Analysis of the incident and preparation of the report

Assignment Help Computer Engineering
Reference no: EM131969839

Cybersecurity Processes & Technologies

Project: Incident Response Exercise & Report

Your Task

You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident described below. The Blue Team has already created a set of enterprise architecture diagrams (see figures 1-4) to help with your analysis of the incident and preparation of the incident report as required by the company's contracts with the federal government. After completing their penetration tests, the Red Team provided Sifers-Grayson executives with a diagram showing their analysis of the threat environment and potential weaknesses in the company's security posture for the R&D DevOps Lab (see figure 5).

Overview of the Incident

Sifers-Grayson hired a cybersecurity consulting firm to help it meet the security requirements of a contract with a federal agency. The consulting firm's Red Team conducted a penetration test and was able to gain access to the engineering center's R&D servers by hacking into the enterprise network through an unprotected network connection (see figure 2). The Red Team proceeded to exfiltrate files from those servers and managed to steal 100% of the design documents and source code for the AX10 Drone System. The Red Team also reported that it had stolen passwords for 20% of the employee logins using keylogging software installed on USB keys that were left on the lunch table in the headquarters building employee lounge (see Figure 3). The Red Team also noted that the Sifers-Grayson employees were quite friendly and talkative as they opened the RFID controlled doors for the "new folks" on the engineering staff (who were actually Red Teamers).

The Red Team continued its efforts to penetrate the enterprise and used a stolen login to install malware over the network onto a workstation connected to a PROM burner in the R&D DevOps lab (See Figure 3). This malware made its way onto a PROM that was then installed in an AX10-a test vehicle undergoing flight trials at the Sifers-Grayson test range (See Figures 1 and 4). The malware "phoned home" to the Red Team over a cellular connection to the R&D center. The Red Team took control of the test vehicle and flew it from the test range to a safe landing in the parking lot at Sifers-Grayson headquarters.

Attachment:- Incident response exercise.rar

Verified Expert

The task file clearly reports the cybersecurity incident happened in corporate headquarters. The cause and cost of the incident are discussed. It was found that corporate heaquarters and R&D centre IP was hacked and cause, description as well as cost of the incident was discussed. The report concluded with the description as per the guidelines of NIST

Reference no: EM131969839

Questions Cloud

Simultaneously in the smartart graphic : 1-As you type in the Text Pane, the text appears simultaneously in the SmartArt graphic.
Explain the value of this model for the uwear-paledenim : Overall change management model, such as Lewin, Kotter, or ADKAR Explain the value of this model for the UWEAR-PALEDENIM scenario.
Identify techniques for maintaining participant interest : Conduct research to identify techniques for maintaining participant interest in training. List a minimum of three specific techniques not found in the Blanchard
Determine the actual price paid per pound for materials : During the year, the company made 2,180 units of product. Determine the actual price paid per pound for materials
Analysis of the incident and preparation of the report : CSIA 310: Cybersecurity Processes & Technologies - assist in analyzing and documenting the incident described below. The Blue Team has already created a set
Evaluate the effectiveness of any new behaviors approaches : The purpose of this discussion is for you to reflect on the personal relevance of your learning to your current and future professional success.
During the transmission of c3 : During the transmission of C3 (the third cipher block) an error in the 5th bit occurred. How many plain text blocks will be affected, if we are using:
Describe the methods or strategies from the session : Reflect on a facilitated training session you experienced that affected you either positively or negatively. Describe the methods, tools, or strategies.
Calculate the materials price and usage variances : Calculate the materials price and usage variances. Indicate whether the variances are favorable (F) or unfavorable (U)

Reviews

urv1969839

12/8/2018 2:30:32 AM

I appreciate your business. You did the first assignment well with no errors. The references were in APA. A very vital diagram, the Chart for manpower estimates is prepared. This is a friend assignment that I promised a good job from you and My friend said your quick response is really appreciative. Amazing work-mates!! Comprehended and swift delivery. Would surely like to avail your services again shortly. Such a responsive customer support executive. The work is perfect in every manner that no scope for revision is left. Content is fresh and genuine with no trace of plagiarism.

Write a Review

Computer Engineering Questions & Answers

  What are the deflections at point a and point b

In the accompanying figure. the deflection of nodes 2 and 3 are 0.02 mm and 0.025 mm, respectively. What are the deflections at point A and point B.

  Write a function that load the contents of a given text file

Write a function that loads the contents of a given text file into memory. Once loaded into memory you should output the text to the Console Window.

  Define properties of modern software development processes

What is meant by these three basic properties of modern software development processes

  Questionprogramming assignment on bstthis program requires

questionprogramming assignment on bstthis program requires you to apply a binary search tree with the following

  Which assignment minimizes the average response ratio

Compute the response ratios for using processor 1 as the bench-mark processor. Which assignment minimizes the average response ratio?

  Define array type team-record-array with integer components

Define an array type Team_Record_Array with Integer components indexed by Teams. Declare an array variable Win_Loss to be of type Team_Record_Array.

  What other orchard shacks and the cold storage building

Determine the investigation you will do with regard to the physical infrastructure of the orchards, What other orchard shacks, and the cold storage building.

  Define the problem as a searching problem

COMP 131 Introduction to Artificial Intelligence Assignment. Define problem as a searching problem. Implement an A* algorithm in your language of preference

  Compare the computed ci produced by interpn

Write a MATLAB script that compares HornerN and HornerV from the flop point of view.

  Which technology helps to make employee''s training cheaper

which technology helps to make employee's training cheaper, more individual and more effective. Based on your experience, describe a method that exploits (any form of) educational technology and specify its contribution. If possible, present non-tr..

  What is the purpose of the div element?

What is the purpose of the div element? Which has higher precedence, an id selector or a universal selector (*)?

  Questionrecognize level within a database system user

questionrecognize level within a database system user programmer of application software designer of the dbms software

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd