Reference no: EM133806630
Question 1: Conduct a practical research study using a virtualised infrastructure to simulate attacks and identify these through a SIEM platform
For this task, you will be provided with a virtualised infrastructure which you can utilise, or you can develop your own platform based on the cyber VM and the related unassessed lab materials provided during the course.
Your task is to deploy a functional environment where you can log and monitor activities conducted on remote systems (within your VM network) using a SIEM (Security Information and Event Management) system. You need to demonstrate your ability to conduct some form of attack within this infrastructure, and detect this via the appropriate data logs as captured by your SIEM.
You will need to be able to document your process and report your findings, evidence by screenshots and with written critical reflection. The purpose of this task is to research and demonstrate your creativity. A simplistic or basic attack will likely warrant a basic mark, whereas a more sophisticated approach that is clearly justified and well documented will attract a greater mark.
The following resources will likely be useful as part of your initial research:
DetectionLab
Splunk Attack Range
Atomic Red Team
Splunk
Wazuh
Elastic
Further creativity on your part is required to achieve the higher marks. This would require building your own infrastructure (possibly using tools such as Splunk Attack Range, DetectionLab, or Wazuh), and demonstrating a more varied and sophisticated range of attacks on your virtualised infrastructure. Need Immediate Assignment Help? Click Here to Get Assistance!
DetectionLab and Splunk Attack Range are all resource intensive systems for running multiple virtual machines. If your personal computing facilities do not meet this specification, it is strongly advised that you use the campus lab facilities and an external solid state drive. Most campus machines have at least 32GB RAM which should be sufficient for running multiple VMs within these environments.
You should provide a short written report of your investigation (maximum 1500 words) complete with evidence of your infrastructure setup, attack execution, and identification of attacks. You will need to include screenshots as part of your evidence, and all included figures (screenshots) should be discussed in the body of your report. Your report must be within the word limit specified, and you should clearly state the word count of your report on your report cover page.
Any content over the word limit will not be taken into account. This is a mini research project, and so you are expected to seek out informationabout suitable attack vectors and defensive strategies. You are expected to show that you are able to research these findings both to understand common attack vectors and also to understand how defensive strategies will help to identify these attacks, and introduce mitigations against their usage.