackers.html
DigitalGuardian (September 11, 2018). What is a Phishing Attack? Defining and Identifying Different Types of Phishing
Attacks. Retrieved at https://digitalguardian.com/blog/what-phishing-attack-defining-and-identifying-different-types-
phishing-attacks
TrendMicro (September 24, 2015). Spear Phishing 101: What is Spear Phishing? Retrieved at
https://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/spear-phishing-101-what-is-spear-phishing
VMWare (March 22, 2016). Protecting the Brand: Cyber-Attacks and the Reputation of the Enterprise. Retrieved at
https://www.vmware.com/radius/cyber-attacks-and-the-reputation-of-the-enterprise/
Symantec (July 18, 2002). Justifying the Expense of IDS, Part One: An Overview of ROIs for IDS. Retrieved at
https://www.symantec.com/connect/articles/justifying-expense-ids-part-one-overview-rois-ids
TechRepublic (October 3, 2018). The six most popular cyberattack methods hackers use to attack your business
Retrieved at https://www.techrepublic.com/article/the-6-most-popular-cyberattack-methods-hackers-use-to-attack-your-
business/