Already have an account? Get multiple benefits of using own account!
Login in your account..!
Remember me
Don't have an account? Create your account in less than a minutes,
Forgot password? how can I recover my password now!
Enter right registered email to receive password!
Cybersecurity Processes & Technologies
Project: Incident Response Exercise & Report
Your Task
You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident described below. The Blue Team has already created a set of enterprise architecture diagrams (see figures 1-4) to help with your analysis of the incident and preparation of the incident report as required by the company's contracts with the federal government. After completing their penetration tests, the Red Team provided Sifers-Grayson executives with a diagram showing their analysis of the threat environment and potential weaknesses in the company's security posture for the R&D DevOps Lab (see figure 5).
Overview of the Incident
Sifers-Grayson hired a cybersecurity consulting firm to help it meet the security requirements of a contract with a federal agency. The consulting firm's Red Team conducted a penetration test and was able to gain access to the engineering center's R&D servers by hacking into the enterprise network through an unprotected network connection (see figure 2). The Red Team proceeded to exfiltrate files from those servers and managed to steal 100% of the design documents and source code for the AX10 Drone System. The Red Team also reported that it had stolen passwords for 20% of the employee logins using keylogging software installed on USB keys that were left on the lunch table in the headquarters building employee lounge (see Figure 3). The Red Team also noted that the Sifers-Grayson employees were quite friendly and talkative as they opened the RFID controlled doors for the "new folks" on the engineering staff (who were actually Red Teamers).
The Red Team continued its efforts to penetrate the enterprise and used a stolen login to install malware over the network onto a workstation connected to a PROM burner in the R&D DevOps lab (See Figure 3). This malware made its way onto a PROM that was then installed in an AX10-a test vehicle undergoing flight trials at the Sifers-Grayson test range (See Figures 1 and 4). The malware "phoned home" to the Red Team over a cellular connection to the R&D center. The Red Team took control of the test vehicle and flew it from the test range to a safe landing in the parking lot at Sifers-Grayson headquarters.
Attachment:- Incident response exercise.rar
Verified Expert
The task file clearly reports the cybersecurity incident happened in corporate headquarters. The cause and cost of the incident are discussed. It was found that corporate heaquarters and R&D centre IP was hacked and cause, description as well as cost of the incident was discussed. The report concluded with the description as per the guidelines of NIST
I appreciate your business. You did the first assignment well with no errors. The references were in APA. A very vital diagram, the Chart for manpower estimates is prepared. This is a friend assignment that I promised a good job from you and My friend said your quick response is really appreciative. Amazing work-mates!! Comprehended and swift delivery. Would surely like to avail your services again shortly. Such a responsive customer support executive. The work is perfect in every manner that no scope for revision is left. Content is fresh and genuine with no trace of plagiarism.
Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph
ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.
Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.
Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs
What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?
Paper describes about memory management. How memory is used in executing programs and its critical support for applications.
Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.
Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.
Analyze security requirements and develop a security policy
Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.
Define a suitable functional unit for a comparative study between two different types of paint.
Calculate yield to maturity (YTM) and bond prices
Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!
whatsapp: +1-415-670-9521
Phone: +1-415-670-9521
Email: [email protected]
All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd