Address cyber threats and exploitation

Assignment Help Computer Network Security
Reference no: EM131701313

You are part of a collaborative team that was created to address cyber threats and exploitation of US financial systems critical infrastructure. Your team has been assembled by the White House Cyber National security staff to provide situational awareness about a current network breach and cyber attack against several financial service institutions. Your team consists of four roles, a representative from the financial services sector who has discovered the network breach and the cyber attacks. These attacks include distributed denial of service attacks, DDOS, web defacements, sensitive data exfiltration, and other attack vectors typical of this nation state actor.

A representative from law enforcement who has provided additional evidence of network attacks found using network defense tools. A representative from the intelligence agency who has identified the nation state actor from numerous public and government provided threat intelligence reports. This representative will provide threat intelligence on the tools, techniques, and procedures of this nation state actor. A representative from the Department of Homeland Security who will provide the risk, response, and recovery actions taken as a result of this cyber threat.

Your team will have to provide education and security awareness to the financial services sector about the threats, vulnerabilities, risks, and risk mitigation and remediation procedures to be implemented to maintain a robust security posture. Finally, your team will take the lessons learned from this cyber incident and share that knowledge with the rest of the cyber threat analysis community.

At the end of the response to this cyber incident, your team will provide two deliverables, a situational analysis report, or SAR, to the White House Cyber National security staff and an After Action Report and lesson learned to the cyber threat analyst community.

Tasks

1. Security Assessment Report (SAR): This report should be a 14-15 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

2. After Action Report (AAR): This report should be a 10-15 page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.

3. This is a 5-8 slide PowerPoint presentation for executives along with a narrated or In-Class Presentation summarizing your SAR and AAR report.

Representative task:
• Financial Services Representative.
- Description of the impact the threat would have on the financial services sector.
• Law Enforcement Representative.
- Description of the impact the threat would have on the law enforcement sector.
• Intelligence Agency Representative.
- Provide intelligence on the nation-state actor, their cyber tools, techniques, and procedures. Leverage available threat reporting such as from FireEye, Mandiant, and other companies and government entities that provide intelligence reports.
• Homeland Security Representative.
- Use the US-CERT and other similar resources to discuss the vulnerabilities and exploits that might have been used by the attackers.

To be completed by all team members:
• Assessing Suspicious Activity.
- Leverage the network security skills of using port scans, network scanning tools, and analyzing Wireshark files, to assess any suspicious network activity and network vulnerabilities.
• Financial Service.
- Provide submissions from the Information Sharing Analysis Councils related to the financial sector. You can also propose fictitious submissions. Also, review the resources for Industrial Control Systems, and advise the importance of them to the financial services sector. Explain the risks associated with the Industrial Controls Systems.
• Law Enforcement.
- Nothing.
• Intelligence Agency.
- Provide an overview of the life cycle of a cyber threat. Explain the different threat vectors that cyber actors use, and provide a possible list of nation-state actors that have targeted the US financial services industry before.
• Homeland Security.
- Provide a risk-threat matrix and provide a current state snapshot of the risk profile of the financial services sector.
• Proof reading.
- Proof reading of SAR.
- Proof reading of AAR
• PowerPoint presentations.
- A 5-8 slide PowerPoint presentation for executives along with narration or In-Class presentation by each team member summarizing a portion of your SAR and AAR report.

- APA citations of AAR

SAR report need to be 4 pages. AAR report need to be 4 pages. PowerPoint presentation for executives along with narration 3 slides

Verified Expert

SAR: SAR for White House Cyber National Security Staff includes threat, the motivations of the threat actor, the vulnerabilities that are possible for the threat actor to exploit, current and expected impact on US financial services critical infrastructure, the path forward to eliminate or reduce the risks, and the actions taken to defend and prevent against this threat in the future. AAR: AAR include systems life cycle methodology, rationale, and critical thinking used to resolve this cyber incident.

Reference no: EM131701313

Questions Cloud

Discuss about the bona fide occupational qualification : Should race and color be permissible bona fide occupational qualifications or should the BFOQ exceptions to employment discrimination be removed completely?
The production and operations management processes : The selection of a proper site for a business facility is important in the production and operations management processes.
The story the birthmark by nathaniel hawthorne : Please discuss the relationship between Aylmer and Georgiana in the story "The Birthmark" by Nathaniel Hawthorne.
What factors can activate platelets : What factors can activate platelets? What do platelets look like when activated? What important chemicals are contained within platelets?
Address cyber threats and exploitation : Description of the impact the threat would have on the financial services sector - Provide intelligence on the nation-state actor, their cyber tools, techniques
What is their process capability index : Their existing process produces meter sticks with an average length of 99.97 centimeters. What is their process capability index?
What happens in the vascular phase : What happens in the vascular phase? What prostaglandin is released that helps with vasoconstriction?
Determine breakeven total volume of sales : Gafat Engineering Ethio Plc manufactures two types of TV sets - LCD and CRT - both having only one model. The LCD and CRT television sets sell for Br 9,000.
Is there homeostasis in the hemostatic balance : Is there homeostasis in the hemostatic balance? That is, is there a balance between clotting factors and anti-coagulants?

Reviews

inf1701313

2/28/2018 5:09:33 AM

I am very pleased with your experts work. the work is good and the expert is very efficient, and always completes papers ahead of schedule decided by me. thank you.

len1701313

11/1/2017 5:40:40 AM

So, from what I am seeing, there are 8 task (From the GREEN highlighted sections)that we can break out as individual task. I would suggest that the constructor of each report also perform the APA citations of that particular report. This would bring the overall individual task to 6. Also,it might be a good idea for these construction/citations task to be performed by members that do not wish to take part in the technical parts. With that said, I would like to volunteer for the Law Enforcement task. Are there volunteers of any of the other individual task?

len1701313

11/1/2017 5:39:56 AM

I will be taking the part of Intelligence Agency Representative in this project. SAR report need to be 4 pages. AAR report need to be 4 pages. PowerPoint presentation for executives along with narration 3 slides After going through the “Project 4” document, I have identified the following task needing to be accomplished. The Green highlighted task are what I see as individual task. The Yellow highlighted task are what I see as needing to be done by each member of the group.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd