Analyzing the attack using given information

Assignment Help Computer Engineering
Reference no: EM132023790

Question: The following scenario is based on an actual attack deconstructed at a seminar I attended earlier this year. The names and locations have been removed to preserve the privacy of the organization in question.

Background: No-Internal-Controls, LLC is a mid-sized pharmaceutical company in the Midwest of the US employing around 150 employees. It has grown over the past decade by merging with other pharmaceutical companies and purchasing smaller firms.

Recently No-Internal-Controls, LLC suffered a ransomware attack. The company was able to recover from the attack with the assistance of a third party IT Services Company.

Attack Analysis: After collecting evidence and analyzing the attack, the third party was able to recreate the attack.

No-Internal-Controls, LLC has a number of PCs configured for employee training

These training computers use generic logins such as "training1", "training2", etc. with passwords of "training1", "training2", etc.

The generic logins were not subject to lock out due to incorrect logins

One of the firms purchased by No-Internal-Controls, LLC allowed Remote Desktop connections from the Internet through the firewall to the internal network for remote employees

Due to high employee turnover and lack of documentation none all of the IT staff were aware of the legacy remote access

The main office has only a single firewall and no DMZ or bastion host exists to mediate incoming remote desktop connections

The internal network utilized a flat architecture

An attacker discovered the access by use of a port scan and used a dictionary attack to gain access to one of the training computers

The attacker ran a script on the compromised machine to elevate his access privileges and gain administrator access

The attacker installed tools on the compromised host to scan the network and identify network shares

The attacker copied ransomware into the network shares for the accounting department allowing it spread through the network and encrypt accounting files

Critical accounting files were backed up and were recovered, but some incidental department and personal files were lost

Instructions: You have been hired by No-Internal-Controls, LLC in the newly created role of CISO and have been asked to place priority on mitigating further attacks of this type.

Suggest one or more policies that would help mitigate against attacks similar to this attack

Suggest one or more controls to support each policy

Identify each of the controls as physical, administrative, or technical and preventative, detective, or corrective.

Keep in mind that No-Internal-Controls, LLC is a mid-sized company with a small IT staff and limited budget

Do not attempt to write full policies, simply summarize each policy you suggest in one or two sentences.

Clearly, indicate how each policy you suggest will help mitigate similar attacks and how each control will support the associated policy

Students should use a title page, abstract, and references.

Reference no: EM132023790

Questions Cloud

Analyze the frequency distributions of common function : In 1960s, statistician Mosteller and Wallace analyzed the frequency distributions of common function words in the Federalist Papers, and drew their conclusions.
What is national or state or local civic engagement : Why is it your personal responsibility to be involved in politics? Why is it your social responsibility to get involved in local, state or federal politics?
Is this an indication that their ticket pricing strategy : Is this an indication that their ticket pricing strategy is not optimal? Why or why not?
How much output should the monopolist produce : There are no fixed costs of production. How much output should the monopolist produce in order to maximize profit?
Analyzing the attack using given information : Attack Analysis: After collecting evidence and analyzing the attack, the third party was able to recreate the attack. No-Internal-Controls, LLC has a number.
Total revenue increase or decrease : Is the demand for Marco's elastic or inelastic. Did their total revenue increase or decrease with the change in price?
Macroeconomic equilibrium in the short run and the long run : Assuming that money is effectively used, how would this affect the macroeconomic equilibrium in the short run and the long run?
Elasticity of demand for bleacher seats at rays games : Next season, they increase the price to $12 per bleacher seat and sell 200,000. What is the elasticity of demand for bleacher seats at Rays games?
Discuss the exertion of one of the given sources of power : Select four people currently in the media and discuss their exertion of one of the sources of power. Apply only one source of power to each of the four people.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Find the longest increasing subsequence of a given sequence

Find the longest increasing subsequence of a given sequence / array. In other words, find a subsequence of array in which the subsequence's elements.

  Give examples of first-principle and data-driven models used

Give examples of first-principle and data-driven models used in practice. Discuss whether principled or data-driven models seem to be more promising approach.

  How to use the schedule performance index

Use CPI to calculate the estimate at completion (EAC) for this project. Is the project performing better or worse than planned.

  Write a module call to a module named getpints

Write a module call to a module named getPints that passes the pints array. Additionally, write a module header named getPints that accepts the pints array. (Reference: Passing an Array as an Argument to a Function, page 295).

  Give solutions of both mobile and server communications

What security suggestions do you have for laptop users to securely access network resources, and to secure files on their laptops.

  Examine the unique characteristic of technology and internet

Examine the unique characteristics of the technology and the Internet. Evaluate the ways in which these characteristics have changed modern businesses.

  Describing rules for developing websites

All the Web pages in the Web site consist of the word “Museum”. Write down a formula describing these rules. It must be a series of logical conditions which is equivalent to the rules.

  Illustrate the constraint graph

Illustrate the constraint graph

  Write the recurrence for the worst-case runtime

CSC236 - Problem Set. Write the recurrence for the worst-case runtime T(n) of the algorithm, and use the master theorem to find the asymptotic upper-bound on T(n). State clearly which case of the master theorem applies

  Devise a plan for accommodating conflicting responses

Devise a plan for accommodating conflicting responses for the same procedure from two different people you interviewed.

  Discuss lan connectivity device facts

Complete the following Lab Sections and write a 1-paragraph summary for each section topic

  Find a boolean expression for the boolean function

A threshold gate represents a Boolean function. Find a Boolean expression for the Boolean function represented by this threshold gate.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd