Identify the ip address of the bad actor

Assignment Help Basic Computer Science
Reference no: EM133543140

Assignment:

Topsecret is a cloud company with a mission to provide safe cloud storage. Topsecret provides a SAAS service which companies can buy different subscriptions in order to store documents in a secure environment. Picture 1 provides a snapshot of the architecture of Topsecret. Server S1 accepts remote connections from companies to access their files through firewall FW1. Picture 2 provides a sample of logs from S1 showing access to sensitive files.

With the help of the firewall FW2, we, as cyber security specialists, used a packet sniffer to capture some packets. Picture 3 shows high level description of these packets (traffic from Topsecret to outside). We have realized something suspicious happened. Someone was able to access a high confidential (ts1) file without proper authorization. The bad actor has tried hard to hide the digital fingerprint. As an information security specialist, you need to help Topsecret to understand the situation and find a solution. Topsecret.com corresponding IP address is 162.252.3.66.

Please answer the following questions based on the info provided:

1) Is it possible to identify whether the bad actor was an insider or outsider? Explain in details.

2) Is it possible to identify the IP address of the bad actor who has succeed to access the file "ts1"? explain in details.

3) Is it possible to identify the mechanism used by the bad actor to gain access to "ts1"? explain in details.

4) Which countermeasure could be applied here to prevent the same situation in the future. This countermeasure must be suitable to Topsecret normal activities (propose only the most important countermeasure). Justify your answer in details.

5) What is the most important security principle that you can propose to topsecret to increase the confidentiality of stored files? justify your answer in details.

Reference no: EM133543140

Questions Cloud

Create a customer long interview guide : Create a customer long interview guide so that the GreenWash partners can gather information to assess whether they are solving a pressing problem
What can she sue for to get the house : Mary has breached her contract to sell Sam her house. Mary really wants the house as it is perfect for her. What can she sue for to get the house?
Describe the six cultural phenomena that are evident : To provide culturally diverse nursing care, describe the six cultural phenomena that are evident in all cultural groups.
Analyze critical thinking skills in psychopathology : Analyze critical thinking skills in psychopathology of mental health patients and provide treatment and health promotion while applying evidence-based research.
Identify the ip address of the bad actor : Is it possible to identify the IP address of the bad actor who has succeed to access the file "ts1"? explain in details.
Critics of outsourcing make the strategic argument : Critics of outsourcing make the strategic argument that offshoring: a. puts proprietary functions at risk. b. causes job losses. c. ignores corporate social
How will you categorize patients using mci triage philosophy : How will you categorize the following patients using the MCI triage philosophy? Explain your answer. Are there any ethical issues that should be considered?
What is the compensation structure of banks : What is the compensation structure of banks in his article Disciplining Investment Bankers, Disciplining the Economy: Wall Street's Institutional Culture
Post a brief introduction of yourself to your colleagues : Post brief introduction of yourself to your colleagues. Explain why networking is important and how it may help you achieve your professional and academic goals

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd