Discuss what next steps you should take as a defender

Assignment Help Computer Engineering
Reference no: EM133620292

Discussion Post: Mindset- Incident Response Procedures, Forensics & Forensic Analysis

In the lab activity for this discussion, you assumed different roles. After logging into the lab environment, you proceeded to "Launching an Attack" as a hacker. Once you completed that portion of the lab, you assumed the role of a defender and began the "Collecting Incident Response Data" portion of the lab. You then completed the lab as a defender by collecting log data and analyzing it. For this discussion, let's add to the scenario as follows:

As part of your system audit, you realize that you have identified a successful remote login from a suspicious IP address located in North Korea. This is a suspicious address because your organization has no ties to North Korea, and no personnel are over there for vacation or business-related travel.

In your initial post, discuss what next steps you should take as a defender.

Reference no: EM133620292

Questions Cloud

Reflect and evaluate your current self-care inventory. : What self-care resources will you use from your review of the NAMI website? Reflect and evaluate your current self-care inventory.
Explain advantage and disadvantage of software as a service : Prepare a research paper that defines and discusses software as a service. Explain advantages and disadvantages of the software as a service.
Barriers-facilitators and ethical considerations : Barriers, Facilitators, and Ethical Considerations: Describe the impact these items will have on your project implementation.
Leadership training program at your company : You've been asked to mentor a co-worker and recent college graduate who wants to join the leadership training program at your company
Discuss what next steps you should take as a defender : In the lab activity for this discussion, you assumed different roles. In your initial post, discuss what next steps you should take as a defender.
Monitor their tier-two and tier-three suppliers : Monitor their tier-two and tier-three suppliers. Seek out shadow factories to partner with. View their supply chain partners as long-term relationships.
Result in further shortening of the project duration : You should crash all the remaining tasks which, when crashed, will result in a further shortening of the project duration.
Describe your personal experience with the topic : You might describe your personal experience with the topic, what you learned in school, or what your assumptions are about the topic.
What strategies would you recommend to mitigate : What strategies would you recommend to mitigate the vulnerability and prevent data breaches and What ethical considerations arise when deciding whether

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss guidelines for security systems

Describe whether there any security system guidelines described in the text that could be eliminated without weakening the security system

  What is the index type of the array variable rainbow

What is the index type of the array variable Count? What is the index type of the array variable Rainbow? How many components are there in array variable Count?

  When have you experience or observe inequitable relationship

When have you experienced or observed an inequitable relationship? Explain what happened, and whether/how it was resolved.

  How would you react if you were the ceo of target

Is it ok for a victimized organization or government agency to hack back and what are the dangers?

  Design your method so that it works quickly even

Design your method so that it works quickly even if k is greater than the length of s, maybe even as large as +1,000,000,000.

  What roles public safety plays in physical security

What roles do you believe public safety plays in physical security? (Please cite 2 credible sources to support your responses)

  Define a packet analyzer and describe its use

Define a packet analyzer and describe its use. List commonly used packet analyzers (beyond WireShark). List best practices for analyzing packets.

  Explain the different ways a web-based application

Explain the different ways a web-based application could authenticate against a company that uses Active Directory as its identity provider.

  Build a rails application that constructs a database

Build a Rails application that constructs a database with a single table listing well-known players from some specific team sport.

  Explain the rationale for improvements to the project plan

For this assignment, you will compile research and create a supporting research report. Then, based on your research, you will identify and explain the.

  Determine the access efficiency

In Problems II, if the cache access time is 100 ns, what hit ratio would be required to achieve an average access time of 500 ns?

  How the service helps in computing and networking

How this Service helps in computing, networking, storage which helps Cloud providers maintain and monitor the physical infrastructure to deliver IaaS.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd