Describe the source code of attacks

Assignment Help Other Subject
Reference no: EM132479498

Assignment: Threat Hunting

You are currently working in a research wing for a standard SOC (Security Operations Center). The SOC keeps analytics on the current trends within the network. Your team will be assigned a current issue that has been seen at the border of the network, trying to infiltrate the organizations network/systems. Upon being assigned your item, it will be your job to go out and search OSINT (Open Source Intelligence) for more information on the attack being observed. This could be a single port number, a series of attacks that has been identified, or an IP address to research and identify; your professor will assign this. Your deliverable will be a 5 page APA style research report with your findings. Discover current attacks being performed through this port, or current state of a known scanning suite. Find sources, if possible, source code of attacks that are known to exploit this weakness and break down the code. List known services on the affected ports that are associated and current attacks being performed on these services (list any CVE findings and briefly list and explain). Look at SNORT rules that watch for these attacks and list that SID.

Finally, to wrap-up your research, present the current risk level associated with this threat. Use the FAIR methodology to derive your threat assessment. The attached FAIR PDF will walk you through your analysis. To complete the FAIR document:

• Step 1: Asset at Risk will be the organization's primary e-commerce web server.

• Step 2: You will provide this answer based on your research.

• Step 3: You will provide this answer based on your research; however, keep in mind how many times per day this is scanning the network, which will be given to your when you receive your topic.

• Step 4: You will provide this answer based on your research.

• Step 5: Assume the e-Commerce server is fully up-to-date and running the following base software: Red Hat Linux, Apache, MariaDB, Drupal, PHP and is hardened based on base NIST recommendations for operations.

• Step 6-7: Calculate

• Step 8: Assume Moderate

• Step 9: Assume Moderate

• Step 10: Calculate and create this chart in excel with the appropriate item highlighted. Include this chart in your paper and presentation.

You can choose 1 of the following topics:

• China Chopper Scans

• Peppa Pig Scans

• WannaCry

• Port 3389

• Port 9530

• C99 Web Shell

• Petya and PetyaWrap

• Wicked (Mirai Variant)

• Miori (Mirai Variant)

Reference no: EM132479498

Questions Cloud

Operating characteristics of loading gate problem : Determine the operating characteristics of this loading gate problem. What is the probability that there will be more than three trucks either being loaded
What are popular application areas for sentiment analysis : What are the common challenges with which sentiment analysis deals? What are the most popular application areas for sentiment analysis? Why?( 250-300 words.)
Distribution that resembles the exponential distribution : The crew can service an average of µ=8µ=8 machines per day, with a repair time distribution that resembles the exponential distribution.
On the available data would recommend the initiative : Futurist Enterprises have secured a loan and intend, On the available data, would you recommend the initiative? Show all workings.
Describe the source code of attacks : You are currently working in a research wing for a standard SOC (Security Operations Center). The SOC keeps analytics on the current trends within the network.
Find the probability that the jury consists : Assuming that each person is equally likely to be chosen and that the jury is selected at random, find the probability that the jury consists of the following.
Discuss resource utilization characteristicsin brief : List and discuss resource utilization characteristics one should monitor for an application prior to moving the application to the cloud.
What proportion of cars spend between 2 and 3 minutes : What proportion of cars spend between 2 and 3 minutes in the? restaurant's drive-through?
What advice would give management : Futurist Enterprises is considering buying, What advice would you give management if the required payback period was two years?

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd