Analysis of the incident and preparation of the report

Assignment Help Computer Engineering
Reference no: EM131969839

Cybersecurity Processes & Technologies

Project: Incident Response Exercise & Report

Your Task

You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident described below. The Blue Team has already created a set of enterprise architecture diagrams (see figures 1-4) to help with your analysis of the incident and preparation of the incident report as required by the company's contracts with the federal government. After completing their penetration tests, the Red Team provided Sifers-Grayson executives with a diagram showing their analysis of the threat environment and potential weaknesses in the company's security posture for the R&D DevOps Lab (see figure 5).

Overview of the Incident

Sifers-Grayson hired a cybersecurity consulting firm to help it meet the security requirements of a contract with a federal agency. The consulting firm's Red Team conducted a penetration test and was able to gain access to the engineering center's R&D servers by hacking into the enterprise network through an unprotected network connection (see figure 2). The Red Team proceeded to exfiltrate files from those servers and managed to steal 100% of the design documents and source code for the AX10 Drone System. The Red Team also reported that it had stolen passwords for 20% of the employee logins using keylogging software installed on USB keys that were left on the lunch table in the headquarters building employee lounge (see Figure 3). The Red Team also noted that the Sifers-Grayson employees were quite friendly and talkative as they opened the RFID controlled doors for the "new folks" on the engineering staff (who were actually Red Teamers).

The Red Team continued its efforts to penetrate the enterprise and used a stolen login to install malware over the network onto a workstation connected to a PROM burner in the R&D DevOps lab (See Figure 3). This malware made its way onto a PROM that was then installed in an AX10-a test vehicle undergoing flight trials at the Sifers-Grayson test range (See Figures 1 and 4). The malware "phoned home" to the Red Team over a cellular connection to the R&D center. The Red Team took control of the test vehicle and flew it from the test range to a safe landing in the parking lot at Sifers-Grayson headquarters.

Attachment:- Incident response exercise.rar

Verified Expert

The task file clearly reports the cybersecurity incident happened in corporate headquarters. The cause and cost of the incident are discussed. It was found that corporate heaquarters and R&D centre IP was hacked and cause, description as well as cost of the incident was discussed. The report concluded with the description as per the guidelines of NIST

Reference no: EM131969839

Questions Cloud

Simultaneously in the smartart graphic : 1-As you type in the Text Pane, the text appears simultaneously in the SmartArt graphic.
Explain the value of this model for the uwear-paledenim : Overall change management model, such as Lewin, Kotter, or ADKAR Explain the value of this model for the UWEAR-PALEDENIM scenario.
Identify techniques for maintaining participant interest : Conduct research to identify techniques for maintaining participant interest in training. List a minimum of three specific techniques not found in the Blanchard
Determine the actual price paid per pound for materials : During the year, the company made 2,180 units of product. Determine the actual price paid per pound for materials
Analysis of the incident and preparation of the report : CSIA 310: Cybersecurity Processes & Technologies - assist in analyzing and documenting the incident described below. The Blue Team has already created a set
Evaluate the effectiveness of any new behaviors approaches : The purpose of this discussion is for you to reflect on the personal relevance of your learning to your current and future professional success.
During the transmission of c3 : During the transmission of C3 (the third cipher block) an error in the 5th bit occurred. How many plain text blocks will be affected, if we are using:
Describe the methods or strategies from the session : Reflect on a facilitated training session you experienced that affected you either positively or negatively. Describe the methods, tools, or strategies.
Calculate the materials price and usage variances : Calculate the materials price and usage variances. Indicate whether the variances are favorable (F) or unfavorable (U)

Reviews

urv1969839

12/8/2018 2:30:32 AM

I appreciate your business. You did the first assignment well with no errors. The references were in APA. A very vital diagram, the Chart for manpower estimates is prepared. This is a friend assignment that I promised a good job from you and My friend said your quick response is really appreciative. Amazing work-mates!! Comprehended and swift delivery. Would surely like to avail your services again shortly. Such a responsive customer support executive. The work is perfect in every manner that no scope for revision is left. Content is fresh and genuine with no trace of plagiarism.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd