W5 Discussion
W5 Discussion
Third Option: After reviewing, NSA CYBERSECURITY YEAR IN REVIEW 2022, what
are your thoughts? What resonates with you? Analyze 2-3 lessons learned or key points you
would like to share with your classmates.
For this week's discussion, I chose the third option, which is reviewing the NSA
Cybersecurity Year in Review of 2022, and these were the three lessons I learned that I found
interesting and would like to share with the class.
The NSA's Cybersecurity Collaboration Center (CCC) is a multi-industry partnership system
aimed at protecting the United States' (U.S.) Defense Industrial Base and government
systems. The CCC, along with its partners, shares intelligence and security improvements
with cybersecurity and technology companies to increase their reactivity and cyber-defense
capabilities. The Adversary Defeat team within the CCC is responsible for collaborating with
the CCC's partners to create courses of action (CoA) and rapid responses to high-priority
threats.
Per a discussion topic from last week regarding China, the CCC offers a free cybersecurity
service to its partners to combat the Peoples Republic of China (PRC) intellectual theft
operations in cyberspace. This is primarily helpful for small-to-medium-size businesses
(SMBs) who would not have the capabilities of fighting against nation-state or non-state
actors. The CCC does this through its Protective Domain Name System (PDNS) system,
which clears around 100 million DNS queries daily, blocking 400 million malicious domains,
which include phishing, malware, and botnets.
Lastly, the NSA provides cybersecurity advisors throughout any given year, thanks to its
international partnerships. These timely and actionable reports allow partners to formulate
defensive actions and protocols against international threats. In the report, it recently released
three advisories alone on the Russian threat prior to the Ukrainian invasion and updated its
tactics, techniques, and procedures (TTPs) for the PRC and Iran as the NSA became aware of
their new attack strategies. In addition to state-actor threats, the NSA would also
continuously outline new ransomware trends, new vulnerabilities, and weak security controls
that malicious actors would take advantage of.
References:
Joyce, R., dir. 2022. “NSA Cybersecurity Year in Review 2022.” U.S. Department of
Defense. December 15, 2022. Accessed March 1, 2024.
https://media.defense.gov/2022/Dec/15/2003133594/-1/-
1/0/0139_CSD_YIR22_FINAL_LOWSIDE_ACCESSIBLE_FINAL_V2.PDF.