SlideShare a Scribd company logo
1 of 1
You are the lead investigator for a major intelligence agency in
the Washington, DC area. You are in a security meeting with
the network administrators. The meeting concerns a worm that
has infected the enterprise network spanning several continents.
The network analysts are struggling to find the entry point for
this worm. With a network forensics analysis tool (NFAT), the
network administrators are performing real-time analysis
watching the worm travel across the network.
You request that the network administrators find out how this
worm is traveling across the network.
Describe how the administrators will find where there has been
increased threat activity.
Describe how the administrators will find where there is
increased activity either in the network ports or e-mail servers.
Describe how time stamps will play a role in backtracking in
time until the point of entry for the worm is located watching
the worm travel across the network.
The paper should be 3–5 pages written in Word and should
provide descriptions for the 3 bullets above, containing a title
page, introduction, main body, conclusion, and reference list in
APA format.

More Related Content

Similar to You are the lead investigator for a major intelligence agency in the.docx

Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far
AlleneMcclendon878
 
Target attack (hkust gold edition)(public version)
Target attack (hkust gold edition)(public version)Target attack (hkust gold edition)(public version)
Target attack (hkust gold edition)(public version)
Anthony Lai
 
An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...
UltraUploader
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
Sunny Geo
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
Sunny Geo
 
Recipient Activated Malware Diffusion
Recipient Activated Malware DiffusionRecipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
Bruce Fowler
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
SUBHI7
 
Topic Since information extracted from router or switch interfaces.docx
Topic Since information extracted from router or switch interfaces.docxTopic Since information extracted from router or switch interfaces.docx
Topic Since information extracted from router or switch interfaces.docx
juliennehar
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
Yasser Mohammed
 

Similar to You are the lead investigator for a major intelligence agency in the.docx (20)

Identifying Malicious Data in Social Media
Identifying Malicious Data in Social MediaIdentifying Malicious Data in Social Media
Identifying Malicious Data in Social Media
 
Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far Virtual Labs SniffingConsider what you have learned so far
Virtual Labs SniffingConsider what you have learned so far
 
Network activity
Network activityNetwork activity
Network activity
 
Target attack (hkust gold edition)(public version)
Target attack (hkust gold edition)(public version)Target attack (hkust gold edition)(public version)
Target attack (hkust gold edition)(public version)
 
4777.team c.final
4777.team c.final4777.team c.final
4777.team c.final
 
An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...An effective architecture and algorithm for detecting worms with various scan...
An effective architecture and algorithm for detecting worms with various scan...
 
A1803050106
A1803050106A1803050106
A1803050106
 
O046048187
O046048187O046048187
O046048187
 
Cyber warfare introduction
Cyber warfare introductionCyber warfare introduction
Cyber warfare introduction
 
Malwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant ExtractionMalwise-Malware Classification and Variant Extraction
Malwise-Malware Classification and Variant Extraction
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
 
Personam Solution - How it Works Brief
Personam Solution - How it Works BriefPersonam Solution - How it Works Brief
Personam Solution - How it Works Brief
 
Recipient Activated Malware Diffusion
Recipient Activated Malware DiffusionRecipient Activated Malware Diffusion
Recipient Activated Malware Diffusion
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
There millions of websites - 2 or more students should not have .docx
There millions of websites - 2 or more students should not have .docxThere millions of websites - 2 or more students should not have .docx
There millions of websites - 2 or more students should not have .docx
 
H0434651
H0434651H0434651
H0434651
 
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...C-Worm Traffic Detection using Power Spectral Density and  Spectral Flatness ...
C-Worm Traffic Detection using Power Spectral Density and Spectral Flatness ...
 
Topic Since information extracted from router or switch interfaces.docx
Topic Since information extracted from router or switch interfaces.docxTopic Since information extracted from router or switch interfaces.docx
Topic Since information extracted from router or switch interfaces.docx
 
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
EXTERNAL - Whitepaper - How 3 Cyber ThreatsTransform Incident Response 081516
 

More from mitziesmith74

You are to write a current event paper, approximately 750 words in l.docx
You are to write a current event paper, approximately 750 words in l.docxYou are to write a current event paper, approximately 750 words in l.docx
You are to write a current event paper, approximately 750 words in l.docx
mitziesmith74
 
You are required to quote your textbook twice AND ONE OTHER outside .docx
You are required to quote your textbook twice AND ONE OTHER outside .docxYou are required to quote your textbook twice AND ONE OTHER outside .docx
You are required to quote your textbook twice AND ONE OTHER outside .docx
mitziesmith74
 
You are employed at a large global high-tech company that has office.docx
You are employed at a large global high-tech company that has office.docxYou are employed at a large global high-tech company that has office.docx
You are employed at a large global high-tech company that has office.docx
mitziesmith74
 
You are employed as a top health administrator at the hypothetical W.docx
You are employed as a top health administrator at the hypothetical W.docxYou are employed as a top health administrator at the hypothetical W.docx
You are employed as a top health administrator at the hypothetical W.docx
mitziesmith74
 
Quality Management A Systems ApproachStudent Number.docx
Quality Management A Systems ApproachStudent Number.docxQuality Management A Systems ApproachStudent Number.docx
Quality Management A Systems ApproachStudent Number.docx
mitziesmith74
 

More from mitziesmith74 (20)

YOU DECIDE ASSIGNMENTTension and conflict continue and this proble.docx
YOU DECIDE ASSIGNMENTTension and conflict continue and this proble.docxYOU DECIDE ASSIGNMENTTension and conflict continue and this proble.docx
YOU DECIDE ASSIGNMENTTension and conflict continue and this proble.docx
 
You are working at the veterans agency and your caseload includes m.docx
You are working at the veterans agency and your caseload includes m.docxYou are working at the veterans agency and your caseload includes m.docx
You are working at the veterans agency and your caseload includes m.docx
 
You are working as a school counselor and have been working with Mar.docx
You are working as a school counselor and have been working with Mar.docxYou are working as a school counselor and have been working with Mar.docx
You are working as a school counselor and have been working with Mar.docx
 
You are trying to establish uniform standards in your information te.docx
You are trying to establish uniform standards in your information te.docxYou are trying to establish uniform standards in your information te.docx
You are trying to establish uniform standards in your information te.docx
 
You are to write a current event paper, approximately 750 words in l.docx
You are to write a current event paper, approximately 750 words in l.docxYou are to write a current event paper, approximately 750 words in l.docx
You are to write a current event paper, approximately 750 words in l.docx
 
You are the public health director for the city. The controversial i.docx
You are the public health director for the city. The controversial i.docxYou are the public health director for the city. The controversial i.docx
You are the public health director for the city. The controversial i.docx
 
You are the project manager for a large multi-national project. Team.docx
You are the project manager for a large multi-national project. Team.docxYou are the project manager for a large multi-national project. Team.docx
You are the project manager for a large multi-national project. Team.docx
 
You are the nurse manager on a large unit that has 14 FTE RNs on.docx
You are the nurse manager on a large unit that has 14 FTE RNs on.docxYou are the nurse manager on a large unit that has 14 FTE RNs on.docx
You are the nurse manager on a large unit that has 14 FTE RNs on.docx
 
You are speaking on the phone with Mike when he asks about what sort.docx
You are speaking on the phone with Mike when he asks about what sort.docxYou are speaking on the phone with Mike when he asks about what sort.docx
You are speaking on the phone with Mike when he asks about what sort.docx
 
You are required to quote your textbook twice AND ONE OTHER outside .docx
You are required to quote your textbook twice AND ONE OTHER outside .docxYou are required to quote your textbook twice AND ONE OTHER outside .docx
You are required to quote your textbook twice AND ONE OTHER outside .docx
 
You are hired as a Chief Technology Officer (CTO) of a startup com.docx
You are hired as a Chief Technology Officer (CTO) of a startup com.docxYou are hired as a Chief Technology Officer (CTO) of a startup com.docx
You are hired as a Chief Technology Officer (CTO) of a startup com.docx
 
You are employed at a large global high-tech company that has office.docx
You are employed at a large global high-tech company that has office.docxYou are employed at a large global high-tech company that has office.docx
You are employed at a large global high-tech company that has office.docx
 
You are in Johnson County in the deep South. The Sheriff, Jim Jones .docx
You are in Johnson County in the deep South. The Sheriff, Jim Jones .docxYou are in Johnson County in the deep South. The Sheriff, Jim Jones .docx
You are in Johnson County in the deep South. The Sheriff, Jim Jones .docx
 
You are employed as a top health administrator at the hypothetical W.docx
You are employed as a top health administrator at the hypothetical W.docxYou are employed as a top health administrator at the hypothetical W.docx
You are employed as a top health administrator at the hypothetical W.docx
 
You are going to design a database system for a small university..docx
You are going to design a database system for a small university..docxYou are going to design a database system for a small university..docx
You are going to design a database system for a small university..docx
 
You are either an Egyptian priest or priestess of Bastet, a member o.docx
You are either an Egyptian priest or priestess of Bastet, a member o.docxYou are either an Egyptian priest or priestess of Bastet, a member o.docx
You are either an Egyptian priest or priestess of Bastet, a member o.docx
 
You are currently working as an administrative assistant for a large.docx
You are currently working as an administrative assistant for a large.docxYou are currently working as an administrative assistant for a large.docx
You are currently working as an administrative assistant for a large.docx
 
Quality tools  Complete populating for ANY seven tools with data..docx
Quality tools  Complete populating for ANY seven tools with data..docxQuality tools  Complete populating for ANY seven tools with data..docx
Quality tools  Complete populating for ANY seven tools with data..docx
 
Quality Measure Affecting StakeholdersIntroduction 100 words.docx
Quality Measure Affecting StakeholdersIntroduction 100 words.docxQuality Measure Affecting StakeholdersIntroduction 100 words.docx
Quality Measure Affecting StakeholdersIntroduction 100 words.docx
 
Quality Management A Systems ApproachStudent Number.docx
Quality Management A Systems ApproachStudent Number.docxQuality Management A Systems ApproachStudent Number.docx
Quality Management A Systems ApproachStudent Number.docx
 

Recently uploaded

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 

You are the lead investigator for a major intelligence agency in the.docx

  • 1. You are the lead investigator for a major intelligence agency in the Washington, DC area. You are in a security meeting with the network administrators. The meeting concerns a worm that has infected the enterprise network spanning several continents. The network analysts are struggling to find the entry point for this worm. With a network forensics analysis tool (NFAT), the network administrators are performing real-time analysis watching the worm travel across the network. You request that the network administrators find out how this worm is traveling across the network. Describe how the administrators will find where there has been increased threat activity. Describe how the administrators will find where there is increased activity either in the network ports or e-mail servers. Describe how time stamps will play a role in backtracking in time until the point of entry for the worm is located watching the worm travel across the network. The paper should be 3–5 pages written in Word and should provide descriptions for the 3 bullets above, containing a title page, introduction, main body, conclusion, and reference list in APA format.