Reference no: EM133137762
UFCFFY-15-M Cyber Security Analytics
Assignment Task
The completion of Portfolio Task: Conduct a research study using a virtualised infrastructure to simulate attacks and identify these through a SIEM platform
Portfolio Task: Conduct a research study using a virtualised infrastructure to simulate attacks and identify these through a SIEM platform
For this task, you should use a virtualised infrastructure (e.g., DetectionLab or S plunk Attack Range.
You will need to conduct research to develop your study, to illustrate sample offensive attacks against the infrastructure. You could use Atomic Red Team for this, or you may choose an alternative approach such as connecting your own Kali instance to the infrastructure. You should then demonstrate from a 'blue team' perspective how a cyber security analyst could identify these attacks using a SIEM (e.g., S plunk).
Your portfolio submission for this task should be a written report (max. 2000 words), using either Jupyter notebook (Markdown) or Microsoft Word, that details your offensive attacks and your defensive investigation, showing clear screenshots of your study. You MUST document fully your use of any online/3rd party resources giving appropriate citation and recognition to existing works.
You are expected to conduct independent research in order to inform your work for this task. Using online resources, you will find infomation about suitable attack vectors and defensive strategies - you are expected to show that you are able to research these findings both to understand common attack vectors and also to understand how defensive strategies will help to identify these attacks, and introduce mitigations against their usage.
Attachment:- Cyber Security Analytics.rar
Conducting the training needs analysis
: Analyze if a more modern approach to training, rather than one of the more conventional approaches, would be more practical.
|
Chinese tire dumping and the subsequent us tariffs
: How are consumers affected by the Chinese tire dumping and the subsequent US tariffs?
|
Part of a training program
: Think about a time when you were part of a training program that was very good. What made the program so good?
|
Compute ending inventory and cost of goods sold
: Compute ending inventory and cost of goods sold for the current year under FIFO, LIFO, and average cost inventory costing methods
|
Conduct a research study using a virtualised infrastructure
: Conduct a research study using a virtualised infrastructure to simulate attacks and identify these through a SIEM platform
|
How these assets should be reflected on the books and why
: Equipment $800,000, Plant $500,000, and Land $750,000. How these assets should be reflected on the books and why
|
Is there a difference in the mean amount of time
: Is there a difference in the mean amount of time for each shift to process 100 pounds of coconuts? Test at the 5% level of significance
|
How long will it take to pay off the loan
: Lush Gardens bought a new truck for $68,000. If the company makes payments of $1,525 at the end of every month, how long will it take to pay off the loan
|
How much should be reported as an expenditure for supplies
: During the year, the city purchased $20,000 of supplies and used $18,000 of supplies. How much should be reported as an expenditure for supplies
|