Research an attack of choice against the windows

Assignment Help Management Information Sys
Reference no: EM133232447

Assignment:

Research an attack of your choice against the Windows, Active Directory, or Linux operating systems.

1. Describe the attack in detail (e.g., lateral movement, credential dumping, ransomware encryption, etc.).

2. Next, describe the logs that are created when this attack is successfully run. Make sure you answer all of the following questions.

  • Are the logs unique, or would they blend in with similar events?
  • How would you use this information to search for the specific attack in a SIEM?
  • Are there any security tools that would make detecting these types of attacks easier?

Make sure you pick an attack that generates sufficient logging on your chosen operating system. For example, you may use the Japan Computer Emergency Response Team Coordination Center report on Detecting Lateral Movement through Tracking Event Logs or this presentation by a Kaspersky senior SOC analyst on Hunting for Credential Dumping in Windows Environments. You may also use another reference of your choosing if it provides relevant detail. Another resource you may find helpful is the Active Directory Security website.

Reference no: EM133232447

Questions Cloud

Draw the game tree for the game starting with 5 matchsticks : Consider a game in which two players, Fred and Barney, take turns removing matchsticks from a pile. They start with 21 matchsticks, and Fred goes first.
Abundance of natural resources and its wealth : Natural Resources and Wealth: What's more important for a country to become wealthy: good institutions or abundant natural resources? Is there a strong positive
Cause for measuring the cost of living : The CPI assumes a fixed basket of goods over time. In fact, consumers are likely to change purchasing behavior over time by purchasing less of the goods whose p
What procedures could have prevented las vegas shooting : What training methods would you provide your staff? What policies/procedures could have prevented the Las Vegas shooting?
Research an attack of choice against the windows : Research an attack of your choice against the Windows, Active Directory, or Linux operating systems.
Key tensions between the sales and operations divisions : Describe the likely key tensions between the sales and operations divisions of a small manufacturer that mostly produces to the local market.
Discuss about information management : Based on our topics today talking about information management and technology in the hospitality industry.
What is mega trends : Please answer the following questions based on the readings. The readings covered are:
Why do you think all business investments remain domestic : Why do you think all business investments remain domestic? Explain the pros and cons of the effect of flattening the business world.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Analyze the major ways that cryptography can help alleviate

Analyze the major ways that cryptography can help alleviate risks that exist when using cloud computing.

  Analyze the problem and offer possible solutions

Write a term paper in which you introduce the issue, define the problem, search the literature, analyze the problem, offer possible solutions.

  Addresses why the smartphone is attractive

This post addresses why the Smartphone is attractive and describe the condition that makes it attractive.

  What best practices should sifers-grayson follow

Prepare a short "talking points" paper in which you answer the question: What best practices should Sifers-Grayson follow when establishing a SOCC?

  List of criteria to evaluate a siebel product implementation

Create a prioritization matrix to determine if Siebel is an effective fit for your organization.List of criteria to evaluate a Siebel product implementation.

  Determine the advantages of digital transmission

Compare digital transmission to analog transmission to determine the advantages of digital transmission. Provide at least one example to support your response.

  What you have learned about the importance of technology

ITM 517- For this module, your task is to apply what you have learned about the importance of technology in information security management to to an information security issue of your choice.

  Why is an erp system important to your organisation

Discuss how information technology plays a role in the competitive environment of your organisation. How do you describe the competition to attract and retain clients/customers for your organisation? How do you describe the threat of substitute in..

  Description of the new types of knowledge

Description of the new types of knowledge the HB Company will be able to obtain through the addition of mobile ordering

  What are the ways that people might start threat modeling

What are 3 ways that people might start threat modeling?Explain one positive and one downside to that approach.

  Identify best practices to secure your network

Completely Identify security features and commands needed to implement the security best practices recommended

  Do you think understanding scams as an engineer will make

Most of computer attacks could be traced to the fact that security engineers do not fully understand the psychology of the users.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd