Describes how the company can mitigate

Assignment Help Software Engineering
Reference no: EM132177641

Client: Liberty Vacation Planning Inc. (LVP)

Project: Intrusion Analysis

1. Project Objectives

LVP has installed a pfSense firewall and enabled the Snort IDS to monitor, alert, and react to external threats to the network. After only a few days, the IDS logged a sustained attack. With this Statement of Work, LVP is engaging you to conduct a network incident response review to help determine if the attacks the firewall is sustaining are targeted and effective against their infrastructure. LVP wants you to document this traffic and recommend mitigations. The objectives of this assessment are as follows:

- Review the snort logs to identify and confirm a breach to the network.
- Document the incident.
- Recommend a mitigation for this breach.

2. Project scope

The scope of the intrusion analysis project is as follows:

- The network-connected workstation named Windows7

Note: Any items not listed here are considered out of scope for this project; the addition of out of scope items to the project scope will not be made without prior approval and authorization from LVP and will be handled through change requests or as separate SOWs.

3. Project deliverables

The deliverable(s) for this project are as follows:

a. Analyze the Snort logs

Provide a summary of your findings after reviewing the Snort logs. The summary should include screenshots and descriptions of the following items:

- The timeline (start, finish, and duration) of the attack.
- The source and destination IP of the attack.
- And observed breach(es) that could be ascertained from the logs.

b. Proof of the actual breach

This proof will be provided in the following manner:

- A screenshot showing the breach as displayed within the logs.

c. Recommend a mitigation

- Provide a brief recommendation that describes how the company can mitigate this type of intrusion from this source in the future.

4. Access to system

We have dedicated a Windows workstation on our internal network (Windows7) for use in your review. From the dedicated machine, you may access the pfSense Administrative Console using the browser and the account credentials in the following table.

Use the user account provided in the following table to access our network:

System Name

User Name

Password

Windows7

liberty

student

PfSense admin Console (https://192.168.1.1)

admin

student

5. Project schedule

All services outlined under the project scope will be completed within two weeks of receiving this statement of Work.

Note: any changes to project objectives or project scope will be handles through change requests or separate SOWs.

6. Authorization

This Statement of Work will serve as written authorization for this assessment activity.

ANALYSIS INSTRUCTIONS

1. Use the lab virtual environment for this assignment where specific instructions for tasks and deliverables are located. After completing the lab, write a lab report that includes all of the required deliverables, screen shots of each operation, and any additional information you gathered.

2. You are also required to include at least one page of written content with a minimum of 2 referenced citations that discusses your findings from each of the lab operations. This can include reasons why the findings are important, actions the organization can take to solve any discovered problems, and any other pertinent information you discovered. This content can be included anywhere in your lab report as long as you meet the one page requirement.

3. Your report must also include Biblical integration that relates a Bible verse, passage, or concept to the assignment. This will count as one of your required citations.

4. APA style references must be included for each citation used.

5. Extra credit sections are not required but, if you complete them, earned points will be used to offset missed sections in the other parts of the lab.

You can use any tools available to you on the lab system, but keep the focus on determining what ports were used to infiltrate the victim system(s), the vulnerable services, methods used by the attacker and any other information pertinent to an investigation.

Verified Expert

In this assignment we have to perform snort operation.here we have done operation using snort in pfsense and create the log.From log we analysis is the login and identity the timeline and identify the attack and find out the source and destination of attack and breaches.

Reference no: EM132177641

Questions Cloud

What is meant by the equivalence of the unit of analysis : What is meant by the equivalence of the unit of analysis? Explain with examples. Could you write the reference for this question?
What are joint ventures and can small businesses : What are joint ventures and can small businesses enter into joint ventures?
About the qualities of effective ethical strategic leader : Write a paper about the qualities of an effective ethical strategic leader.
Who should bear the responsibility for product safety : Who should bear the responsibility for product safety? Why? this is under corporate government and social responsibilities
Describes how the company can mitigate : CSCI 681 - Provide a brief recommendation that describes how the company can mitigate this type of intrusion from this source in the future
Make a case for or against the necessity of discretion : The term paper should be at least 5 pages long, 1.5 spacing and should include the following sections: Introduction, Literature Review, Methodology, Discussion.
Evaluate the implications for operations management : Defend the organizations' production processes, customer interaction in those processes, if applicable, and the technologies used in production.
Explain role and importance of compensation and reward : Explain the role and importance of compensation and reward.
What measures should parents take to protect the children : According to the article, obesity has reached epidemic proportions among children. What responsibilities should parents have if they know their children.

Reviews

inf2177641

1/7/2019 12:33:13 AM

I want tutor to do teamviewer to complete the assignment. I attached 2 pdf for assignment. question 1) Liberty Vacation Planning, Inc. wants assurance that this breach cannot recur. Make the required changes to the IDS that will prevent the malicious attacker from repeating an attack on this network. Describe the change you made and include a screenshot that illustrates your change. I want same tutor i had last time. All the assignment is done by the help of teamviewer and the expert made it accurately..Thanks expertsmind.com for your help.

len2177641

11/26/2018 8:50:52 PM

I want tutor to do teamviewer to complete the assignment. I attached 2 pdf for assignment. question 1) Liberty Vacation Planning, Inc. wants assurance that this breach cannot recur. Make the required changes to the IDS that will prevent the malicious attacker from repeating an attack on this network. Describe the change you made and include a screenshot that illustrates your change. I want same tutor i had last time.

Write a Review

Software Engineering Questions & Answers

  Research report on software design

Write a Research Report on software design and answer diffrent type of questions related to design. Report contain diffrent basic questions related to software design.

  A case study in c to java conversion and extensibility

A Case Study in C to Java Conversion and Extensibility

  Create a structural model

Structural modeling is a different view of the same system that you analyzed from a functional perspective. This model shows how data is organized within the system.

  Write an report on a significant software security

Write an report on a significant software security

  Development of a small software system

Analysis, design and development of a small software system.

  Systems analysis and design requirements

Systems Analysis and Design requirements

  Create a complete limited entry decision table

Create a complete limited entry decision table

  Explain flow boundaries map

Explain flow boundaries map the dfd into a software architecture using transform mapping.

  Frame diagrams

Prepare a frame diagram for the software systems.

  Identified systems and elements of the sap system

Identify computing devices, which could be used to support Your Improved Process

  Design a wireframe prototype

Design a wireframe prototype to meet the needs of the personas and requirements.

  Explain the characteristics of visual studio 2005

Explain the characteristics of Visual Studio 2005.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd