How the programs and update and security tools could be used

Assignment Help English
Reference no: EM131963545

Assignment

Lab Activity: Investigate Restore & Recover Tools for System Integrity

Purpose: Assess and Document Tools to Restore and Recover System Integrity for Windows 10 Workstations.

1. Assess and document selected uses of the Windows 10Control Paneltoolduring the incident response process.

2. Assess and document selected uses of the Windows 10Windows Settings tool during the incident response process.

Overview:

Recent contracts with the Departments of Defense and Homeland Security have imposed additional security requirements upon Sifers-Grayson and its lab operations. The company is now required to comply with NIST Special Publication 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. The company must also comply with provisions of the Defense Federal Acquisition Regulations (DFARS) including section 252-204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting.These requirements are designed to ensure that sensitive technical information, provided by the federal government and stored on computer systems in the Sifers-Grayson R&D DevOps lab, is protected from unauthorized disclosure. This technical information includes software designs and source code for unmanned vehicles for which Sifers-Grayson is providing software support and maintenance. The contract requirements also mandate that Sifers-Grayson report cyber incidents to the federal government in a timely manner. As part of the reporting requirements, Sifers-Grayson must provide documentation about its Incident Response Processes and Procedures. The documentation that you will prepare for this lab will become part of the required Incident Response documentation.

For this labactivity, you will assess and document tools that can be used in the preparation phase of the Incident Response Process (as defined in NIST SP 800-61r2). During this phase, incident responders create "images of clean OS and application installations for restoration and recovery purposes" (Cichonski, Millar, Grance, &Scarfone, 2012, p. 23).These tools are also used during the containment, eradication, and recovery phase to limit workstation access to resources (containment strategies), return workstations to known-good states (eradicate threats and restore system integrity), and restore system availability (recovery). Vendor documentation for Windows 10 (Microsoft, 2017a; Microsoft, 2017b; Microsoft 2017c) provides information about how to use the required features, tools, and utilities (see "Repair & Recovery" and "Windows Update FAQ"). During an incident, however, responders may not have time to search the vendor website and/or the Internet for information about tools and tool usage procedures. For this reason, customized incident response procedures are required to ensure that response is timely and that all incident responders have the information needed to execute their tasks.

References

Cichonski, P., Millar, T., Grance, T., &Scarfone, K. (2012). Computer security incident handling guide (NIST SP 800-62 rev. 2).

Microsoft. (2017a). Recovery options in Windows 10.
Microsoft. (2017b). Windows 10 help.
Microsoft. (2017c). Windows Update FAQ.

YourTask:

Prepare draft incident response guidance to be included in the Sifers-Grayson Incident Responder's Handbook. Your draft guidance will explain the use of Windows 10 operating system features (utilities)and describe how each could be used as part of an incident response process. The guidance documents to be completed under this task are:

(a) Creating, Using, and Removing System Restore Points and System Image Backups

(b) Managing Installation, Removal, and Updating of Programs, Applications, and Operating System Features for Windows 10

Instructions

Part (a): Creating, Using, Removing System Restore Points for Windows 10

1. Identify appropriate sources of information andinstructions for using the Windows 10 Control Panel andSystem Restoretool. Using those sources, research the procedures required to perform the following tasks:

a. Create a system restore point for a Windows 10 system
b. Use a specific system restore point to roll-back changes made to a Windows 10 system
c. Deletesystem restore points from a Windows 10 system

2. Identify how the System Restore tool could be used during the incident response and recovery process (it may be useful in more than one phase). Typical uses include:

a. Prepare a known-good backup for operating system files and data structures (e.g. the system registry and the information stored within it)

b. Removeunauthorized configuration changes

c. Restore the system to full operating status after an attack or suspected attack

d. Remove failed software installations and/or unwanted changes to the operating system, applications software, and/or files.

3. Write a guidance document that identifies the tool, explains the capabilities it provides, and thenlists and briefly describes the recommended uses identified under item #2. Add a list of resources that can be consulted for additional information. Next, summarize the procedures required to perform the tasks listed under item #1 (do not provide step-by-step instructions). Close your guidance document with a Notes / Warnings / Restrictions section that answers the question "Is there anything else the incident responder needs to be aware of when using this tool?"

Part (b): Using Windows Features toManageInstallation, Removal, and Updating of Programs, Applications, and Operating System Features for Windows 10

1. Identify appropriate sources of information and instructions for usingPrograms and Features(accessed via Control Panel) and Update and Security (accessed via Windows Settings). Using those sources, research the procedures required to perform the following tasks:

a. Turn Windows 10 Features On or Off
b. Modify, Repair, or Uninstall a program or application from a Windows 10 system
c. Control Installation of Updates for Windows 10
d. Control Installation of Updates for Windows 10 Applications

2. Identify and research how the Programs and Features and Update and Security tools could be used during the incident response and recovery process. Typical uses include:

a. Turn off undesired Windows features, e.g. location services or remote access
b. Turn off features to implement a containment strategy
c. Remove unauthorized programs
d. Remove unwanted changes to operating system utilities or features, applications software, and/or patches / updates
e. Manually apply updates ("patches") for installed programs

3. Write a guidance document that identifies the tool, explains the capabilities it provides, and thenlists and briefly describes the recommended uses identified under item #2. Add a list of resources that can be consulted for additional information. Next, summarize the procedures required to perform the tasks listed under item #1 (do not provide step-by-step instructions). Close your guidance document with a Notes / Warnings / Restrictions section that answers the question "Is there anything else the incident responder needs to be aware of when using this tool?"

Finalize Your Deliverable

1. Using the grading rubric as a guide, refine your incident response guidance. Your final products should be suitable for inclusion in the Sifers-GraysonIncident Responder's Handbook. Remember that you are preparing multiple guidance documents, which must be presented separately.

2. As appropriate, cite your sources using footnotes or another appropriate citation style.

3. Use the resources section to provide information about recommended readings and any sources that you cite. Use a standard bibliographic format (you may wish to use APA since this is required in other CSIA courses). Information about sources and recommended readings, including in-text citations, should be formatted consistently and professionally.

4. Each file should start with a title page which lists the following information:

• Lab Title and Number
• Date
• Your Name

5. The CSIA 310 Template for Lab Deliverable.docx file is set up to provide the required title page and twoincident response guidance templates. Use the first template for your "System Restore Points" guidance. Use the second template for your "Managing Programs and Features" guidance.

Attachment:- Template-for-Lab.rar

Reference no: EM131963545

Questions Cloud

How much would you have to pay to purchase one of these bond : Turn back to figure 2.3 and and look at the Treasury bond maturing in February 2036. How much would you have to pay to purchase one of these bonds?
How globalization may have affected its resource allocation : Oligopolies are known as big businesses. Select an oligopoly and discuss how globalization may have affected its resource allocation.
Discuss about the decision-making : Choose 1 business issue such as narcissism, organizational culture, change and stress etc. from your own professional work experience.
Find the bank required reserves and excess reserves : a. If the required reserve ratio is 0.15, find the bank's required reserves and its excess reserves.
How the programs and update and security tools could be used : Identify and research how the Programs and Features and Update and Security tools could be used during the incident response and recovery process.
Installs systems for inventory control using rfid technology : Software company that installs systems for inventory control using RFID technology spent $600,000 per year for past 3 years in developing their latest product.
What is the dollar amount left in the account : The stock pays $ 2 per share. A year from now the price is $ 25. What is the dollar amount left in the account?
What decision error is more likely to be discovered : What decision error is more likely to be discovered by the CEO? How does this affect the HR manager's decisions?
What movement in the foreign exchange rate will result : What does it mean to be net long? What movement in the foreign exchange rate will result in a loss? What does it mean to be net short?

Reviews

Write a Review

English Questions & Answers

  Write an essay about jean paul sartre situations

Jean Paul Sartre articulates a solution to the problem of free will on pages 320-325 of Cottingham's textbook. While avoiding Sartre's abundant jargon, articulate his position and the reasons he uses to support it. Once you've done that, provide a..

  Pick out key concepts in the research topic and underline

From this research topic ( cell phone and socialization ), develop a question concerning this topic, pick out key concepts in the research topic and underline.

  Write an op-ed-narrative essay grounded in your readings

In 900-1100 words, write an op-ed/narrative essay grounded in your readings of either (a) Annie Baker's The Flick, (b) Jon Bois's 17776.

  Write a proposal on electrical project about arduino robot

Write a Research Proposal on Electrical project about Arduino Robot.

  Write a literary essay on wife of baths tale by chaucer

Write a literary essay on: Wife of Bath's Tale by Chaucer (1360): like Lysistrata, here is another pro-feminist story before the word "feminism" existed.

  Explain how the rise of the vernacular in literature echoed

The literary traditions of pre-Renaissance Europe were by no means derived from ancient Greek and Roman traditions alone.

  The concepts of liberalism and socialism

The concepts of liberalism and socialism, as well as other political ideologies. To begin,let's take a deeper look at the variations found within liberalism. Classical liberalism is based upon the work of John Locke and Adam Smith whereas modern libe..

  Professionals have a bias for results

Write an Essay about a book called "The Power of Professionalism" by Bill Wiersma. There are 7 topics in this book -Professionals have a bias for results -Professionals realize (and act like) they are part of something bigger than themselves.

  Directionsnbsp be sure to usenbspcorrect english spelling

directionsnbsp be sure to usenbspcorrect english spelling and grammar.nbsp sources must be cited in apa format.nbsp

  Explaining the state of religion in the modern world

What is the most important of these concepts in explaining the state of religion in the modern world, and how does that concept compare to at least one of the others? How does this concept apply to at least one of the religious groups you've learn..

  Explain what our contemporary world is called

what our contemporary world is called. what does this term mean? what were its "main themes," since 1945? which do you consider most important? why?

  Explain how the author could make the work stronger

Explain How the author could make the work stronger? Analyze how this article contributes to understanding the history of the United States

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd