Establish a baseline of normal use

Assignment Help Basic Computer Science
Reference no: EM131376785

Take a look at this malware used by APT 29 a Russian hacking group. This is very advanced malware -  very stealthy.  This malware uses normal IT processes to execute, such as powershell.  This example is the reason that all Security Operations Centers need to monitor the changing threat picture.  Most organizations do not monitor powershell use.  In order to monitor powershell, the organizations needs to upgrade to powershell 5, then start ingesting logs into a correlated event management system. The organization then needs to establish a baseline of normal use in order to determine an anomaly.   Additionally a lot of commercial organizations use git hub and cloud storage, which this malware uses both.  Very hard to defend against this type of attack.  

Please answer the following:

1. What are some of the methods you would use to detect anonymous powershell activity?

2. As a security professional, what steps would you take to defend, detect and re mediate against this type of attack.

Requirements:

Needs to be in APA format with a min of 2 resources. Min 300 words

Reference no: EM131376785

Questions Cloud

Should funding for the u.s. space program be changed : Select three (3) topics that interest you most and identify two (2) credible sources for each topic. Note: This is one (1) of several parts that will build toward a final draft of your persuasive writing research paper. Write a one to two (1-2) pa..
Business requirements document : Write an eight to ten (8-10) page original business requirements document for the project plan using the template provided. Note: The template can be found in the Student Center of the online course shell.
What is the difference between an entity and an attribute : What are the four primary traits that help determine the value of information?- What is the difference between an entity and an attribute?
What is data warehouse and why business want to implement : What is a data warehouse and why would a business want to implement one?- Why would you need to use multidimensional analysis?
Establish a baseline of normal use : The organization then needs to establish a baseline of normal use in order to determine an anomaly.   Additionally a lot of commercial organizations use git hub and cloud storage, which this malware uses both.  Very hard to defend against this typ..
Research your chosen failure of creative thought : Identify an instance in which an individual or group was unsuccessful in using creative thinking to solve a problem, (such as the passage of prohibition in the United States in an attempt to reduce crime and improve living conditions for the worki..
Dictionary for nine tampa bay rays : Make a dictionary for nine Tampa Bay Rays (see below). Use the player names as keys and a list for each value. See page 374. Each value list should hold the position played by the player, the batting order, and current batting average.
Describe two of the gestalt laws of perceptual organization : Describe two of the Gestalt Laws of perceptual organization, illustrating each with a specific example.Evaluate the fit between Gestalt theories of perceptual organization and Biederman's Geon Theory.Describe the differences and similarities among fi..
Describe two scenarios for use of given type of software : Describe two scenarios (other than those described here) for the use of this type of software: one in which the use would be ethical and one in which it would be unethical.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Simulate a job scheduling mechanism

A Java program that will simulate an operating system's job scheduling policy to determine which process will be assigned the CPU when it become available.We will utilize a system of queues to simulate a job scheduling mechanism,The multi-level fe..

  Database development

Recommend at least three (3) specific tasks that could be performed to improve the quality of datasets, using the Software Development Life Cycle (SDLC) methodology. Include a thorough description of each activity per each phase.

  Cybersecurity plays in your use of that technology

Write a 3-4 page paper plus cover page on How information technology affects your everyday life and what role do you think Cybersecurity plays in your use of that technology. Write in APA 6th Edition

  How do these actions prevent potential problems

As Cyclone Phailin approached northeastern India, at least 64,000 people left their homes, a dry bulk cargo facility closed and sent all of it ships to sea, and emergency managers sent a rescue force to the area (Sullivan and Pradhan, 2013). How d..

  How will you run a process in background

How will you run a process in background? How will you bring that into foreground and how will you kill that process?

  Question regarding associations and personalities

In your post, identify some of the associations and personalities that are linked with the following brands: Oscar Mayer, Dell, and Sketchers. What are they? How do they differ? Are there any similarities?

  Write the algorithm to compute compound interest

write the algorithm to compute compound interest

  What is the advantage of using different types of cursors

What is the advantage of using different types of cursors?

  Will you create an entity-relationship diagram

After you perform fact-finding, you begin to work on the model. What diagrams will you create, and why? Will you use DFDs, object models, or both? Will you create an entity-relationship diagram? Explain your answers.

  Research wireless lan applications

Using the Internet, research wireless LAN applications. Compile a list of at least five applications that you had not imagined before for WLANs, and write a one-paragraph description below each one.

  Finalize a navigation system

List at least three interactive features that could be added to your site and what purpose each would serve for your site and its visitors. The form created in Part Two of this assignment can be included as one of the interactive features.

  Role of technology in the workplace

Consider the role of technology in the workplace today and take a stance on whether or not you believe a company has the right to monitor technology usage of its employees on a constant basis. Give your opinion on whether such limitation could (a)..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd