Write about a sophisticated computer or network

Assignment Help Computer Network Security
Reference no: EM13894363

Read:

What Is APT and What Does It Want?

https://taosecurity.blogspot.com/2010/01/what-is-apt-and-what-does-it-want.html

Assignment

The goal of the Final Project is to research and write about a sophisticated computer/network intrusion set/event(s) that have occurred in the recent past, of which I will give you three options. The details on the intrusion set and the attack of which you should base your research on is attached in the associated .pdf:

APIT1 - Exposing One of China's Cyber Espionage Units APT1 Report.pdf: https://intelreport.mandiant.com/Mandiant_APT1_Report.pdf

APT29 - HAMMERTOSS: Stealthy Tactics Define a Russian Cyber Threat Group APT29 - HAMMERTOSS Report.pd: https://www2.fireeye.com/rs/848-DID-242/images/rpt-apt29-hammertoss.pdf

sKyWIper (a.k.a. Flame a.k.a. Flamer): A complex malware for targeted attacks Flame Report.pd: https://www.crysys.hu/skywiper/skywiper.pdf

Your assignment is to write 4-6 pages, double-spaced, Times New Roman, 12 pt. Font, 1" margins in a document type of your choice (.doc, .pdf, etc.) detailing/answering the following:

Who is the attacker believed to be and why were they attacking the victim(s)? What were their motives? Were they trying to get information? If so, what information?

What attack vectors and mechanisms did they commonly use? Why, in your opinion, would you consider them to be sophisticated (i.e. not your average hack)?

Why types of encryption were used by the attacker to obfuscate their actions, whether it was an attack or stealthy reconnaissance? Where did the encryption help to hide them?

List out 2-3 Controls from Module 4 that would have helped to prevent certain types of attacks either in the attacker's command and control network or within the victim's network.

Conclude with your thoughts on why you chose this intrusion set/event(s). Explain why this interested you. Were the topics in the .pdf easy or difficult to understand? Please share any thoughts on the topic whether positive or negative.

Reference no: EM13894363

Questions Cloud

List the advantages of outsourcing the hr function : List the advantages of outsourcing the HR function. List the risks of outsourcing the HR function. How did outsourcing HR reduce the risk in developing OneSystem?
Calculate the firms sales and ROA : Grossman Enterprises has an equity multiplier of 3.08 times, total assets of $1,596,000, an ROE of 15.10 percent, and a total asset turnover ratio of 3.15 times. Calculate the firm’s sales and ROA.
What does perfect competition mean : What does "perfect competition" mean? State a few of the underlying assumptions. Explain in words why the demand curve a firm faces in a perfectly competitive market is horizontal.
Do you believe stock repurchases helped the stock price : Pick a public company of your choosing that has been buying back its own shares in at least three of the past five years. Who is the company and how many shares did they repurchase in each of those years? Do you believe the stock repurchases helped t..
Write about a sophisticated computer or network : The goal of the Final Project is to research and write about a sophisticated computer/network intrusion set/event(s) that have occurred in the recent past, of which I will give you three options. The details on the intrusion set and the attack of ..
Depreciation expenses are expected to be 0.5%of sales : Depreciation expenses are expected to be 0.5%of sales.
The present value of the depreciation tax shield : Your firm is considering a project that would require purchasing $7.1 million worth of new equipment. Determine the present value of the depreciation tax shield associated with this equipment if the firm's tax rate is 36%, the appropriate cost of cap..
What the short-run average cost : In the short run, capital is a fixed cost. Draw, for a few different values of K, what the short-run average cost, SRAC, looks like in relation to the long-run average cost.
Both bond-percentage change in price : Both Bond Sam and Bond Dave have 10 percent coupons, make semiannual payments, and are priced at par value. Bond Sam has three years to maturity, whereas Bond Dave has 18 years to maturity. Percentage change in price of Bond Dave?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Write a short report documenting the installation

Write a short report documenting the installation even if you don't get the application running

  How system balanced security and usability

Examine how this system balanced security and usability, and explain the challenges of incorporating system security and system usability into a design.

  What is cryptanalysis

What is cryptanalysis. Give an example of a cryptanalytic problem. Describe the components of a digital stream cipher.

  Suppose that you are amerchant find out the advantages and

the payment card industry data security standard pci dss is used by credit card companies to ensure the safety of the

  Packet filtering firewall and stateful inspection firewall

What is the difference between a packet filtering firewall and a stateful inspection firewall? 12.6 What is an application-level gateway?

  Dos and ddos attack

Denial of Service attack (DoS) and Distributed Denial of service (DDoS) attack, two-factor authentication system, password ageing, biometric devic,  cryptographic attack made Double DES (2DES), Demilitarized Zone (DMZ), SSL protocols

  Cyber security triad

Choose a threat that targets one of three categories of the cyber security triad: Confidentiality, Integrity or  Availability. Using the posted instructions for writing a white paper

  Desktop publishing system used to produce documents

Consider a desktop publishing system used to produce documents for various organizations. Give an example in which system availability is the most impotent requirement. Please be very brief.

  Identity the various security configuration options

Any potential customer of the State Health Centre must be able to securely access all information aspects pertaining to services offered using a variety of mobile devices.

  Fiat-shamir protocol for entity authentication

What is the probability that a dishonest claimant is falsely verified as an authentic entity, i.e., what is the probability that the dishonest claimant responds correctly to all 9 challenges?

  Modern networks have to support a number of digital data

modern networks have to support a number of digital data protocols as well as digital audio protocols. the ability to

  Question about substitution ciphers

Think about two substitution ciphers. One adds a value of i to the ASCII code of the plain text character. The other adds a price of j to the plaintext character. All additions are modulo 256.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd