Developing a brief forensics data collection plan

Assignment Help Computer Network Security
Reference no: EM133540200

Assignment:

Before you begin: Read the Project #1 description (attached to the Project #1a assignment folder) paying special attention to the Red Team's report.

For this discussion, our focus will be on developing a brief forensics data collection plan to be used during a Red Team exercise. Your plan will be used as part of a training exercise for incident response personnel to help them learn to identify and collect evidence.

Your first task is to analyze the Red Team's report to determine what they attacked or what attack vectors were used. Next, analyze the environment to determine what types of forensic evidence should be collected after the attack(s) and where that evidence can be collected from. You should consider both volatile sources such as RAM (memory) and static sources such as disk drives, thumb drives (USB storage devices), etc. After you have identified the types of evidence and the devices from which evidence should be collected, document that in your short paper (the "Plan").

At a minimum, your plan must document evidence collection for three specific attack vectors or vulnerabilities that were exploited by the Red Team as part of its penetration testing. For each vector or vulnerability, document what type of evidence could be collected and where the evidence should be collected from.

Reference no: EM133540200

Questions Cloud

Why do organizations have so much difficulty implementing : Why do organizations have so much difficulty implementing strategic plans? How can leaders improve the possibility of successful implementation?
What do we know about the structure of the organization : What do we know about the structure of the organization and how that may have contributed to the problems? Were the problems fixed?
How you present and deliver project work performance reports : How will you present and deliver project work performance reports? What project communications management tools will you employ?
Identify the four categories which strategic alliances : Identify and discuss the four categories which strategic alliances can fall into as discussed in the course. Clearly identify a type of alliance.
Developing a brief forensics data collection plan : For this discussion, our focus will be on developing a brief forensics data collection plan to be used during a Red Team exercise.
How might they used as a starting point for self-assessment : How might they be used as a starting point for self-assessment, without actually answering the formal questions in the Baldrige Criteria.
How does one know if their copy of metasploit is secure : How does one know if their copy of Metasploit is secure, given you are retrieving it from what many claim is a unsafe wild west of open source?
What is a good strategy for protecting against sql injection : What is a good strategy for protecting against SQL injection attacks to improve data center security?
Research the components within a disaster recovery plans : Research the components within a DRP. Think about what elements change over time and give two reasons why you think it is important to frequently update a DRP.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What do you think you can learn from given commands

What kinds of things do you think the administrator will see on the output? Based on your work this week, what do you think you can learn from such commands?

  Which of risks gci faces are most significant to company

What measures would you propose to senior management to try to prevent a breach of data held by GCI? Your response should include recommendations for mitigating vulnerabilities identified in part (a).

  What is network protection

Create a 1-page executive summary that the executives can use to communicate the highlights of the presentation within their organizations.

  Research new network observation tools

Research new network observation tools that use enhanced techniques, such as virtual machine-based code execution.

  Security awareness on the internet

Search for security awareness on the internet. Describe the available materials. Choose one of the web sites that might work for security awareness program at your school

  What is the difference between a threat agent and a threat

What is the difference between a threat agent and a threat? What are the three components of the C.I.A. triangle? What are they used for

  Conclude the main reasons why the attack on target occurred

Conclude the main reasons why the attack on Target occurred. Give your opinion as to whether or not the attack was mainly due to the poor infrastructure or the inability of management to act accordingly.

  Problems of hacking

Question 1: Describe what hacking of memory or hacking of RAM means. Question 2: Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action.

  Explain your method of attack

Explain your method of attack and operation within reasonable parameters of the law. Discuss specific malware, social engineer, or any other type of attacks you would deploy to achieve your desired goals

  Supply chain risks

Identify and describe 3 supply chain risks with examples of successful attacks that businesses of all sizes need to be aware of.

  Discuss about the asymmetric cryptography

Description of algorithms that implement asymmetric cryptography and strengths / weaknesses of each algorithm atleast two or three algorithms.

  Comprise a brief description of how to comprise

write a 1400- to 2100-word paper that describes the security authentication process. discuss how this and other

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd