Analysis of the threat environment and potential weaknesses

Assignment Help Management Information Sys
Reference no: EM132243979

Final Project: Incident Response Exercise & Report

Your Task

You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident described below.

The Blue Team has already created a set of enterprise architecture diagrams (see figures 1-4) to help with your analysis of the incident and preparation of the incident report as required by the company's contracts with the federal government. After completing their penetration tests, the Red Team provided Sifers-Grayson executives with a diagram showing their analysis of the threat environment and potential weaknesses in the company's security posture for the R&D DevOps Lab (see figure 5).

Your Deliverable

Complete and submit the Incident Report form found at the end of this file. Consult the "Notes to Students" for additional directions regarding completion of the form.

Overview of the Incident

Sifers-Grayson hired a cybersecurity consulting firm to help it meet the security requirements of a contract with a federal agency. The consulting firm's Red Team conducted a penetration test and was able to gain access to the engineering center's R&D servers by hacking into the enterprise network through an unprotected network connection (see figure 2).

The Red Team proceeded to exfiltrate files from those servers and managed to steal 100% of the design documents and source code for the AX10 Drone System. The Red Team also reported that it had stolen passwords for 20% of the employee logins using keylogging software installed on USB keys that were left on the lunch table in the headquarters building employee lounge (see Figure 3). The Red Team also noted that the Sifers-Grayson employees were quite friendly and talkative as they opened the RFID controlled doors for the "new folks" on the engineering staff (who were actually Red Teamers).

The Red Team continued its efforts to penetrate the enterprise and used a stolen login to install malware over the network onto a workstation connected to a PROM burner in the R&D DevOps lab (See Figure 3). This malware made its way onto a PROM that was then installed in an AX10-a test vehicle undergoing flight trials at the Sifers-Grayson test range (See Figures 1 and 4). The malware "phoned home" to the Red Team over a cellular connection to the R&D center. The Red Team took control of the test vehicle and flew it from the test range to a safe landing in the parking lot at Sifers-Grayson headquarters.

Background

Sifers-Grayson is a family owned business headquartered in Grayson County, Kentucky, USA. The company's physical address is 1555 Pine Knob Trail, Pine Knob, KY 42721. The president of the company is Ira John Sifers, III. He is the great-grandson of one of the company's founders and is also the head of the engineering department. The chief operating officer is Michael Coles, Jr. who is Ira John's great nephew. Mary Beth Sifers is the chief financial officer and also serves as the head of personnel for the company.

Recent contracts with the Departments of Defense and Homeland Security have imposed additional security requirements upon the company and its R&D DevOps and SCADA labs operations.

The company is now required to comply with NIST Special Publication 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. The company must also comply with provisions of the Defense Federal Acquisition Regulations (DFARS) including section 252-204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting.

These requirements are designed to ensure that sensitive technical information, provided by the federal government and stored on computer systems in the Sifers-Grayson R&D DevOps and SCADA labs, is protected from unauthorized disclosure. This information includes software designs and source code. The contract requirements also mandate that Sifers-Grayson report cyber incidents to the federal government in a timely manner.

SCADA Lab

The SCADA lab was originally setup in 1974. It has been upgraded and rehabbed several times since then. The most recent hardware and software upgrades were completed three years ago after the lab was hit with a ransomware attack that exploited several Windows XP vulnerabilities.

At that time, the engineering and design workstations were upgraded to Windows 8.1 professional. A second successful ransomware attack occurred three months ago. The company paid the ransom in both cases because the lab did not have file backups that it could use to recover the damaged files (in the first case) and did not have system backups that it could use to rebuild the system hard drives (in the second case).

The SCADA Lab is locked into using Windows 8.1. The planned transition to Windows 10 is on indefinite hold due to technical problems encountered during previous attempts to modify required software applications to work under the new version of the operating system. This means that an incident response and recovery capability for the lab must support the Windows 8.1 operating system and its utilities.

R&D DevOps Lab

The R&D DevOps Lab was built in 2010 and is used to develop, integrate, test, support, and maintain software and firmware (software embedded in chips) for the company's robots, drones, and non-SCADA industrial control systems product lines. The workstations in this lab are running Windows 10 and are configured to receive security updates per Microsoft's monthly schedule.

Enterprise IT Operations

The company uses a combination of Windows 10 workstations and laptops as the foundation of its enterprise IT capabilities. The servers in the data center and the engineering R&D center are built upon Windows Server 2012.

Reference no: EM132243979

Questions Cloud

What will be the new equilibrium quantity : What will be the new equilibrium quantity if Incomes fall to $50000?
Discussion about how old the country is : A brief history/background on the country you have chosen. Understandably, many countries may have a vast history. Focus on what you perceive.
Demand increases and the supply decreases : If the demand increases and the supply decreases, which of the following could be the new equilibrium point?
Voluntary behavior that violates significant organizational : Deviant workplace behavior is defined as voluntary behavior that violates significant organizational norms which in turn threatens well-being of organization.
Analysis of the threat environment and potential weaknesses : Sifers-Grayson hired a cybersecurity consulting firm to help it meet the security requirements of a contract with a federal agency.
Can sustain such a large national debt : Explain how the US can sustain such a large national debt and possess such large yearly budget deficits? Is there a problem with all this borrowing?
What is a public good : 1.What is a public good? Why does that mean we need to have a government?
Consider a pollution problem involving a paper : Consider a pollution problem involving a paper mill located on a river and a commercial salmon fishery operating on the same river.
Marginal propensity to consume : Consider two economies, A and B. Economy A has a marginal propensity to consume of 0.9, a net tax rate of 0.1 and a marginal propensity to import of 0.1.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What are ft and ha

Delivery Models: Define SaaS, IaaS, PaaS . Performance: What are FT and HA?As a customer, which would you use and why?

  Explain how logistics performance crucial to jit philosophy

How can strategic procurement contribute to the quality of products produced by a manufacturing organization? Explain how logistics performance is crucial to a Just In Time (JIT) philosophy.

  Create a wbs for the scope of the project

Analyze the various activities required for this project and provide an estimate of duration for each activity based on the number of resources available for the project. Include assumptions and basis for each estimate.

  Evaluate the effectiveness of a scrum

Assignment: Scrum vs. Plan-Based Software Development Strategies, Evaluate the effectiveness of a Scrum approach compared to a plan-based approach

  Describe the process of migrating from the old ip addressing

BigCorp is a large multinational firm that produces metal bearings. The company has offices and plants scattered in twenty five (25) cities around the world. The company just acquired a small company, LittleCorp, which produces steel products. Lit..

  Discuss the disadvantages of local area networks

Discuss the advantages and disadvantages of local area networks. Share your knowledge and experience.

  Describe the business uses of cloud computing and web 2.0

Cloud Computing and Web 2.0 - Describe the business uses of cloud computing and Web 2.0

  Calculate the average in column g using the appropriate

Assume that each EXAM and participation weights the same in calculating the average. Format the table to be visually appealing.

  Provide a brief overview of the problem of supply chain risk

An introduction section which provides a brief overview of the problem of supply chain risk as it pertains to the cybersecurity industry.

  Discuss the use of service oriented architecture

GTI is pleased with the results of your research in Week One and has firmly decided to move forward with Oracle® Enterprise Application.

  How big is facebook compared to netflix

Facebook vs. Netflix - How big is Facebook compared to Netflix? Do you think that Facebook presents a credible threat to Netflix? Why or why not?

  Develop dod-approved policies and standards

To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the "Tasks" section below).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd