Explain how the results reliably indicate that a threat

Assignment Help Computer Engineering
Reference no: EM133703640

Detect threats When determing threat status you should consider the following scenario for the target. The user of the target PC sometimes utilises a remote desktop client from home to access programs on the target PC at the work premise. The user does not transfer files between work and home using SSH, FTPS or any other similar command line data transfer protocol. The user is not technical ICT staff and is unlikely to need or understandthe use of enumeration tools. The user generally conducts work between 9am - 5:30pm Mon to Fri. After importing the data from the local security log file, carry out the following. 1.Use Splunk search to locate three reliable threat indicators in the Security log data. 2.Provide the exact search query syntax used to locate the threat indicators. Note that multiple queries may be required to confirm a result is actually related to a threat

3.Explain how the results reliably indicate that a threat is present For example, simply citing a failed login attempt is not evidence of a threat. Evidence of a threat could include reference to dates, times, user accounts, system commands, malicous commands, information found via manual search and other factors that together infer that the result could be a threat Note that the existing recurring threat as detailed in question 1, may be used as one of the three threats. However, the threat must be identified within the security log and be accompanied by an explanation of how the search results reliably indicate a threat is present. Enter response here: Threat 1 Threat 2 Threat 3

Reference no: EM133703640

Questions Cloud

Prompt the user to enter the ice thickness data : Prompt the user to enter the ice thickness data for this day for all locations. Update the Days vector with the new day and the Ice matrix with the newly record
Prompt engineering expert that is able to reverse : Prompt engineering expert that is able to reverse engineer prompts based on the text that is provided to you. I'm going to provide a specific type
Best practices should the administrator use to achieve this : reflected back and executed as part of the web page content. Which of the following best practices should the administrator use to achieve this goal
Towards community health promotion : What are the immediate and/or long-term objectives and what positive contributions could it have towards community health promotion.
Explain how the results reliably indicate that a threat : Explain how the results reliably indicate that a threat is present For example, simply citing a failed login attempt is not evidence of a threat. Evidence
Develop a comprehensive financial plan tailored to you : Develop a comprehensive financial plan tailored to you, addressing short-term, medium and long-term goals. Utilize Excel to analyze your financial statements.
Primary care physician with pelvic pain and chills : A 78-year-old retired airline pilot, with a history of coronary artery disease, comes to his primary care physician with pelvic pain and chills.
Discussing the code modules to develop showing objects : Discussing the code modules to develop Showing objects, states, transformations, and transactions within the system Detailing the classes to instantiate
Assign a prefix to allow for better context : Assign a prefix to allow for better context, such as using FR-01 for all functional requirements. Each number should be able to tell the type of the requirement

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd