Write about a sophisticated computer or network

Assignment Help Computer Network Security
Reference no: EM13894363

Read:

What Is APT and What Does It Want?

https://taosecurity.blogspot.com/2010/01/what-is-apt-and-what-does-it-want.html

Assignment

The goal of the Final Project is to research and write about a sophisticated computer/network intrusion set/event(s) that have occurred in the recent past, of which I will give you three options. The details on the intrusion set and the attack of which you should base your research on is attached in the associated .pdf:

APIT1 - Exposing One of China's Cyber Espionage Units APT1 Report.pdf: https://intelreport.mandiant.com/Mandiant_APT1_Report.pdf

APT29 - HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group APT29 - HAMMERTOSS Report.pd: https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf

sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks Flame Report.pd: https://www.crysys.hu/skywiper/skywiper.pdf

Your assignment is to write 4-6 pages, double-spaced, Times New Roman, 12 pt. Font, 1" margins in a document type of your choice (.doc, .pdf, etc.) detailing/answering the following:

Who is the attacker believed to be and why were they attacking the victim(s)? What were their motives? Were they trying to get information? If so, what information?

What attack vectors and mechanisms did they commonly use? Why, in your opinion, would you consider them to be sophisticated (i.e. not your average hack)?

Why types of encryption were used by the attacker to obfuscate their actions, whether it was an attack or stealthy reconnaissance? Where did the encryption help to hide them?

List out 2-3 Controls from Module 4 that would have helped to prevent certain types of attacks either in the attacker's command and control network or within the victim's network.

Conclude with your thoughts on why you chose this intrusion set/event(s). Explain why this interested you. Were the topics in the .pdf easy or difficult to understand? Please share any thoughts on the topic whether positive or negative.

Reference no: EM13894363

Questions Cloud

List the advantages of outsourcing the hr function : List the advantages of outsourcing the HR function. List the risks of outsourcing the HR function. How did outsourcing HR reduce the risk in developing OneSystem?
Calculate the firms sales and ROA : Grossman Enterprises has an equity multiplier of 3.08 times, total assets of $1,596,000, an ROE of 15.10 percent, and a total asset turnover ratio of 3.15 times. Calculate the firm’s sales and ROA.
What does perfect competition mean : What does "perfect competition" mean? State a few of the underlying assumptions. Explain in words why the demand curve a firm faces in a perfectly competitive market is horizontal.
Do you believe stock repurchases helped the stock price : Pick a public company of your choosing that has been buying back its own shares in at least three of the past five years. Who is the company and how many shares did they repurchase in each of those years? Do you believe the stock repurchases helped t..
Write about a sophisticated computer or network : The goal of the Final Project is to research and write about a sophisticated computer/network intrusion set/event(s) that have occurred in the recent past, of which I will give you three options. The details on the intrusion set and the attack of ..
Depreciation expenses are expected to be 0.5%of sales : Depreciation expenses are expected to be 0.5%of sales.
The present value of the depreciation tax shield : Your firm is considering a project that would require purchasing $7.1 million worth of new equipment. Determine the present value of the depreciation tax shield associated with this equipment if the firm's tax rate is 36%, the appropriate cost of cap..
What the short-run average cost : In the short run, capital is a fixed cost. Draw, for a few different values of K, what the short-run average cost, SRAC, looks like in relation to the long-run average cost.
Both bond-percentage change in price : Both Bond Sam and Bond Dave have 10 percent coupons, make semiannual payments, and are priced at par value. Bond Sam has three years to maturity, whereas Bond Dave has 18 years to maturity. Percentage change in price of Bond Dave?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Define broadband and baseband transmission technology

Define broadband and baseband transmission technology and describe broadband technology and how a broadband system operates.

  Describe an instance of a file that contain evidence

Describe an instance of a file that contain evidence of its own integrity and authenticity and describe a malware attack that causes the victim to receive physical advertisements.

  Determine plaintext and key from affine cipher

Below are given of ciphertext, from Affine cipher. Determine the plaintext and key. Give a clearly written description of the steps you followed to decrypt each ciphertext.

  Develop a security policy document

Write a ten to sixteen (10-16) page paper in which you develop a security policy document for your mid-sized organization that will include measures to protect against breaches and act as a proactive defense

  Case study on computer security

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer.

  Describe how cryptography can be used to meet your goal

You are designing a program that will be able to detect if any of the standard operating system files on a PC have been modified. You decide to use cryptography to accomplish this. Describe how cryptography can be used to meet your goal

  How will ad organizational units be organized

How will the second site factor into domain controller placement? How will AD sites be configured and how will AD organizational units be organized

  Des operating on a general plaintext input

DES operating on a general plaintext input 1st with key K1 and then with key K2 manufactures the same output as if K2 were first used and then K1.

  Security infrastructure and protocols

Compare and contrast the trust models for public keys used in PKI and PGP, and assess the statement that a PKI is a "top-down" approach to trust and PGP is a "bottom-up" approach to trust.

  Explain what is meant by authentication

In the context of information processing, computer security and trusted systems, explain what is meant by the following terms and why we want to use them: Authentication and Two factor authentication

  Application to input a character string

Output the string rotated to the right by a user-defined number of characters (0 or more). For example, Hello world!rotated by two characters would be: Hello world.

  Explain what scalability means in kerberos

One of the strengths of Kerberos is its scalability. Explain what scalability means in Kerberos and how the Kerberos system facilitates scalability.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd