Write about a sophisticated computer or network

Assignment Help Computer Network Security
Reference no: EM13894363

Read:

What Is APT and What Does It Want?

https://taosecurity.blogspot.com/2010/01/what-is-apt-and-what-does-it-want.html

Assignment

The goal of the Final Project is to research and write about a sophisticated computer/network intrusion set/event(s) that have occurred in the recent past, of which I will give you three options. The details on the intrusion set and the attack of which you should base your research on is attached in the associated .pdf:

APIT1 - Exposing One of China's Cyber Espionage Units APT1 Report.pdf: https://intelreport.mandiant.com/Mandiant_APT1_Report.pdf

APT29 - HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group APT29 - HAMMERTOSS Report.pd: https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf

sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks Flame Report.pd: https://www.crysys.hu/skywiper/skywiper.pdf

Your assignment is to write 4-6 pages, double-spaced, Times New Roman, 12 pt. Font, 1" margins in a document type of your choice (.doc, .pdf, etc.) detailing/answering the following:

Who is the attacker believed to be and why were they attacking the victim(s)? What were their motives? Were they trying to get information? If so, what information?

What attack vectors and mechanisms did they commonly use? Why, in your opinion, would you consider them to be sophisticated (i.e. not your average hack)?

Why types of encryption were used by the attacker to obfuscate their actions, whether it was an attack or stealthy reconnaissance? Where did the encryption help to hide them?

List out 2-3 Controls from Module 4 that would have helped to prevent certain types of attacks either in the attacker's command and control network or within the victim's network.

Conclude with your thoughts on why you chose this intrusion set/event(s). Explain why this interested you. Were the topics in the .pdf easy or difficult to understand? Please share any thoughts on the topic whether positive or negative.

Reference no: EM13894363

Questions Cloud

List the advantages of outsourcing the hr function : List the advantages of outsourcing the HR function. List the risks of outsourcing the HR function. How did outsourcing HR reduce the risk in developing OneSystem?
Calculate the firms sales and ROA : Grossman Enterprises has an equity multiplier of 3.08 times, total assets of $1,596,000, an ROE of 15.10 percent, and a total asset turnover ratio of 3.15 times. Calculate the firm’s sales and ROA.
What does perfect competition mean : What does "perfect competition" mean? State a few of the underlying assumptions. Explain in words why the demand curve a firm faces in a perfectly competitive market is horizontal.
Do you believe stock repurchases helped the stock price : Pick a public company of your choosing that has been buying back its own shares in at least three of the past five years. Who is the company and how many shares did they repurchase in each of those years? Do you believe the stock repurchases helped t..
Write about a sophisticated computer or network : The goal of the Final Project is to research and write about a sophisticated computer/network intrusion set/event(s) that have occurred in the recent past, of which I will give you three options. The details on the intrusion set and the attack of ..
Depreciation expenses are expected to be 0.5%of sales : Depreciation expenses are expected to be 0.5%of sales.
The present value of the depreciation tax shield : Your firm is considering a project that would require purchasing $7.1 million worth of new equipment. Determine the present value of the depreciation tax shield associated with this equipment if the firm's tax rate is 36%, the appropriate cost of cap..
What the short-run average cost : In the short run, capital is a fixed cost. Draw, for a few different values of K, what the short-run average cost, SRAC, looks like in relation to the long-run average cost.
Both bond-percentage change in price : Both Bond Sam and Bond Dave have 10 percent coupons, make semiannual payments, and are priced at par value. Bond Sam has three years to maturity, whereas Bond Dave has 18 years to maturity. Percentage change in price of Bond Dave?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Please type a three- to five-page 800 to 1200 words paper

please type a three- to five-page 800 to 1200 words paper. using apa style assess the importance of developing a

  Exchange keys out of band in symmetric encryption

In symmetric encryption, why is it significant to exchange keys "out of band"? Write down the difference between "digital signature" and "digital certificate"?

  Access control list

DNS Cache Poisoning attack, Turtle Shell Architecture,

  Create and describe a comprehensive security policy

Create and describe a comprehensive security policy for this data-collection and analysis company that will: Protect the company infrastructure and assets by applying the principals of confidentiality, integrity, and availability (CIA). Note: CIA i..

  What are the most significant threats to your data

What is cyber security, and what are some of its key concepts and what are the most significant threats to your data, and what are some of the root causes of those threats - are cyber criminals a real danger to your enterprise? Why or why not?

  Explain a technique used by hackers to cover their tracks

describe a technique used by hackers to cover their tracks after a network attack. this may take a little bit of

  What is the total number of public key

An organization has 100 members. It is desired that each member of the organization be able to communicate securely with any other member, without any other member being able to decrypt their messages.

  Why is security primarily a management issue not a

why is security primarily a management issue not a technological issue? also provide some specific bulleted points on

  What types of physical controls can be implemented

What types of physical controls can be implemented to protect the perimeter of a building

  Explain access control methods and attacks

Explain access control methods and attacks

  Explain how an ip packet might become duplicated

Explain how an IP packet might become duplicated and arrive twice at its destination.

  How to set up or improve their cybersecurity

How should government justify telling private industry how to set up or improve their cybersecurity?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd