You are on page 1of 10

1

ACME Company Threat Assessment

[By]

Student Name

Institution

Course

Professor

Date
2

A threat has happened recently or has been identified and poses a risk to the program or

the organization as a whole. Additionally, some systems encourage daily threat assessments so

that users can always be ready for anything. A Threat Assessment is an investigation into any

identified threats' veracity and potential impact. Security risk management often conducts a

threat assessment before making measures to mitigate dangers to the business. Identifying and

evaluating potential hazards is the first step in the threat assessment process. The next step is to

assess the issue's critical and devise a strategy to fix the underlying weakness (perhaps by sink

holing or redirecting it) finally, a follow-up evaluation and preventative measures. Predatory

threats, also known as offensive or targeted threats, are the most common subjects of threat

assessments.

vulnerabilities in the Risk domain of people

Weak, stolen credentials

It is common for people to reuse weak passwords across multiple accounts. If users

reuse the same passwords and user IDs, hackers will have more access points to exploit.

Usually, brute force assaults occur when a threat actor tries to gain unauthorized access to data

and systems by systematically trying as many users and presumed passwords as feasible. If the

actor is successful, they can acquire access to the design and assume the identity of a legitimate

user, giving them time to steal data, plant backdoors, learn more about the procedure for use in

future assaults, and perform other malicious actions. In the business world, the risk of a

hacking attack on networked resources increases when employees choose easier and weaker

passwords. When an employee's credentials are stolen from other sites, and those credentials
3

have the same password that grants them access to your privileged networks, the hackers can

essentially stroll in, masquerading as the user.

Broken Authentication

Authentication failure generally results from improperly deployed session management

features (ALAHMAD et al., 2022). By bypassing standard authentication procedures, an

attacker can gain access to a system with the same permissions as the targeted user. When an

attacker has access to enough sensitive information about a user, such as their password, key,

or session token, to impersonate that user, the authentication system has been "broken."

vulnerabilities in the risk domain of process

Missing Function Level Access Control

There is a security hole at the function level if there are insufficient permission checks

for handling sensitive requests. A common security flaw lets malevolent users access restricted

resources by elevating their permissions to the function level. When an attacker gains

administrative access, they often do so by altering a parameter of a privileged function and

sending corrupt requests. Obtaining access to APIs is the first step in a function-level

authorization attack that fails (APIs). By posing as a legitimate user or phishing for credentials,

a malicious person acquires access to the program and then scans it for vulnerabilities (Roy et

al., 2018). Examples of these include allowing direct access to resources and allowing the user

interface to display protected information. Intruders can use these flaws to obtain private data

and elevate their privileges within the program.


4

Security Misconfigurations

Failure to specify, implement, and maintain default values for security settings leads to

security misconfigurations. If this happens, the system is likely not set up to meet the security

standards established by the industry (such as the CIS benchmarks, OWASP Top 10, etc.) that

are essential for keeping the system safe and minimizing the risk to the organization. When a

system or database administrator or developer fails to correctly configure the security

framework of an application, website, desktop, or server, it leaves dangerous open routes for

hackers.

vulnerabilities in the risk domain of technology

Software bugs

A bug is a design fault in computer software or hardware that hackers could use to gain

unauthorized access (Sadeghi et al., 2021). These security flaws open the door to attacks on

multiple fronts, putting at risk the identities of users and their access privileges, the privacy of

sensitive information, and the integrity of stored files.

Unpatched software

Unpatched software is one that still has a bug in it that could compromise user data.

When a security flaw has been discovered but not yet patched, it is said to be "unpatched."

Attackers can exploit this vulnerability by executing malicious code (Yeboah-Ofori, 2020).

Adversarial Mindset
5

Adversarial mindset when assessing vulnerabilities in the risk domain of people

Communication and visibility

ACME Company security's primary objective is to conduct reconnaissance. Scanning a

company's publicly accessible systems can tell hackers a lot about the organization's internal

network and any weaknesses it may have. After breaking into a system, the first thing a hacker

does is set up a permanent link so that they can keep monitoring the system. As a result, a

security team at ACME Company prioritizes preventing hackers from exchanging information

with internal systems. Keeping in constant contact with infected devices is crucial for botnets

and crypto-jacking malware, which use their processing power for DDoS attacks and

cryptocurrency mining, respectively. ACME Company plans to increase its defenses

significantly against these threats by regularly implementing Monitoring and deploying

security fixes to the systems.

Adversarial mindset when assessing vulnerabilities in the risk domain of process

Implement elite training

ACME Corporation employs military-minded "train, train, train" strategies against

plausible foes. ACME will expose security teams to actual scenarios that can happen during an

assault on the corporation, hence enhancing their ability to fend off any attacks from hackers,

regardless of their expertise level. To gain insight, ACME will allow its IT teams to take on the

roles of attackers used by ACME Company in conjunction with a layered attack simulation to

evaluate the resilience of the company's people, networks, applications, and physical security

controls.
6

Adversarial mindset when assessing vulnerabilities in the risk domain of technology

Broadening existing platforms of multilateral engagement

When it comes to the application of current international law or political norms to state

uses of particular technologies, ACME Company provides clarity on how a wide range of

parties (not just governments) might contribute responsibly to multilateral bodies' efforts in this

area. Information and communications technology (ICT), machine learning, autonomous

weaponry, biotechnology, and space technology are all examples of topics that have their own

dedicated working groups on these platforms, along with issues of international security.

Infrastructure Diagram

Organizational Protection

People

Implement a pen test to prevent weakly, stolen credentials


7

ACME Company implements Penetration testing to evaluate a system or network with

various malicious approaches to find security flaws in the application. This method tests the

vulnerable parts of a system via a controlled mock assault. This evaluation aims to protect

sensitive information from intruders like hackers. When a security hole is found in a system, it

is exploited to steal data.

Implement multifactor authentication to mitigate broken authentication

Multifactor authentication is one of the primary methods ACME Company utilizes to

stop attacks like brute force, credential stuffing, and password spraying (MFA). Attackers

would need both compromised credentials and the second-factor device to access an account

protected by multifactor authentication. With MFA in place, it would take an extremely long

time and effort to compromise the account, making it impractical for a large-scale attack.

Process

Role-based access control to mitigate missing function level access control

ACME Company implemented Role-based access control (RBAC) to limit users'

network access depending on their assigned function in the company. Access permissions for

users on the network are categorized into "roles" in RBAC. Workers have access to only the

data they need to do their jobs properly. Authority, responsibility, and demonstrated skill in the

relevant field all play a role in determining who has access. Additionally, users are only able to

perform specific actions on the system, such as viewing, creating, or modifying files.

Encrypting data to prevent security misconfiguration


8

ACME Company supplies Encryption of storage media, correspondence, and data is all

possible with the help of data protection solutions. The Encryption, device, email, and data

control features will be included. When data leaves the company's control, it is still encrypted

automatically to prevent unauthorized access or disclosure. The best data loss prevention

solutions enable employees to keep using email for business and collaboration while

automatically labeling, classifying, and encrypting critical information.

Technology

Test drive development to control software bugs

ACME Company implements Test-driven development (TDD), a novel approach to

software development. It considers testing an ongoing activity that should be done in tandem

with code creation. In TDD, the developer creates unit tests to guarantee that the code

continues to function as expected. The method is more of a manner of doing things than a set

of tools.

Code scanners to solve unpatched software.

Code scanners are put in place to ensure that all open-source parts of the software

project are examined. This is done by examining the software's code repositories, package

managers, and build tools. It lists all the open-source resources used in a project and their

dependencies (open source bill of materials). It records the necessary metadata, such as the

project's place of origin, license type, and version number. Like many other technologies used

in network administration, a vulnerability scanner can be put to good and bad ends. The system

administrator, programmer, security researcher, penetration tester, or black hat hacker may find
9

this helpful. You can use it to find vulnerabilities in your network and patch them, or you can

use it to find exploits to break into other networks.

Discuss how to balance the implementation of controls between simple fixes and

organizational concerns.

Our research has shown that a management system based on the balanced scorecard

framework is the most effective means of harmonizing security strategy and organizational

framework. ACME Company unit performance will be driven by the framework's tools, which

will be used by managers at all levels of the company, from regional sales managers to group

CEOs. With the help of strategy maps, managers can articulate the chain of events to realize

the unit's value proposition. The scorecard can put that plan into action and track its progress

effectively. Therefore, a balanced scorecard-based system will serve as both a guide and a

common language for collecting and sharing data on the safety of the business.
10

Reference

ALAHMAD, M., ALKANDARI, A., & ALAWADHI, N. (2022). SURVEY OF BROKEN

AUTHENTICATION AND SESSION MANAGEMENT OF WEB APPLICATION

VULNERABILITY ATTACK. Journal of Engineering Science and Technology, 17(2),

0874-0882.

Roy, S., Das, A. K., Chatterjee, S., Kumar, N., Chattopadhyay, S., & Rodrigues, J. J. (2018).

Provably secure fine-grained data access control over multiple cloud servers in mobile

cloud computing-based healthcare applications. IEEE Transactions on Industrial

Informatics, 15(1), 457-468.

Sadeghi, A. R., Rajendran, J., & Kande, R. (2021, June). Organizing The World's Largest

Hardware Security Competition: Challenges, Opportunities, and Lessons Learned. In

Proceedings of 2021 on Great Lakes Symposium on VLSI (pp. 95-100).

Yeboah-Ofori, A. (2020). Software reliability and quality assurance challenges in cyber-

physical systems security. International Journal of Computer Science and Security

(IJCSS), 14(3), 115-130.

You might also like