What’s in your ______?

Samuel L. Jackson, the melodramatic actor and sizable voice of the Atlanta Falcons “Rise Up” campaign, asks, “What’s in your wallet?” Less the boisterous voice and charismatic smile, I ask, “What’s in your ______?”  Perhaps, the answers are basket, future, heater, mirror, window or Cybersecurity Incident Response (IR) Plan.  The latter, IR Plan, is preferable when discussing cybersecurity.  The City of Atlanta is hosting Super Bowl LIII on Sunday, February 03, 2019, and cybersecurity teams are watching the game?   Who will be monitoring event logs? What’s in your ______?  A cybersecurity incident has been trending as the largest cybersecurity incident in the 21st century, surpassing Yahoo’s (Altaba) cybersecurity breach in 2014.  Starwood Hotels database breach dwell time had lasted 4 years according to Finkle and Panchadar’s article.  The number of affected customers is approximately 500 Million.  Although the number of customers affected is massive, dwell time is unbelievable.  And, dwell times are trending in years before detection rather than days.  Dwell time is the time period between initial breach and mitigation (removal or quarantine). Dwell times are not fake-texting out loud. Recently, the famous 1-800-Flowers announced a malware on its website for 4 years according to Whittaker.  Without extensive data research in support of premise, false alarms could be implicit culprits of lengthy dwell times. Intrusion Detection Systems (IDS) are designed to passively detect, log and alert for threats and anomalies (e.g., policy violations). The common types of IDS are signature-based intrusion detection systems, host-based intrusion detection systems (HIDS), network intrusion detection systems (NIDS), perimeter intrusion detection systems (PIDS), stack-based intrusion detection systems and VM-based intrusion detection system (VMIDS).  In addition to, anomaly-based intrusion detection systems are known for higher false alarms.  Two major categories of false alarms are false positives and false negatives.  A good example of a false positive is when legitimate emails are sent to spam folders for various policy violations. George Horne, author of an Italian proverb, says, “When a man deceives me once, it is his fault; when twice, it is mine.” What’s in your ______?

Resources:
Armerding, T. “The 17 biggest data breaches of the 21st century.” 26 January 2018,  csoonline.com, https//www.csoonline.com/article/2130877/data-breach/the-biggest-data-breaches-of-the-21st-century.html. Accessed 13 December 2018.
Breig, J. “Out, Damn’d Proverbs: Eighteen-century axioms, maxims, and bywords.” The Colonial Williamsburg Foundation, http//www.history.org/foundation/journal/winter02-03/proverbs.cfm. Accessed 15 December 2018.
Dwoskin, E. “How Yahoo came up with its new name: Altaba.” 09 January 2017, The Washington Post, https//www.washingtonpost.com/news/the-switch/wp/2017/01/09/how-yahoo-came-up-with-its-new-name-altaba/?noredirect=on&utm_term=.7c7451566a7d. Accessed 13 December 2018.
Finkle, Jim and Panchadar, Arjun. “Marriott’s Starwood hack hits up to 500 million customers.” 30 November 2018, Reuters, Yahoo.com, https//www.yahoo.com/news/marriotts-starwood-database-hacked-500-million-guests-may-124133085–finance.html. Accessed 13 December 2018.
GitHub Inc. https//github.com/vz-risk/VCDB/issues/12656. Accessed 13 December 2018.
“Intrusion Detection.” 27 March 2017, OWASP ASDR Project, https//www.owasp.org/index.php/Intrusion_Detection. Accessed 15 December 2018.
“Intrusion Detection System. “11 December 2018, Wikipedia, The Free Encyclopedia, Wikipedia, The Free Encyclopedia. https//en.wikipedia.org/wiki/Intrusion_detection_system. Accessed 15 December 2018.
MacMillan, R. “Breach Detection| Controlling Dwell Time Is About Much More Than Compliance.” 11 December 2017,  Medium.com, https//medium.com/secjuice/controlling-dwell-time-its-about-much-more-than-compliance-2a2149e590e. Accessed 13 December 2018.
Shareheads. Windows pie serenade. 29 November 2012. Flickr. https//www.flickr.com/photos/shareheads/8619221649/in/album-72157633379885162/. Accessed 13 December 2018.
“Starwood Guest Reservation Database Security Incident.” 08 December 2018, A Division of Duff & Phelps, duffandphelps.com, https//answers.kroll.com/. Accessed 13 December 2018.
Sweathe. “Five major types of IDS.” 06 April 2008. Advanced Network Security, http//advanced-network-security.blogspot.com/2008/04/three-major-types-of-ids.html. Accessed 15 December 2018.
Whittaker, Z. “Credit card stealing malware on Canada’s 1-800-Flowers website went undetected for four years.” 05 December 2018. Techcrunch.com, https//techcrunch.com/2018/12/03/credit-card-stealing-malware-flowers-four-years/. Accessed 13 December 2018.

Leave a comment