In Project 3 your team is focused on preventing future incursions into the network and developing a business continuity plan to be deployed in case a breach occurs. There are 14 steps to be completed by the team with the project culminating in the production of a video and forensics report that summarizes the lessons learned from the recent network breach. This project will take 14 days to complete. After reading the scenario below proceed to Step 1 where you will establish your team agreement plan. Before the summit each nation set up its own secure comms network. As summit events began your team responded to anomalous network activity that was detected on your agencys server. Now to make matters worse the next day you awaken to the news that summit attendees are unable to get access to the confidential summit data needed for the conference. All the computer screens show a pop-up message that says: “Your Computer has been involved in Computer Fraud Activity!!! and has been locked down by the FBI and the Justice Department. Unless you pay the sum of $500 (FIVE HUNDRED DOLLARS)—in Bitcoin you will be arrested immediately! You have 48 hours to pay up via email – [email protected].” Your CISO has called an emergency meeting with your team. She begins to speak to the group. “Weve just been hit with the Reveton ransom attack which pretends to be a warning from a countrys law enforcement agency. It locks you out of your PC and threatens criminal proceedings within 48 hours based upon very serious offenses. The message informs you that you can avoid prosecution by paying a fine to the attackers via Bitcoin. Based on the time of the incident we believe that a single threat actor or group is responsible. This person or group is still unidentified.” The CISO continues to brief you on the attack confirming that no further information is known about the file permissions or tools used. Currently systems show no signs of infection or additional malicious indicators. The attendees at the summit are divided on what should be done. Some of them want to pay the money—its a small sum contrasted with holding up the proceedings. However cyber insiders know that once you pay a ransom you set a precedent for further attacks since you appear vulnerable. Also there is no certainty that paying the ransom will unlock the system. Hackers are not the most honorable of people. In addition you want to know how the attackers were able to infiltrate the system and plant the malware. What current protections are in place for systems at the summit? What methods and procedures are your team employing in response to the current attack? What is the plan if protections fall short? These are the questions pouring in from leadership down to your CISO—and now to you. Your CISO continues: “I need your team to provide a series of reports that will track this incident from start to recovery. Risk management briefings. Forensic reports. Situational reports. I need it all. Theyll all come in handy when its time to debrief our nations leaders.” When you submit your project your work will be evaluated using the competencies listed below. You can use the list below to self-check your work before submission. Requirements: 8 | .doc file
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more