Need help with your Discussion

Get a timely done, PLAGIARISM-FREE paper
from our highly-qualified writers!

glass
pen
clip
papers
heaphones

responds to the discussion post below in 200 words

responds to the discussion post below in 200 words

responds to the discussion post below in 200 words

Question Description

Cyber terrorism is a persistent and global threat that PBI-FS must prepare for the inevitability of being targeted by a domestic or foreign cyber adversary. Since the world is connected through digital technology, you can no longer rely on local area or regional threat intelligence when planning security and countermeasure strategy against cyber-criminal activity and/or cyber terrorism. Moreover, PBI-FS is operating on foreign soil with past ties to criminal activities which puts them at even greater risk. There are several agencies, forums, and Cyber Threat Intelligence (CTI) communities such as Financial Services Information Sharing and Analysis Centers (FS-ISACs), Information Sharing and Analysis Organizations (ISAOs), and the Cybersecurity and Infrastructure Agency (CISA) for current Intel on cyber terrorism and emerging cyber threats. In addition, PBI should invest in becoming a member of one more of these organizations to stay ahead of all of the threats and additional risk factors that are common to the financial industry. Per CISA (2014), “Large-scale power outages, recent natural disasters, and an increase in the number and sophistication of cyberattacks demonstrate the wide range of potential risks facing the sector”. By collecting and analyzing the data from multiple sources, PBI-FS can strategically plan its cyber defense countermeasures against the threat of cyber terrorism.

With that being said, cyber terrorism is defined the act or “means to damage information, computer systems and data that result in harm against non-combatant targets which can be motivated or inspired by a religious, cultural, social, economic and political agenda” (Littlefield, 2017). It is closely related to “hactivism” but can be purely financially motivated with other factors aforementioned as added justification as in the case of North Korea and ISIS based hackers. More specifically, a recent Cyber Alert (AA20-106A) by CISA provides guidance on a real ongoing threat to the global financial sector by North Korea. PBI-FS is a prime candidate to exploit as it has the qualities or characteristics (US power/considered Infidels) that make it a justifiable target by the aforementioned cyber terrorist organizations.

The Democratic People’s Republic of Korea (DPRK) or North Korea poses several threats to US based interests abroad. Some of the threats that DPRK (cyber terrorism) poses to PBI-FS as reported in CTI briefs and forums is through the use of Malware, Denial of Service, Ransomware and other tactics to disrupt operations or steal data and funds. Moreover, “The DPRK’s malicious cyber activities threaten the United States and the broader international community and, in particular, pose a significant threat to the integrity and stability of the international financial system” (CISA, 2014). As the former IBS business was involved in money laundering involving cryptocurrencies it is important to note that DPRK is infamous for the use of “cryptojacking”, “cyber-enabled financial theft” and a “digital currency exchange hack” that stole over $250 million dollars (CISA, 2014) per the CISA Alert (AA20-106A).

PBI-FS must be aware of the tactics that the DPRK and other cyber terrorist use such as extortion campaigns, and Ransomware (WannaCry 2.0) as well as the other methods mentioned above. At a minimum, PBI-FS should invest heavily into a Security Information and Event Management (SIEM) solution and upgraded Firewall/IDS applications. Moreover, the PBI leadership should respond to the threat landscape by augmenting their security posture by standing up an Incident Response Team of Security operation Center (SOC) that deals with identifying, isolating, mitigation and recovering from cyber-attacks (Secureworks, 2017). These are only recommendations but based on reliable Intel, every effort should be made to stay ahead of the threat agents that are evolving daily.

In closing, PBI-FS must be vigilant in shoring up its defenses against the inevitable threats that it will face during its five year trial period as its own entity. The M&A team should fulfill its responsibilities and perform its due diligence in surveying the threat landscape in an effort to develop the best Cybersecurity Strategy to defend it Business/Project Goals & Objectives. Getting plugged in with the cyber intelligence sharing communities and other CTI organizations is a great way to harden their security posture and get prepared for the fight. Finally, operating on foreign soil also presents its challenges, but if the proper steps and best practices are applied, then PBI-FS will be ready to meet them.

CISA. (2014). Financial services sector. Retrieved from https://www.cisa.gov/financial-services-sector

Littlefield. (2017). Cyber Terrorism: understanding and preventing acts of terror within our cyber space. Retrieved from UMGC reference material CSIA 485.

Secureworks. (2017). Cyber threat basics, types of threats, intelligence & best practices. Retrieved from https://www.secureworks.com/blog/cyber-threat-basi…

Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."

Order Solution Now

Our Service Charter


1. Professional & Expert Writers: Eminence Papers only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Eminence Papers are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Eminence Papers are known for the timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Eminence Papers, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.

We Can Write It for You! Enjoy 20% OFF on This Order. Use Code SAVE20

Stuck with your Assignment?

Enjoy 20% OFF Today
Use code SAVE20