Reference no: EM132524895 , Length: word count:5000
CIS098-6 Cyber Defence - Majan University College
Learning outcome 1: Provide an in-depth and systematic understanding of knowledge and critical awareness of frameworks, methodologies, tools and techniques for cyber defence and network attack analysis in terms of their effectiveness and suitability in different organisational contexts and threat landscapes
Learning outcome 2: Flexibly and autonomously apply knowledge on real-time reputation intelligence in order to evaluate and respond to multi-faced attacks towards innovative and pragmatic solutions in network security
This assessment will require you to use open source intelligence frameworks, sources of information (e.g. NIST vulnerabilities database) ir order to produce a threat model for a given scenrio. On the basis of the scenario and the threat model you have produced you will be required to present a report that contains the following:
Part 1. An overview of the intelligence sources you chose to utilise and why they were chosen (500 words)
Part 2. A fully formed threat model using an open source framework such such as OWAPs Threat Dragon.
Part 3. On the basis of the threat model, the intelligence and vulnerability you should provide a summary (upto 1000 words) outlining the basis of the threat model you have used, and how the sources that you collected information from helped you to develop your threat model.
Part 4. You should outline the key threats to the systems in your chosen scenario, and present these in the form of a risk table, identifying the likelihood of the threat (high, medium, low) and the likely impact that the threat could have on the business in monetary terms (business failure, business interruption or business as usual). You should then suggest mitigation actions that should be put in place to reduce the impact of the threat (1500 words).
Part 5. You should then use the information from points 1-4 in order to develop an Information Security Action Plan (up to 1500 words) that puts in place measures to reduce the threats to the organisation systems, any contingency measures that should be put in place, the department responsible (owner) of the measures and a responsible person.
Scenario
MoneyTransfer4U is an organisation that has over fifteen years of experience providing money transfer services on the UK High Street. The organisation has stores across the UK, including in London, Birmingham, Leeds, York, Liverpool, Manchester and Edinburgh.
The organisation has a set of 50 UK wide stores, and they are all currently connected via a Metropolitan Area Network. Daily transactions are sent using FTP to the Headquarters in London from each of the other stores across the UK on a daily basis. Each local store also maintains a MYSQL database of daily transactions and customer details. To make things easier the IT team created a single database for each region/city, and customer details, tables, financial transaction table, staff log-on credentials and an annual financial reporting data store are all located in this single database.
In terms of transactions, customers can either vii a store in person, in which case a member of staff performs the transaction, or else customers can log-on and create an account. All they need to do is enter their personal details, bank account details and address to get started. As the organisation has a small staff base of 200 across the UK, there is no verification service in house, so the transactions are set to an-off site service via email for verification before a transaction can take place.
The organisation has set up Windows 10 accounts for all in-store and back-house staff. As well as this, all data is stored on physical servers installed with Windows 2012 Server. The IT has five members of staff and they have to travel across the UK to personally apply patches in each location. Given the geographical spread of stores and offices, this can only take place once a month.
As some staff want to work remotely, then a virtual image has been created and staff can log in using a standard browser.
Staff are asked to created their own passwords, but there is no official password policy in place regarding the correct formation of strong passwords. You have been employed as a consultant as over the past month they have suffered XSS attacks
on their website, a major personal data breach and a Distributed Denial of Service (DDoS) attack
Question 1. Implement, evaluate and review one or more emergent paradigms that underpin modern CTI models
Question 2. Investigate threat mitigations and improvements made through information consumption using a technical demonstration(s) while meeting organisational objectives
Attachment:- Cyber Defence.rar