Describes how the company can mitigate

Assignment Help Software Engineering
Reference no: EM132177641

Client: Liberty Vacation Planning Inc. (LVP)

Project: Intrusion Analysis

1. Project Objectives

LVP has installed a pfSense firewall and enabled the Snort IDS to monitor, alert, and react to external threats to the network. After only a few days, the IDS logged a sustained attack. With this Statement of Work, LVP is engaging you to conduct a network incident response review to help determine if the attacks the firewall is sustaining are targeted and effective against their infrastructure. LVP wants you to document this traffic and recommend mitigations. The objectives of this assessment are as follows:

- Review the snort logs to identify and confirm a breach to the network.
- Document the incident.
- Recommend a mitigation for this breach.

2. Project scope

The scope of the intrusion analysis project is as follows:

- The network-connected workstation named Windows7

Note: Any items not listed here are considered out of scope for this project; the addition of out of scope items to the project scope will not be made without prior approval and authorization from LVP and will be handled through change requests or as separate SOWs.

3. Project deliverables

The deliverable(s) for this project are as follows:

a. Analyze the Snort logs

Provide a summary of your findings after reviewing the Snort logs. The summary should include screenshots and descriptions of the following items:

- The timeline (start, finish, and duration) of the attack.
- The source and destination IP of the attack.
- And observed breach(es) that could be ascertained from the logs.

b. Proof of the actual breach

This proof will be provided in the following manner:

- A screenshot showing the breach as displayed within the logs.

c. Recommend a mitigation

- Provide a brief recommendation that describes how the company can mitigate this type of intrusion from this source in the future.

4. Access to system

We have dedicated a Windows workstation on our internal network (Windows7) for use in your review. From the dedicated machine, you may access the pfSense Administrative Console using the browser and the account credentials in the following table.

Use the user account provided in the following table to access our network:

System Name

User Name

Password

Windows7

liberty

student

PfSense admin Console (https://192.168.1.1)

admin

student

5. Project schedule

All services outlined under the project scope will be completed within two weeks of receiving this statement of Work.

Note: any changes to project objectives or project scope will be handles through change requests or separate SOWs.

6. Authorization

This Statement of Work will serve as written authorization for this assessment activity.

ANALYSIS INSTRUCTIONS

1. Use the lab virtual environment for this assignment where specific instructions for tasks and deliverables are located. After completing the lab, write a lab report that includes all of the required deliverables, screen shots of each operation, and any additional information you gathered.

2. You are also required to include at least one page of written content with a minimum of 2 referenced citations that discusses your findings from each of the lab operations. This can include reasons why the findings are important, actions the organization can take to solve any discovered problems, and any other pertinent information you discovered. This content can be included anywhere in your lab report as long as you meet the one page requirement.

3. Your report must also include Biblical integration that relates a Bible verse, passage, or concept to the assignment. This will count as one of your required citations.

4. APA style references must be included for each citation used.

5. Extra credit sections are not required but, if you complete them, earned points will be used to offset missed sections in the other parts of the lab.

You can use any tools available to you on the lab system, but keep the focus on determining what ports were used to infiltrate the victim system(s), the vulnerable services, methods used by the attacker and any other information pertinent to an investigation.

Verified Expert

In this assignment we have to perform snort operation.here we have done operation using snort in pfsense and create the log.From log we analysis is the login and identity the timeline and identify the attack and find out the source and destination of attack and breaches.

Reference no: EM132177641

Questions Cloud

What is meant by the equivalence of the unit of analysis : What is meant by the equivalence of the unit of analysis? Explain with examples. Could you write the reference for this question?
What are joint ventures and can small businesses : What are joint ventures and can small businesses enter into joint ventures?
About the qualities of effective ethical strategic leader : Write a paper about the qualities of an effective ethical strategic leader.
Who should bear the responsibility for product safety : Who should bear the responsibility for product safety? Why? this is under corporate government and social responsibilities
Describes how the company can mitigate : CSCI 681 - Provide a brief recommendation that describes how the company can mitigate this type of intrusion from this source in the future
Make a case for or against the necessity of discretion : The term paper should be at least 5 pages long, 1.5 spacing and should include the following sections: Introduction, Literature Review, Methodology, Discussion.
Evaluate the implications for operations management : Defend the organizations' production processes, customer interaction in those processes, if applicable, and the technologies used in production.
Explain role and importance of compensation and reward : Explain the role and importance of compensation and reward.
What measures should parents take to protect the children : According to the article, obesity has reached epidemic proportions among children. What responsibilities should parents have if they know their children.

Reviews

inf2177641

1/7/2019 12:33:13 AM

I want tutor to do teamviewer to complete the assignment. I attached 2 pdf for assignment. question 1) Liberty Vacation Planning, Inc. wants assurance that this breach cannot recur. Make the required changes to the IDS that will prevent the malicious attacker from repeating an attack on this network. Describe the change you made and include a screenshot that illustrates your change. I want same tutor i had last time. All the assignment is done by the help of teamviewer and the expert made it accurately..Thanks expertsmind.com for your help.

len2177641

11/26/2018 8:50:52 PM

I want tutor to do teamviewer to complete the assignment. I attached 2 pdf for assignment. question 1) Liberty Vacation Planning, Inc. wants assurance that this breach cannot recur. Make the required changes to the IDS that will prevent the malicious attacker from repeating an attack on this network. Describe the change you made and include a screenshot that illustrates your change. I want same tutor i had last time.

Write a Review

Software Engineering Questions & Answers

  Draw anbsp dfd context andnbsp level 1 for placing an order

draw anbsp dfd context andnbsp level 1 for placing an order based on the e-r diagram shown here.some recommended major

  What is the main purpose of a software tool like winaudit

In this lab, you performed a forensic analysis of a Windows machine using three commonly available tools: WinAudit, DevManView, and Frhed. What is the main purpose of a software tool like WinAudit in computer forensics

  Requirements and architecture relationship

"Requirements and Architecture Relationship" Please respond to the following: Describe a situation where you might start the design of a software system before the requirement specification is complete. Provide an example to support your answer.

  Determine the amounts of the missing items

A. Determine the amounts of the missing items, identifying them by letter. Enter all amounts as positive numbers.

  Developing a comprehensive software development plan

Your team will not be implementing the actual development project, but rather, you will be developing a comprehensive software development plan document

  Draw a use-case diagram and a set of activity diagrams

Draw a use-case diagram and a set of activity diagrams for the process of buying glasses from the viewpoint of the patient. The first step is to see an eye doctor who will give you a prescription. Once you have a prescription, you go to a optical dis..

  Use programming project: create a gpa calculator

Use programming project: Create a GPA calculator

  Explain the verification walk-through of the package diagram

List the classes in the structure model. Perform and explain the verification and validation walk-through of the package diagram.

  Provide english description for the regular expressions

Provide English description for the regular expressions listed below.

  Could discipline enforced by suitable software management

how disciplined use of #include directives can mitigate worst danger of independent compilation. Could discipline enforced by suitable software management tool.

  Create a wbs and enter the tasks in project.

Create a WBS and enter the tasks in Project. Be sure to include milestones, summary tasks and an extensive set of subtasks. Include all dependencies.

  Implications of new knowledge gained

The final paper should demonstrate an understanding of the materials in this course, as well as the implications of new knowledge gained. The 3-4-page paper should integrate new learning into the target company example and internship work. It may ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd