===============================



 

BUSINESS CONSULTING, TECHNOLOGY INNOVATION, 

APPLIED ENGINEERING, SCIENTIFIC RESEARCH,

PRECISION MANUFACTURING

Mathematical Business Decision Modeling, Inc
DC
United States

ph: +1-202-423-0204

info@bdm-sce.com

  • ABOUT US
  • 8A CERTIFICATION
  • SUPPLY OF PARTS
  • MANUFACTURING
  • CONSULTING
  • CLIENTS
  • LEADERSHIP
  • CONTACT US
  • Business Decision & Econometric Modeling
  • Cybersecurity Simulations - Why they are necessary
  • Defense Capability Modeling and Rockwell Automation
  • Logistics and Supply Chain Modeling
  • Technology Process Design & Business Intelligence
  • Operations Management Consulting
  • Data Mining & Applied Statistics
  • Lean Six Sigma
  • Maintenance Management

CYBERSECURITY SIMULATIONS

The Scope of the Cybersecurity Problem

  • Cybersecurity Simulations

    This video provides an overview of some of the critical implications of Cybersecurity Weaknesses and why it has become necessary to be able to build simulations that aid in "surfacing" weaknesses in our Networking Systems and our Critical Operations Systems that govern our safety. The potential scenarios of how these attacks could occur cannot and should not be left to chance - the risks are too great. Robust simulations aid in building an understanding of how attacks could occur and in preparing our responses and strengthening our defenses against such attacks.

  • Cyber Security and You...
    Bloomberg's Allan Holmes moderates a conversation with former CIA Director Gen. Michael V. Hayden, Dell SecureWorks' Jon Ramsey, and AGT International's Mati Kochavi - worth watching.

SOME KEY EXAMPLES:

  • AIR- A government watchdog is warning that cybersecurity weaknesses could lead to disruptions and undermine the safety of the nation's air traffic control system. The Government Accountability Office says the Federal Aviation Administration has taken steps to protect the air traffic system from cyber-based threats, but that, quote, "significant security control weaknesses remain. "One area of weaknesses is the ability to prevent and detect unauthorized access to the vast network of computer and communications systems the FAA uses to process and track flights around the world. There also are inadequate protections to prevent entry into air traffic computer systems from other, less-secure computer systems not directly involved in traffic operations. The FAA said it is aware of the importance of the matter and has achieved several milestones in improving its cybersecurity.


  • Nature of Attacks
    The nature of the attacks depend on the tools used and the intensity and precision. Collaborative efforts leads to even more damaging consequences. The nature of collaboration inclusive of the one adopted by Anonymous makes it near impossible to crack. The common threats to internal systems and online channels are social engineering (phishing) vulnerability exploit, malware infection leading to fraud scheme execution and consequent money loss, data exfiltration and consequent enterprise breach.

    Every company in the world is being hit by viruses, worms and trojans. Malware, botnets, web based attacks, denial of service, malicious code, phishing and stolen devices add to the woes. Source code, which is at the root of malicious code, is generally free and available to anyone through well-known kits posted on underground forums. Zero day or a vulnerability being exposed for the first time is the prize catch for the hackers and is being sold for a price and for lots of other purposes. McAfee’s Malware Zoo in undoubtedly the world largest with 110 million species.

    Many hackers are in this trade and they deploy a variety of extremely sophisticated methodologies. Groups like Anonymous have targeted government organisations and businesses in the past, but now they are engaged in the cyber war with ISIS, the mostly deadly terror group in the world.

    - See more at: http://computer.financialexpress.com/magazine/cyber-security-a-challenge-for-mankind/11140/#sthash.AjEidkXi.dpOnline Security and Privacy Issues Come First

    CYBER ATTACK REALITIES - The reality is hackers are more likely to target companies with poor security. A security breach for a small business could lead to its failure. Target’s data breach has left the business reeling, resulting in the replacement of Chief Executives in both the U.S. and Canada. Additionally, the hole in the company’s cyber security system ultimately ended up costing Target an estimated $148 million.

    This enormous loss should make one lesson painfully clear; go to great lengths to protect your business’s data or suffer the consequences. In the digital age, no matter the size or reach of your business, everyone relies on digitized data for day to day operations.

    JP Morgan also learned this lesson the hard way and as a result now spends $250 million per year on digital security which it plans to double in the near future. This is a huge investment on JP Morgan’s part which could very likely set a precedent for businesses who are ready to invest in such precautionary measures.

    It is more crucial now than ever for companies to keep close watch on the data that is transferred in to, out of, and within the company because data is the new currency. With the number of companies hacked in 2014, every business owner should be asking one question, “How much should be spent on data security in comparison to the loss the business would incur in the event of a breach?” Security should be the foremost concern for any company operating today.

    How to Strengthen Digital Security

    The first step to reinforce digital security for a business is to ensure that the plan currently in place is not one that is reactive, but proactive instead. Too many organizations have a contingency plan in place for the aftermath of a breach versus a plan to prevent a breach, or at least render the data useless to hackers.

    Several steps can be taken to ensure that data stays protected:

    • Encrypt everything. This technology allows for restricted access to files and renders data useless to those not in possession of the key, greatly diminishing its value and chance of being targeted. The process may at times be challenging, but it is a necessary implementation for security.
    • Train employees to recognize threats. For many organizations it is mandatory for employees to receive training to recognize phishing attacks, malware sites, etc. Be sure that all employees within your organization are aware that security should be everyone’s concern, not just a single department’s.
    • Test systems on a regular basis. Look for holes in the security system much like a hacker would. Ensure systems are properly maintained and operating as such. Test employees by sending out fake phishing emails to validate that security training has taken root for the whole of the organization.

    On a daily basis hackers invent new strategies and develop new codes to steal information online that is viewed as vulnerable. With giants such as Sony, Amazon, and JP Morgan under fire, it sends a crystal clear message to business owners the world over; no company, or individual for that matter, is invulnerable from attack and theft.

    These problems will persist and get worse before they get better. The time to pull out all the stops in digital security is now.

    What steps have you put into place to keep your data secure? 


CONTACT US...




SOME KEY RESPONSES:

CYBER SECURITY - The Army's View: Cyber is not just a network. We operate in a contested environment which therefore makes it critical to improve our defense systems. These key defensive positions are manned by our Soldiers, civilians and contractors who need support to maintain the immediate tactical edge and expand strategic boundaries.

Network dominance is an integral part of the cyber fight – today and tomorrow. Cyber threats demand new approaches to managing information, securing information, and ensuring our ability to operate. Cyberspace is on par with the other war-fighting domains of land, sea, air and space. It is in cyberspace that we must use our strategic vision to dominate the information environment throughout interdependencies and independent systems.

The U.S. Army Cyber Command's breadth of responsibility spans the entire Army and the entire world - from the tactical edge to the strategic enterprise-level or national levels. Traditional boundaries no longer exist and anonymous attacks can occur literally at near light speed over fiber optic networks. Our enemies will deny the freedom of movement on our networks and use whatever they can from wherever in the world they are to gain advantage.

Army Cyber Command and Second Army continuously plans, coordinates, integrates, synchronizes, directs and conducts cyberspace operations as authorized, or directed, to ensure freedom of action in cyberspace, and to deny the same to our adversaries.

Cyber Command is composed of a professional team of elite warriors defending Army networks and providing full spectrum cyber, enabling mission command and providing global advantage! The cyber war fighting requires impact, integration, risk, and knowing ourselves, the enemy, and the cyber terrain.

We are the Army leader in operating, maintaining, and defending the network.

 

CONTACT US...




  

Copyright 2015 - Mathematical Business Decision Modeling, Inc. All rights reserved - Web Hosting by Yahoo! - Heaven Hosting By God!

Mathematical Business Decision Modeling, Inc
DC
United States

ph: +1-202-423-0204

info@bdm-sce.com