Performing information governance: Golden triangle components for apts countermeasures

×

Error message

  • User warning: The following theme is missing from the file system: journalijdr. For information about how to fix this, see the documentation page. in _drupal_trigger_error_with_delayed_logging() (line 1138 of /home2/journalijdr/public_html/includes/bootstrap.inc).
  • Deprecated function: implode(): Passing glue string after array is deprecated. Swap the parameters in drupal_get_feeds() (line 394 of /home2/journalijdr/public_html/includes/common.inc).
  • Deprecated function: The each() function is deprecated. This message will be suppressed on further calls in _menu_load_objects() (line 579 of /home2/journalijdr/public_html/includes/menu.inc).

International Journal of Development Research

Performing information governance: Golden triangle components for apts countermeasures

Abstract: 

Advanced Persistent Threats (APTs) use multiple processes to break into a system, avoid detection, harvest valuable information, and inflict serious harm to an organization. It may help us perform information governance to implement security policies, identify risk assessment, and block computer packets. There is still a lack of standards in the APTs investigation processes. In order to obtain the required evidences in the court for prosecution, the golden triangle components (People, Process and Technology) for APTs counter measures have been carried out in this study. Since information security is vital for developing and running an efficient business, this study constitutes a strategic approach to improve the information security. The result of this study is also expected to improve the APTs investigation process and place emphasis on potential possibilities of gathered evidence. The golden triangle components of this proposed methodology is illustrated by applying to some APTs incidents in Taiwan.

Download PDF: