IT代写 Week 3 Workshop

Week 3 Workshop
Key knowledge/skills: Cyber Kill Chain & Cyber threats
Case study (as briefly discussed in the 2nd lecture) – “Company X and Company Y are competitors who both are bidding on a secret Government project. Staff A (attacker) from Company X learned from LinkedIn that Staff V (victim) is the lead architect in Company Y. A then crafted an email pretending from acquaintance of V with a malware attached. Note that A developed the malware by leveraging a recent Zero day vulnerability. V was lured to click on the malware in the email, which installed a backdoor, after successfully exploited the targeted vulnerability on Staff V’s system. This gave A the remote control of Staff V’s computer. After that, Staff A used a compromised server (C2 server) to issue commands to maintain the control of V’s computer. One night, A started to upload key design documents from V’s computer to a shared Cloud storage folder owned by Staff A.”
Q1. Map the attack activities to Cyber Kill Chain (CKC)

Copyright By PowCoder代写 加微信 powcoder

Q2. Map the following technical controls to Cyber Kill Chain (CKC), e.g., ‘Email Security: CKC3 Delivery’; and what other controls you can think of?
• Gateway controls such as Web Proxy, Email Security, DNS
• Network controls such as IPS (Intrusion Prevention System)
• Endpoint controls such as AV (Anti-Virus), HIPS (Host based IPS)
Q3. Assuming you have access to all the logs / security alerts of the above controls during the event, what are the key information/attributes can help detect/stop the attack?

程序代写 CS代考 加微信: powcoder QQ: 1823890830 Email: powcoder@163.com