Establish a baseline of normal use

Assignment Help Basic Computer Science
Reference no: EM131376785

Take a look at this malware used by APT 29 a Russian hacking group. This is very advanced malware -  very stealthy.  This malware uses normal IT processes to execute, such as powershell.  This example is the reason that all Security Operations Centers need to monitor the changing threat picture.  Most organizations do not monitor powershell use.  In order to monitor powershell, the organizations needs to upgrade to powershell 5, then start ingesting logs into a correlated event management system. The organization then needs to establish a baseline of normal use in order to determine an anomaly.   Additionally a lot of commercial organizations use git hub and cloud storage, which this malware uses both.  Very hard to defend against this type of attack.  

Please answer the following:

1. What are some of the methods you would use to detect anonymous powershell activity?

2. As a security professional, what steps would you take to defend, detect and re mediate against this type of attack.

Requirements:

Needs to be in APA format with a min of 2 resources. Min 300 words

Reference no: EM131376785

Questions Cloud

Should funding for the u.s. space program be changed : Select three (3) topics that interest you most and identify two (2) credible sources for each topic. Note: This is one (1) of several parts that will build toward a final draft of your persuasive writing research paper. Write a one to two (1-2) pa..
Business requirements document : Write an eight to ten (8-10) page original business requirements document for the project plan using the template provided. Note: The template can be found in the Student Center of the online course shell.
What is the difference between an entity and an attribute : What are the four primary traits that help determine the value of information?- What is the difference between an entity and an attribute?
What is data warehouse and why business want to implement : What is a data warehouse and why would a business want to implement one?- Why would you need to use multidimensional analysis?
Establish a baseline of normal use : The organization then needs to establish a baseline of normal use in order to determine an anomaly.   Additionally a lot of commercial organizations use git hub and cloud storage, which this malware uses both.  Very hard to defend against this typ..
Research your chosen failure of creative thought : Identify an instance in which an individual or group was unsuccessful in using creative thinking to solve a problem, (such as the passage of prohibition in the United States in an attempt to reduce crime and improve living conditions for the worki..
Dictionary for nine tampa bay rays : Make a dictionary for nine Tampa Bay Rays (see below). Use the player names as keys and a list for each value. See page 374. Each value list should hold the position played by the player, the batting order, and current batting average.
Describe two of the gestalt laws of perceptual organization : Describe two of the Gestalt Laws of perceptual organization, illustrating each with a specific example.Evaluate the fit between Gestalt theories of perceptual organization and Biederman's Geon Theory.Describe the differences and similarities among fi..
Describe two scenarios for use of given type of software : Describe two scenarios (other than those described here) for the use of this type of software: one in which the use would be ethical and one in which it would be unethical.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Compute the cosine distance between each pair of users

Then, construct from the original matrix of Fig. 9.8 a new matrix whose rows correspond to users, as before, and whose columns correspond to clusters. Compute the entry for a user and cluster of items by averaging the nonblank entries for that use..

  How much should the company invest in risky assets

How much should the company invest in risky assets (R), to maximize its wealth at the end of a stipulated period? Formulate the objective function for the optimization problem.

  The circuit and creating a boolean expression

Which is creating a truth table for the circuit and creating a Boolean expression.

  Find the sixth term and the sum of the 15 terms

Find the number of permutations of the letters v, w, x, y, z taken five at a time.

  Demonstrate how to create a document using microsoft word

After successfully completing the laboratory assignment you should be able to: Employ the components of Microsoft Word 2010, Demonstrate how to create, edit, save, and print a document using Microsoft Word 2010

  Rejection of the candles and stationery

The owners turned down candle makers and a specialty stationery company-both of which are compact-in order to stock the artwork and sculpture. The consequences in cash flow following from the rejection of the candles and stationery is called a(n) ..

  Calculate the characteristic impedance of the high-frequency

Use the FDM to calculate the characteristic impedance of the high-frequency, air-filled rectangular transmission line

  From the e-activity, briefly describe through research

From the e-Activity, briefly describe through research one way the company you chose is using a data warehouse. Support your reasoning. Cite all references.

  Generalized statements relating to a group of people

Identify the rhetorical strategy in each of the following statements. 1. I did not say the meat was tough. I said I did not see the horse that is usually outside (W. C. Fields). _________________ 2. Have you stopped beating your wife? ____..

  Traditional ways and avoid electronic commerce

1. Describe three factors that would cause a company to continue doing business in traditional ways and avoid electronic commerce. 2. How might managers use SWOT analysis to identify new applications for electronic commerce in their strategic busin..

  Find the position of an integer x in m

Give an efficient algorithm to find the position of an integer x in M, or to determine that x is not there. How many comparisons of x with matrix entries does your algorithm use in worst case?

  Streamlining the note-taking process

When an instructor writes on a(n) ________ whiteboard, all information can be sent to a PC, simplifying and streamlining the note-taking process for meetings and classes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd