Reference no: EM133974030
Questions
IDENTIFY
List the hosts on your network and describe normal network traffic.
- What are the hosts on your network?
- What did normal/expected traffic look like on your network?
DETECT
Provide a brief description of the type of traffic you analyzed, including whether or not it was an attack.
- How did you determine what current network traffic looks like?
- What unusual activity did you find on the hosts?
- Who (which hosts) are the attacker(s) and the victim(s)?
- When did this occur(date/time)?
PROTECT
Provide your recommended mitigation.
- How did you identify the vulnerabilities on the victim host(s) that allowed this attack to occur?
- How did you mitigate (fix) the host's vulnerability?
RESPOND
Describe how you concluded this was malicious/attack traffic.
- How did you find the attack vectors?
- How did you stop the attack?
RECOVER
- Describe how the exploit could affect the system, specifically the function of each host/network node.
- How did you confirm that the problems are fixed and your network is safe and secure?