These findings will be used to determine what other evidence can be

 

In Project 3, your team is focused on preventing future incursions into the network and developing a business continuity plan to be deployed in case a breach occurs. There are 14 steps to be completed by the team, with the project culminating in the production of a video and forensics report that summarizes the lessons learned from the recent network breach. This project should take 14 days to complete. After reading the scenario below, proceed to Step 1 where you will establish your team agreement plan.

Image of computer server room with many servers functioning. Lights go out in the room, and then lights on servers go dark and room is plunged into darkness.

Before the summit, each nation set up its own secure comms network. As summit events began, your team responded to anomalous network activity that was detected on your agency’s server.

Now, to make matters worse, the next day you awaken to the news that summit attendees are unable to get access to the confidential summit data needed for the conference. All of the computer screens show a pop-up message that says:

“Your Computer has been involved in Computer Fraud Activity!!! and has been locked down by the FBI and the Justice Department. Unless you pay the sum of $500 (FIVE HUNDRED DOLLARS)—in Bitcoin you will be arrested immediately! You have 48 hours to pay up via email – [email protected].”

Your CISO has called an emergency meeting with your team. She begins to speak to the group.

“We’ve just been hit with the Reveton ransom attack, which pretends to be a warning from a country’s law enforcement agency. It locks you out of your PC and threatens criminal proceedings within 48 hours based upon very serious offenses. The message informs you that you can avoid prosecution by paying a fine to the attackers via Bitcoin. Based on the time of the incident, we believe that a single threat actor or group is responsible. This person or group is still unidentified.”

The CISO continues to brief you on the attack, confirming that no further information is known about the file, permissions, or tools used. Currently, systems show no signs of infection or additional malicious indicators.

The attendees at the summit are divided on what should be done. Some of them want to pay the money—it’s a small sum to be holding up the proceedings. However, cyber insiders know that once you pay a ransom, you set a precedent for further attacks since you appear vulnerable.

In addition, you want to know how the attackers were able to infiltrate the system and plant the malware. What current protections are in place for systems at the summit? What methods and procedures are your team employing in response to the current attack? What is the plan if protections fall short? These are the questions pouring in from leadership, down to your CISO—and now, to you.

Your CISO continues: “I need your team to provide a series of reports that will track this incident from start to recovery. Risk management briefings. Forensic reports. Situational reports. I need it all. They’ll all come in handy when it’s time to debrief our nation’s leaders.”

COMPETENCIES

Your work will be evaluated using the competencies listed below.

1.8: Create clear oral messages.

2.3: Evaluate the information in a logical and organized manner to determine its value and relevance to the problem.

6.4: Systems Life Cycle: Explain systems life cycle management concepts used to plan, develop, implement, operate, and maintain information systems.

5.3: Demonstrate the appropriate use of multiple digital forensic tools and techniques for imaging.

6.1: Knowledge of methods and procedures to protect information systems and data by ensuring their availability, authentication, confidentiality, and integrity.

7.1: Develop, implement, and maintain business continuity planning.

These are the part of this project that I’m responsible for;

1. You’ve begun your response to the ransomware attack. Intelligence gathered from this investigation can be shared with the other nation teams so they can search through their systems to see if they have the same activity. As a team, you will now create documentation that can be used by others for threat information for investigations.

Using this situational report template, create your first situational report (SITREP #1) of the initial findings, and steps that are going to occur with the identified indicators that were presented. This report will be given to the rest of the nation teams. Describe the ransomware malicious activities such as file system alterations, services, IP addresses, and any other indicator that can be used by affected communities to search within their own networks.

The SITREP will be used for information sharing across nations/partner business operations. The SITREP should contain, but is not limited, to the following information:

  • when the problem was first detected and by whom
  • scope of the incident
  • indicators of compromise (IP address, file hash, protocols, registry edits)
  • how it was contained and eradicated

The findings will be used to supply a situation report to internal staff along with external agencies/nations that could be experiencing the same type of attack. This information will speed the process of the incident response team by narrowing the search for specific indicators, whether they are targeting individuals, vulnerabilities, or resources such as web servers, databases, or even phone lines. These reports also keep management apprised of what is occurring so leaders can continue to address questions..

When you have finished gathering the initial information and have compiled the document, your designated team member should submit SITREP #1 for review and feedback. The SITREP #1 will be used in the intelligence briefing that you will develop in a later step.

Submission for Group 4: Project 3: SITREP #1

PREVIOUS SUBMISSIONS

0

Drop files here, or click below.

ADD FILES

In the meantime, a number of operations need to take place so you and your team members can understand the reasons behind the ransomware attack. Those operations will include several steps, including the creation of a business continuity plan (BCP), in which you will address supply chain risks and the software development life cycle. In a later step, you will conduct digital forensics exercises in the lab.

For now, we will begin the first parts of the BCP. In the next step, you will examine software life cycle processes en route to creating a software development matrix—a key portion of the BCP and a component of the final forensic investigation report.

2. Meanwhile, as you and your team have been working on the various parts of the overall analysis of the systems as a result of the attack, the CISO has been notified by credible sources that malware has been located inside the network. The CISO has also received new intelligence regarding the ransomware attacker’s demands. The attacker has raised the ransom from $500 to $5,000 in Bitcoin per nation state. Conference participants are split on whether to pay the ransom. You know that this decision requires an understanding of virtual currency and the financial implications of virtual currency. While leadership is contemplating options, the CISO needs to act quickly to facilitate operations recovery.

The CISO needs a report on findings and further indicators that can be shared with allies. The indicators can be found for each team in this malware indicator file. Based on the findings, the CISO would like your team to generate documentation regarding defense mechanisms needed to stop this style of attack. This documentation will be your second situation report, or SITREP #2.

In one to two pages, SITREP #2 should describe threat information and any other information that fellow nations could use to speed their investigations. It will be used for information-sharing across nations/partner business operations and will help incident response teams and operations centers narrow their search based on findings. The report should include:

  • when the problem was detected and by whom
  • scope of the incident
  • indicators of compromise (IP address, file hash, protocols, registry edits)
  • how it was contained and eradicated
  • user screen captures (e.g., error messages or dialog boxes)

Take findings from all files, hashes, IP addresses, URLs and any other indicators presented and investigate while using the following files provided to you:

These findings will be used to determine what other evidence can be derived from evidence provided in the form of indicators and possible files.

This data sharing checklist for submitting and sharing information is available for all to use as nations become confident sharing information with fellow countries at the summit. Review it to ensure that your nation is exercising best practices in information sharing. Providing too much information could pose a threat to the nation’s cybersecurity posture.

Your team’s level of detail could be the difference between a benign incident and a catastrophic breach/mission critical resource failure.

When you and the other team members have finished compiling the second situational report, the designated team member should submit SITREP #2 for review and feedback. Your SITREP #2 will be used in the intelligence briefing that you develop in a later step.

In the meantime, the team is going to work on digital forensics to help identify sources of the attack. You’ll work on a lab exercise in the next step.

Submission for Group 4: Project 3: SITREP #2

3. Your nation’s technical staff expects you to report on all summit events once you return to your nation’s capital. The CISO has requested that each analyst work independently to create an Intelligence Debriefing for technical staff. This debriefing is a comprehensive report and is comprised of your BCP, SITREP 1, and SITREP 2.

Each team member should develop his or her own briefing and submit independently. You may, however, use your team’s discussion area to share your findings with your peers.

Refer to the CISO Deliverable Overview for a full list of requirements for the debriefing.

When you have completed your Intelligence Debriefing, submit it for feedback. The next step will be one of reflection, in which you will create a presentation on what you and your team members have learned from the ransomware attack and the mitigation and recovery activities that followed.

Submission for Group 4: Project 3: Intelligence Debriefing

These are the part of this project that I’m responsible for;

1. You’ve begun your response to the ransomware attack. Intelligence gathered from this investigation can be shared with the other nation teams so they can search through their systems to see if they have the same activity. As a team, you will now create documentation that can be used by others for threat information for investigations.

Using this situational report template, create your first situational report (SITREP #1) of the initial findings, and steps that are going to occur with the identified indicators that were presented. This report will be given to the rest of the nation teams. Describe the ransomware malicious activities such as file system alterations, services, IP addresses, and any other indicator that can be used by affected communities to search within their own networks.

The SITREP will be used for information sharing across nations/partner business operations. The SITREP should contain, but is not limited, to the following information:

  • when the problem was first detected and by whom
  • scope of the incident
  • indicators of compromise (IP address, file hash, protocols, registry edits)
  • how it was contained and eradicated

The findings will be used to supply a situation report to internal staff along with external agencies/nations that could be experiencing the same type of attack. This information will speed the process of the incident response team by narrowing the search for specific indicators, whether they are targeting individuals, vulnerabilities, or resources such as web servers, databases, or even phone lines. These reports also keep management apprised of what is occurring so leaders can continue to address questions..

When you have finished gathering the initial information and have compiled the document, your designated team member should submit SITREP #1 for review and feedback. The SITREP #1 will be used in the intelligence briefing that you will develop in a later step.

Submission for Group 4: Project 3: SITREP #1

PREVIOUS SUBMISSIONS

0

Drop files here, or click below.

ADD FILES

In the meantime, a number of operations need to take place so you and your team members can understand the reasons behind the ransomware attack. Those operations will include several steps, including the creation of a business continuity plan (BCP), in which you will address supply chain risks and the software development life cycle. In a later step, you will conduct digital forensics exercises in the lab.

For now, we will begin the first parts of the BCP. In the next step, you will examine software life cycle processes en route to creating a software development matrix—a key portion of the BCP and a component of the final forensic investigation report.

2. Meanwhile, as you and your team have been working on the various parts of the overall analysis of the systems as a result of the attack, the CISO has been notified by credible sources that malware has been located inside the network. The CISO has also received new intelligence regarding the ransomware attacker’s demands. The attacker has raised the ransom from $500 to $5,000 in Bitcoin per nation state. Conference participants are split on whether to pay the ransom. You know that this decision requires an understanding of virtual currency and the financial implications of virtual currency. While leadership is contemplating options, the CISO needs to act quickly to facilitate operations recovery.

The CISO needs a report on findings and further indicators that can be shared with allies. The indicators can be found for each team in this malware indicator file. Based on the findings, the CISO would like your team to generate documentation regarding defense mechanisms needed to stop this style of attack. This documentation will be your second situation report, or SITREP #2.

In one to two pages, SITREP #2 should describe threat information and any other information that fellow nations could use to speed their investigations. It will be used for information-sharing across nations/partner business operations and will help incident response teams and operations centers narrow their search based on findings. The report should include:

  • when the problem was detected and by whom
  • scope of the incident
  • indicators of compromise (IP address, file hash, protocols, registry edits)
  • how it was contained and eradicated
  • user screen captures (e.g., error messages or dialog boxes)

Take findings from all files, hashes, IP addresses, URLs and any other indicators presented and investigate while using the following files provided to you:

These findings will be used to determine what other evidence can be derived from evidence provided in the form of indicators and possible files.

This data sharing checklist for submitting and sharing information is available for all to use as nations become confident sharing information with fellow countries at the summit. Review it to ensure that your nation is exercising best practices in information sharing. Providing too much information could pose a threat to the nation’s cybersecurity posture.

Your team’s level of detail could be the difference between a benign incident and a catastrophic breach/mission critical resource failure.

When you and the other team members have finished compiling the second situational report, the designated team member should submit SITREP #2 for review and feedback. Your SITREP #2 will be used in the intelligence briefing that you develop in a later step.

In the meantime, the team is going to work on digital forensics to help identify sources of the attack. You’ll work on a lab exercise in the next step.

Submission for Group 4: Project 3: SITREP #2

3. Your nation’s technical staff expects you to report on all summit events once you return to your nation’s capital. The CISO has requested that each analyst work independently to create an Intelligence Debriefing for technical staff. This debriefing is a comprehensive report and is comprised of your BCP, SITREP 1, and SITREP 2.

Each team member should develop his or her own briefing and submit independently. You may, however, use your team’s discussion area to share your findings with your peers.

Refer to the CISO Deliverable Overview for a full list of requirements for the debriefing.

When you have completed your Intelligence Debriefing, submit it for feedback. The next step will be one of reflection, in which you will create a presentation on what you and your team members have learned from the ransomware attack and the mitigation and recovery activities that followed.

Submission for Group 4: Project 3: Intelligence Debriefing

Hey Bro. Please see above message for project responsibility;

Please let me know if you need any other information: 

Please use google chrome

Vdi.umuc.edu

Username: efreeman13

Pass: Freedom123098

under Lab,

Login: StudentFirst 

Calculate the price of your order

Choose an academic level, add pages, and the paper type you want.
To reduce the cost of our essay writing services, select the lengthier deadline.
We can't believe we just said that to you.

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Why is Purdue Papers the Most Helpful Essay Writing Service for You?

  1. Custom-written and plagiarism-free papers: Our authors create their work from scratch. Before presenting them to clients, we routinely verify them for signs of plagiarism. Our quality assurance group also double-checks and fixes any grammatical errors, assuring that all of our authors adhere to the same standards of writing.
  2. The significance of timely delivery cannot be overstated, and we consistently strive to meet or exceed our clients' deadlines. Regardless of the short time frame, you can count on our writers to get the job done. We always have a team of writers ready to go, even if the deadline is only six hours away.
  3. Customer Satisfaction: Our customer service representatives are the best in the business and have a wealth of knowledge in dealing with clients. All our customer service representatives are trained to listen and reply promptly until you are satisfied with their service. To ensure you're happy, our expert writers will strictly follow the criteria to generate a special report. Our customer service may be contacted by chat, email, or phone. In addition, we provide round-the-clock assistance to all of our clients.
  4. Confidentiality: Our systems are safe, and your information is always protected. We're constantly looking for new facts when it comes to finishing your work. We use a safe and secure payment channel. Since our ordering process is completely anonymous, you don't have to provide any credit card information to place a purchase with us.
  5. Highly Trained Authors: Our writers have received extensive training and are committed to delivering only the best papers. They are fluent in APA, MLA, HARVARD, IEEE, CHICAGO, and AMA referencing styles. To meet your expectations, our skilled writers always pay close attention to your instructions.
  6. Lowered prices: We have set prices that are already discounted. Our prices are the best and affordable for all our esteemed customers.

Let Professionals Take Care of your Academic Paper