Identify the ip address of the bad actor

Assignment Help Basic Computer Science
Reference no: EM133543140

Assignment:

Topsecret is a cloud company with a mission to provide safe cloud storage. Topsecret provides a SAAS service which companies can buy different subscriptions in order to store documents in a secure environment. Picture 1 provides a snapshot of the architecture of Topsecret. Server S1 accepts remote connections from companies to access their files through firewall FW1. Picture 2 provides a sample of logs from S1 showing access to sensitive files.

With the help of the firewall FW2, we, as cyber security specialists, used a packet sniffer to capture some packets. Picture 3 shows high level description of these packets (traffic from Topsecret to outside). We have realized something suspicious happened. Someone was able to access a high confidential (ts1) file without proper authorization. The bad actor has tried hard to hide the digital fingerprint. As an information security specialist, you need to help Topsecret to understand the situation and find a solution. Topsecret.com corresponding IP address is 162.252.3.66.

Please answer the following questions based on the info provided:

1) Is it possible to identify whether the bad actor was an insider or outsider? Explain in details.

2) Is it possible to identify the IP address of the bad actor who has succeed to access the file "ts1"? explain in details.

3) Is it possible to identify the mechanism used by the bad actor to gain access to "ts1"? explain in details.

4) Which countermeasure could be applied here to prevent the same situation in the future. This countermeasure must be suitable to Topsecret normal activities (propose only the most important countermeasure). Justify your answer in details.

5) What is the most important security principle that you can propose to topsecret to increase the confidentiality of stored files? justify your answer in details.

Reference no: EM133543140

Questions Cloud

Create a customer long interview guide : Create a customer long interview guide so that the GreenWash partners can gather information to assess whether they are solving a pressing problem
What can she sue for to get the house : Mary has breached her contract to sell Sam her house. Mary really wants the house as it is perfect for her. What can she sue for to get the house?
Describe the six cultural phenomena that are evident : To provide culturally diverse nursing care, describe the six cultural phenomena that are evident in all cultural groups.
Analyze critical thinking skills in psychopathology : Analyze critical thinking skills in psychopathology of mental health patients and provide treatment and health promotion while applying evidence-based research.
Identify the ip address of the bad actor : Is it possible to identify the IP address of the bad actor who has succeed to access the file "ts1"? explain in details.
Critics of outsourcing make the strategic argument : Critics of outsourcing make the strategic argument that offshoring: a. puts proprietary functions at risk. b. causes job losses. c. ignores corporate social
How will you categorize patients using mci triage philosophy : How will you categorize the following patients using the MCI triage philosophy? Explain your answer. Are there any ethical issues that should be considered?
What is the compensation structure of banks : What is the compensation structure of banks in his article Disciplining Investment Bankers, Disciplining the Economy: Wall Street's Institutional Culture
Post a brief introduction of yourself to your colleagues : Post brief introduction of yourself to your colleagues. Explain why networking is important and how it may help you achieve your professional and academic goals

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the most likely cause of the problem

Some time later, Leo calls you back to tell you that while he is able to access the Trinity folder and read the files stored there, he has been unable to save changes back to the server. What is the most likely cause of the problem?

  What are the? bank total? loans

The required reserve ratio is 5 ?percent, and the bank chooses not to hold any excess reserves but makes loans instead. What are the? bank's total? loans?

  Publish a publication about cloud solution

Publish a publication about cloud solution and how made our life easier - write about the different technology of cloud with new and old services

  Business continuity planning and disaster recovery planning

Business Continuity Planning and Disaster Recovery Planning. Does your company have a current disaster recovery plan?

  Leveraged cloud computing technologies

Select an organization that has leveraged Cloud Computing technologies to improve profitability or to give them a competitive advantage.

  Commercial hardware firewall

List the type. You can be as specific as naming a brand, but no more general than saying "commercial hardware firewall".

  Making about the relationship between two variables

What assumption are we making about the relationship between these two variables?

  Read about successful system implementation

Read about successful system implementation and then answer questions based on your understanding of the concepts.

  Define sarbanes-oxley

Define Sarbanes-Oxley. How has it impacted your company? How has it impacted application development and specific mobile applications?

  Demonstrate a critical awareness of previous research

Demonstrate a critical awareness of previous research in an IT context within a chosen topic area through a basic understanding of research theory and techniques.

  Use an enhanced for loop to process the array

Write a Java method which takes an integer array parameter and locates the minimum value in the array and outputs that value using System.out.printf. Use an enhanced for loop to process the array. You only need one loop to do this!

  Knowledge gap in senior management

The internet uses a network technology called TCP/IP. The name comes from the protocol stack that includes TCP protocol in the transport layer and IP protocol in the network layer. Sometimes UDP ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd