According to Center (2013), reports show that APT 1, when having access to the network of a victim, continued to access that network over a long period, thus stealing hundreds of terabytes of data from victim organizations and individuals. Its actions have been reported to be uncoordinated and criminal, thus causing global security and economic concerns. However, APT 1 has been charged with originating threats and causing several network breaches of the ATP. It receives government support, and thus it has been termed as the most persistent cyber threat actors of china. Over the past few years, APT 1 has been linked with the highest cyber espionage campaigning against a wide range of victims. These tools include the inbuilt administrative features and tarpit tools to identify any malware in the environment and to verify the antivirus and anti-spyware systems.ĪPT 1 is a single organization that is part of the Advanced Persistent Threat groups around the world. As such, the CSC 8 system uses various tools to ensure that all the antivirus signatures are up to date.
CRITICAL SECURITY CONTROLS VERSION 7 INSTALL
Failure to install a malware defense system may increase the risk of Internet threats that nay is deigned to attack devices, data, or systems. The CSC 8 is also a very critical control system because it is designed in a way that avoids malware, updates the system defenses, and disables malicious software. This control system is altered by controlling the installation and spread of malware codes while using automation to increase the updating of defense systems, corrective action, and data gathering. The firewall detects a security breach on time, which prevents the uploading of malicious codes and other hacking tools.ĬSC 8, on the other hand, is the malware defenses.
![critical security controls version 7 critical security controls version 7](https://klariti.com/wp-content/uploads/2011/07/interface-control-document-template-2.gif)
Therefore, to fix or address attacks, this system has a firewall, which is one of the most active forms of protection against security breaches. Failure to implement this control may lead to increased risk of entry of malicious codes, loss of essential information, and other forms of attacks.
![critical security controls version 7 critical security controls version 7](https://5fbb4b60e5a371522c26-c46478628be7be7c70f96ec65a31d1c7.ssl.cf3.rackcdn.com/Images/ProductImages/Big/DREAMGIRL_Deep_Red_Strappy_Garnet_Gaterslip_146092_3c5b.jpg)
This is because clients directly interact with their users or other websites, which increases their technical flexibility and complexity. Inherently, CSC 7 is a very critical system as the email and web browsers are common points of entry and attack. It is responsible for reducing the surface of attack and any openings for attackers to control human behavior through the activities with the email and browser systems. On the one hand, CSC 7 is the email and web browser protections.
![critical security controls version 7 critical security controls version 7](https://www.mcafee.com/wp-content/uploads/2021/06/Screen-Shot-2021-06-28-at-2.35.49-PM-1024x494.png)
For this part, I have chosen CSC 7 and CSC 8.