Activities using the ciscos talos threat intelligence

Assignment Help Other Subject
Reference no: EM133793909

IOC Exercise

Overview:

In the exercise you will review several artifacts provided to you that are suspicious and could be IOCS. You need to analyze each artifact and determine if it should be isolated or cleared for general use by your organization.

Be sure you have completed the previous exercises using Alient Vault OTX, Cisco Talos, Nmap, Maltego, Virus Total and Google Dorks as you should use one of more of these tools to address and analyze each of the artifacts and questions.

Use the Advanced Cyber Threat Intelligence Report Template to record your results. Note, your results will most likely be different from other students and from the screenshots shown in this document.

Exercise Steps:

1. Answer the questions found in section 4 of the Advanced Cyber Threat Intelligence Report

A department in your organization has asked permission to have access to several web sites that currently appear to be blocked. The sites include: mars.umgc.edu, linuxhint.com, financereports.co, creativebookmark.com. Use Threat Intelligence tools to make a recommendation for each site. Be sure to justify using data and screenshots from the tools your decision.

An employee in your organization has had issues with their computer and is concerned if they may have a virus. Several files were uploaded to a safe sandbox for processing and analysis. The following SHA-256 hashes were submitted. Use appropriate tools to determine if any of the files should be quarantined.

For any hashes that are flagged as malware or malicious, provide more details to include a description of the specific threat, the virus or threat name, and the most recent attack date.

Your IT staff is short-staffed and need some assistance generating SHA-256 hashes for several files. This work is to verify the safety of the files in terms of malware but also for downloads processes so those using your organization's data can confirm the hashes are identical.

After you generate the SHA-256 hashes, use a threat intelligence tool to verify there are no issues with malware.
For your report, list the SHA-256 results for each file along with a note stating if any issues were reported from the hash analysis. Provide screenshots verifying your malware analysis for each hash analysis.

Finally, in 4-6 paragraphs summarize your experience using threat intelligence tools. From your experience, discuss strengths and weaknesses for each tool used. Discuss your future envisioned use and tools that might be considered. For example, does it make sense to invest in commercial threat intelligence tool that uses multiple OS-INT and other sources, providing real-time alerts and visualization capabilities? If so, which tools might be good choices and why?

Cisco Talos Exercise
Overview:

In the exercise you will conduct some specific activities using the Cisco's Talos Threat Intelligence web site. After completion, you will be comfortable navigating the tool and categorizing emails from locations across the world.

Use the Advancec Cyber Threat Intelligence Report Template to record your results. Note, your results will most likely be different from other students and from the screenshots shown in this document.

Reference no: EM133793909

Questions Cloud

What are the mechanisms of action of the drugs in the table : Which one-pill regimen would you prescribe? Provide rationale for your choice. What are the mechanisms of action of the drugs in this tablet?
Nursing leaders play crucial role : Nursing leaders play a crucial role in both the preparation for and response to disasters, whether they are natural
Increased thirst-frequent urination and weight loss : Angie is a 45-year-old female with extreme fatigue, weakness, increased thirst, frequent urination, and weight loss.
Important to join professional associations : Why is it important to join professional associations? Identify a professional association in nursing that you would join.
Activities using the ciscos talos threat intelligence : Activities using the Ciscos Talos Threat Intelligence web site. After completion, you will be comfortable navigating the tool and categorizing emails
What is the pathophysiology : What is the pathophysiology, health promotion and disease prevention, risk factors, expected findings, laboratory test, diagnostic procedures,
What key components should included in palliative care plan : The healthcare team is developing a care plan. What key components should be included in the palliative care plan for this patient?
Diagnosis of dementia : Your patient has a diagnosis of dementia and you are giving them their evening medications.
True regarding end-of-life care : A huge part of the nursing career is being advocates for our patients, this is also true regarding end-of-life care.

Reviews

len3793909

11/25/2024 1:05:10 AM

That is the pdf guide for the Cisco Talos exercise. I just need 3(a) answered with a sreenshot too. I colored it in the word document for emphasis. This is the instruction for the exercise in the word document I need 3a done on the Cisco talos assignment. The question is highlighted in the word document. I ll need a screenshot too

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd