Changes

m
Line 13: Line 13:  
*In 2013, nonspecialists became more aware of nation-state cyberattacks with Mandiant's release of the [https://www.mandiant.com/resources/apt1-exposing-one-of-chinas-cyber-espionage-units APT1 Report], which outlined how China was able to quickly steal intellectual property from US firms.   
 
*In 2013, nonspecialists became more aware of nation-state cyberattacks with Mandiant's release of the [https://www.mandiant.com/resources/apt1-exposing-one-of-chinas-cyber-espionage-units APT1 Report], which outlined how China was able to quickly steal intellectual property from US firms.   
 
*In 2014, [[NIST]] released its first cybersecurity framework, which conceptualized how to identify, protect, detect, respond, and recover from attacks.<ref>[https://www.nist.gov/cyberframework Cyberframework, NIST]</ref>
 
*In 2014, [[NIST]] released its first cybersecurity framework, which conceptualized how to identify, protect, detect, respond, and recover from attacks.<ref>[https://www.nist.gov/cyberframework Cyberframework, NIST]</ref>
 +
*In 2022, [[Peiter Zatko]], aka Mudge, former chief security officer at [[Twitter]], blew the whistle on his ex-employer's extensive cybersecurity vulnerabilities, including allowing too many of its staff access to the platform's central controls and most sensitive information without adequate oversight, with one or more such employees working for a foreign intelligence service; misleading its own board and government regulators; opening the door to foreign spying or manipulation, hacking and disinformation campaigns; not deleting users' data after they cancel their accounts; not understanding/reporting the true number of bots on the platform.<ref>[https://www.cnn.com/2022/08/23/tech/twitter-whistleblower-peiter-zatko-security/index.html Ex-Twitter exec blows the whistle, alleging reckless and negligent cybersecurity policies, CNN Business]</ref>
    
==Tools & Techniques==
 
==Tools & Techniques==
Line 18: Line 19:  
* Machine Learning
 
* Machine Learning
 
* [[MITRE ATT&CK]]
 
* [[MITRE ATT&CK]]
 
+
* Red Teams
==Government Involvement==
+
* Blue Teams
 +
* Purple Teams
 +
** Threat Informed Defense<ref>[https://ctid.mitre-engenuity.org/our-work/ Our Work, CTID, Mitre Engenuity]</ref>
 +
==Sectors==
 +
===Government Involvement===
 
Government leaders have different understandings and expectations of how involved a government should be in a nation’s cybersecurity.  
 
Government leaders have different understandings and expectations of how involved a government should be in a nation’s cybersecurity.  
 
McKinsey suggests considering several questions to ascertain a government’s role in cybersecurity.<ref>[https://www.mckinsey.com/industries/public-and-social-sector/our-insights/asking-the-right-questions-to-define-governments-role-in-cybersecurity# Defining Govts' Role in Cybersecurity, McKinsey]</ref>
 
McKinsey suggests considering several questions to ascertain a government’s role in cybersecurity.<ref>[https://www.mckinsey.com/industries/public-and-social-sector/our-insights/asking-the-right-questions-to-define-governments-role-in-cybersecurity# Defining Govts' Role in Cybersecurity, McKinsey]</ref>
Line 31: Line 36:  
#*Australia introduced a notifiable-data-breaches scheme in 2017, making it a legal requirement to notify affected individuals and the Office of the Australian Information Commissioner of serious data breaches.
 
#*Australia introduced a notifiable-data-breaches scheme in 2017, making it a legal requirement to notify affected individuals and the Office of the Australian Information Commissioner of serious data breaches.
 
# Relationship with the private and academic sectors?
 
# Relationship with the private and academic sectors?
#*Singapore’s National Cybersecurity R&D Programme supports public–private research partnerships and budgeted $190 million Singapore dollars ($137.85 million) in the national strategy for the creation of the National Cybersecurity R&D Laboratory at the National University of Singapore.
+
#*Singapore’s National Cybersecurity R&D Programme supports public-private research partnerships and budgeted $190 million Singapore dollars ($137.85 million) in the national strategy for the creation of the National Cybersecurity R&D Laboratory at the National University of Singapore.
 
# How does it define national critical infrastructure?
 
# How does it define national critical infrastructure?
 
#*In the United States, the Department of Homeland Security coordinates a national infrastructure-protection plan and requires sector-specific agencies, such as the [[Cybersecurity and Infrastructure Security Agency]] (CISA) to develop sector-specific plans.
 
#*In the United States, the Department of Homeland Security coordinates a national infrastructure-protection plan and requires sector-specific agencies, such as the [[Cybersecurity and Infrastructure Security Agency]] (CISA) to develop sector-specific plans.
 +
===The Industry===
 +
When the development for computers expanded from bureaucratic firms to daily use for the public, some companies were developed along the way to protect their devices from malware and vulnerabilities especially for those using Microsoft based product. The work for cybersecurity started to be adopted by ISPs where for some known websites are blocked when an individual sends a request to a website and this is usually done by monitoring cybercrimes from a particular service or checking [[SSL Certificate|secure socket layer certificate]] for the website. The web hosting industry have been doing many additional research to protect their servers and clients which up to date there are still weaknesses that this industry suffers from time to time, AWS is one of the popular service that it focused on cybersecurity and legitimacy for clients and businesses.
   −
==The Industry==
   
===Providers===
 
===Providers===
 
[[File:Billion-dollar cybersecurity exits, CB Insights.png|655px|right|(CB Insights)]]In the past decade, two dozen [[:Category:Cybersecurity Providers|cybersecurity startups]] have attained IPO or M&A values of at least US$1 billion; 10 of them since 2017.<ref>[https://www.cbinsights.com/research/cybersecurity-billion-dollar-exits-infographic/ Cybersecurity Exits, CB Insights]</ref>
 
[[File:Billion-dollar cybersecurity exits, CB Insights.png|655px|right|(CB Insights)]]In the past decade, two dozen [[:Category:Cybersecurity Providers|cybersecurity startups]] have attained IPO or M&A values of at least US$1 billion; 10 of them since 2017.<ref>[https://www.cbinsights.com/research/cybersecurity-billion-dollar-exits-infographic/ Cybersecurity Exits, CB Insights]</ref>
Line 58: Line 64:  
* [[Ginni Rometty]]
 
* [[Ginni Rometty]]
 
* [[Dan Kaminsky]]
 
* [[Dan Kaminsky]]
 +
* [[Mudge]]
 +
 
==References==
 
==References==
 +
 +
[[Category:Articles to be expanded]]