What are your recommendations to the security team

Assignment Help Computer Engineering
Reference no: EM133459486

Case Study: You are a part of SOC (Security Operations Centre) team, and your role is of a threat researcher. Through the threat intelligence sources, your team has come to know that your organization faces a probable threat from the Conti ransomware group. The CISO has asked you to prepare a threat report, specific to this ransomware group.

Questions: You are expected to research and report the following for this group:

1. What is the origin of this group?

Hint: Try to determine the first known attack and examine if you can trace that attack to its originating country or known associates.

2. What is the motivation of the group?

Hint: Try to analyse the known attacks by the group to understand what did the group attain from that attack- was it financial profit or was it to gain sensitive information or is it nation-state sponsored.

3. Were there any past successful attacks? If yes, name at-least three.

4. Submit the MITRE ATT&CK navigator. (Excel format is preferred)

Hint: Recall from the learning videos of the first week of the moduleUnderstanding Cyber Attacks

5. What are the IOC's (Indicators Of Compromise) for this group? Mention atleast 4.

6. What are your recommendations to the security team?

7. Provide references of the data. It is mandatory to provide the references to the source of your data.

Reference no: EM133459486

Questions Cloud

How non-it departments interact with it and how the change : how non-IT departments interact with IT and how the change in the market will change how business is performed.
Discuss corporate social responsibility codes of practice : "International Framework Agreements are more effective at engaging with trade unions than Corporate Social Responsibility (CSR) Codes of Practice."
Evaluate the ipsec and sll tls standards for implementing : Evaluate the IPsec and SLL/TLS standards for implementing security in the three different types of VPNs. Your evaluation for each VPN type should include
What the bible does and does not say about alcohol : what the Bible does and does not say about alcohol and then apply the same biblical logic to some remarks that you and your spouse might make to junior
What are your recommendations to the security team : What are the IOC's (Indicators Of Compromise) for this group? Mention atleast 4. What are your recommendations to the security team?
What could cause the trend to automation to reverse : What could cause the trend to automation to reverse? In other words, what could cause organizations to prefer humans over machines?
Write brief history of vampires on film : Write brief history of vampires on film, and describe some of the atmospheric tricks and special effects used to create the illusion of the undead
Explain the conservative christian understanding : Explain the conservative Christian understanding of salvation, especially the way it understands Jesus, the importance it gives to belief (orthodoxy)
Describe challenges human resource professionals : Describe (3) challenges human resource professionals to face in today's workforce. Identify strategies to manage these challenges.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd