SlideShare a Scribd company logo
Final Project: Incident Response Exercise & ReportYour Task
You have been assigned to work incident clean-up as part of the
Sifers-Grayson Blue Team. Your task is to assist in analyzing
and documenting the incident described below. The Blue Team
has already created a set of enterprise architecture diagrams
(see figures 1-4) to help with your analysis of the incident and
preparation of the incident report as required by the company’s
contracts with the federal government. After completing their
penetration tests, the Red Team provided Sifers-Grayson
executives with a diagram showing their analysis of the threat
environment and potential weaknesses in the company’s
security posture for the R&D DevOps Lab (see figure 5).
Your Deliverable
Complete and submit the Incident Report form found at the end
of this file. Consult the “Notes to Students” for additional
directions regarding completion of the form.
Overview of the Incident
Sifers-Grayson hired a cybersecurity consulting firm to help it
meet the security requirements of a contract with a federal
agency. The consulting firm’s Red Team conducted a
penetration test and was able to gain access to the engineering
center’s R&D servers by hacking into the enterprise network
through an unprotected network connection (see figure 2). The
Red Team proceeded to exfiltrate files from those servers and
managed to steal 100% of the design documents and source code
for the AX10 Drone System. The Red Team also reported that it
had stolen passwords for 20% of the employee logins using
keylogging software installed on USB keys that were left on the
lunch table in the headquarters building employee lounge (see
Figure 3). The Red Team also noted that the Sifers-Grayson
employees were quite friendly and talkative as they opened the
RFID controlled doors for the “new folks” on the engineering
staff (who were actually Red Teamers).
The Red Team continued its efforts to penetrate the enterprise
and used a stolen login to install malware over the network onto
a workstation connected to a PROM burner in the R&D DevOps
lab (See Figure 3). This malware made its way onto a PROM
that was then installed in an AX10-a test vehicle undergoing
flight trials at the Sifers-Grayson test range (See Figures 1 and
4). The malware “phoned home” to the Red Team over a cellular
connection to the R&D center. The Red Team took control of
the test vehicle and flew it from the test range to a safe landing
in the parking lot at Sifers-Grayson headquarters.
Background
Sifers-Grayson is a family owned business headquartered in
Grayson County, Kentucky, USA. The company’s physical
address is 1555 Pine Knob Trail, Pine Knob, KY 42721. The
president of the company is Ira John Sifers, III. He is the great-
grandson of one of the company’s founders and is also the head
of the engineering department. The chief operating officer is
Michael Coles, Jr. who is Ira John’s great nephew. Mary Beth
Sifers is the chief financial officer and also serves as the head
of personnel for the company.
Recent contracts with the Departments of Defense and
Homeland Security have imposed additional security
requirements upon the company and its R&D DevOps and
SCADA labs operations. The company is now required to
comply with NIST Special Publication 800-171 Protecting
Controlled Unclassified Information in Nonfederal Information
Systems and Organizations. The company must also comply
with provisions of the Defense Federal Acquisition Regulations
(DFARS) including section 252-204-7012 Safeguarding Covered
Defense Information and Cyber Incident Reporting. These
requirements are designed to ensure that sensitive technical
information, provided by the federal government and stored on
computer systems in the Sifers-Grayson R&D DevOps and
SCADA labs, is protected from unauthorized disclosure. This
information includes software designs and source code. The
contract requirements also mandate that Sifers-Grayson report
cyber incidents to the federal government in a timely
manner.SCADA Lab
The SCADA lab was originally setup in 1974. It has been
upgraded and rehabbed several times since then. The most
recent hardware and software upgrades were completed three
years ago after the lab was hit with a ransomware attack that
exploited several Windows XP vulnerabilities. At that time, the
engineering and design workstations were upgraded to Windows
8.1 professional. A second successful ransomware attack
occurred three months ago. The company paid the ransom in
both cases because the lab did not have file backups that it
could use to recover the damaged files (in the first case) and did
not have system backups that it could use to rebuild the system
hard drives (in the second case).
The SCADA Lab is locked into using Windows 8.1. The planned
transition to Windows 10 is on indefinite hold due to technical
problems encountered during previous attempts to modify
required software applications to work under the new version of
the operating system. This means that an incident response and
recovery capability for the lab must support the Windows 8.1
operating system and its utilities.R&D DevOps Lab
The R&D DevOps Lab was built in 2010 and is used to develop,
integrate, test, support, and maintain software and firmware
(software embedded in chips) for the company’s robots, drones,
and non-SCADA industrial control systems product lines. The
workstations in this lab are running Windows 10 and are
configured to receive security updates per Microsoft’s monthly
schedule. Enterprise IT Operations
The company uses a combination of Windows 10 workstations
and laptops as the foundation of its enterprise IT capabilities.
The servers in the data center and the engineering R&D center
are built upon Windows Server 2012.
Issues Summary:
1. Newly won government contracts now require compliance
with DFARS §252.204-7008, 7009, and 7012
·
http://www.acq.osd.mil/dpap/dars/dfars/html/current/252204.ht
m
· http://www.acq.osd.mil/se/docs/DFARS-guide.pdf
2. Derivative requirements include:
· Implementation of and compliance with NIST SP 800-171
Protecting Controlled Unclassified Information in Nonfederal
Information Systems and Organizations
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.8
00-171.pdf
· Compliance with DFARS 252.239-7009 Representation of Use
of Cloud Computing and 7010 Cloud Computing Services (see
http://www.acq.osd.mil/dpap/dars/dfars/html/current/252239.ht
m)
3. Additional Contractual Requirements for Lab Operations
include:
· Incident Response per NIST SP-800-61 (Computer Security
Incident Handling Guide)
· SCADA Security per NIST SP 800-82 (Guide to Industrial
Control Systems Security)
· Software / Systems Development Lifecycle (SDLC) Security
per NIST SP 800-64 (Security Considerations in the System
Development Life Cycle)
· Configuration Management per NIST SP 800-128 (Guide for
Security-Focused Configuration Management of Information
Systems)
Notes to Students:
1. Your final deliverable should be professionally formatted and
should not exceed 10 pages. The goal is to be clear and concise
in your reporting of your analysis of this incident.
2. You may include annotated diagrams if necessary to illustrate
your analysis and/or make your point(s). You may use the
figures in this assignment as the foundation for diagrams in
your final report (no citations required).
3. Use the NIST Incident Handling Process (see Table 1) to
guide your incident analysis.
4. You may assume that the company has implemented one or
more of the IT products that you recommended in your Case
Studies for this course. You may also assume that the company
is using the incident response guidance documents that you
wrote for your labs and that the associated operating systems
utilities are in use (e.g. you can assume that system backups are
being made, etc.).
5. DOCUMENT YOUR ASSUMPTIONS about people,
processes, and technologies as if they were fact. But, don’t
change any of the factual information provided in the incident
report from the Red Team.
6. Use the incident report form that appears at the end of this
file. Copy it to a new MS Word document. After you perform
your incident analysis, fill in the required information, attach
the file to your assignment folder entry, and submit it for
grading as your final project.
7. For section 1 of the form, use your own name but provide
reasonable but fictitious information for the remaining fields.
8. For section 2 of the form, assign IP addresses in the
following ranges to any servers, workstations, or network
connections that you need to discuss.
a. R&D Center 10.10.150.0/24
b. Test Range 10.10.148.0/24
c. Corporate Headquarters 10.10.155.0/24
9. For sections 2, 3, and 5, you should use and interpret
information provided in this file (Overview, Background, Issues
Summary). You may use a judicious amount of creativity, if
necessary, to fill in any missing information.
10. For section 4 of the form you may provide a fictitious cost
estimate based upon $100 per hour for IT staff to perform
“clean-up” activities. Reasonable estimates are probably in the
range of 150 to 300 person hours. What’s important is that you
document how you arrived at your cost estimate.
11. Discuss the contract requirements and derivative
requirements for cybersecurity at Sifers-Grayson in 3 to 5
paragraphs under “Section 6 General Comments.”
·
Figure 1. Overview of Sifers-Grayson Enterprise IT
Architecture
Figure 2. Combined Network and Systems Views:
Sifers-Grayson Headquarters, R&D Center, and Data Center
Figure 3. Combined Network and Systems View for Sifers-
Grayson R&D DevOps Lab
Figure 4. Combined Communications and Systems Views for
Sifers-Grayson Test Range
Figure 5. Threat Landscape for Sifers-Grayson R&D DevOps
Lab
NIST Incident Handling Checklist by Phase
Detection and Analysis
1.
Determine whether an incident has occurred
1.1
Analyze the precursors and indicators
1.2
Look for correlating information
1.3
Perform research (e.g., search engines, knowledge base)
1.4
As soon as the handler believes an incident has occurred, begin
documenting the investigation and gathering evidence
2.
Prioritize handling the incident based on the relevant factors
(functional impact, information impact, recoverability effort,
etc.)
3.
Report the incident to the appropriate internal personnel and
external organizations
Containment, Eradication, and Recovery
4.
Acquire, preserve, secure, and document evidence
5.
Contain the incident
6.
Eradicate the incident
6.1
Identify and mitigate all vulnerabilities that were exploited
6.2
Remove malware, inappropriate materials, and other
components
6.3
If more affected hosts are discovered (e.g., new malware
infections), repeat the Detection and Analysis steps (1.1, 1.2) to
identify all other affected hosts, then contain (5) and eradicate
(6) the incident for them
7.
Recover from the incident
7.1
Return affected systems to an operationally ready state
7.2
Confirm that the affected systems are functioning normally
7.3
If necessary, implement additional monitoring to look for future
related activity
Post-Incident Activity
8.
Create a follow-up report
9.
Hold a lessons learned meeting (mandatory for major incidents,
optional otherwise)
Source: NIST SP 800-61r2
Cichonski, P., Millar, T., Grance, T., & Scarfone, K. (2012).
Computer security incident handling guide (NIST SP 800-62
rev. 2). http://dx.doi.org/10.6028/NIST.SP.800-61r2
1. Contact Information for the Incident Reporter and Handler
– Name
– Role
– Organizational unit (e.g., agency, department, division, team)
and affiliation
– Email address
– Phone number
– Location (e.g., mailing address, office room number)
2. Incident Details
– Status change date/timestamps (including time zone): when
the incident started, when the incident was discovered/detected,
when the incident was reported, when the incident was
resolved/ended, etc.
– Physical location of the incident (e.g., city, state)
– Current status of the incident (e.g., ongoing attack)
– Source/cause of the incident (if known), including hostnames
and IP addresses
– Description of the incident (e.g., how it was detected, what
occurred)
– Description of affected resources (e.g., networks, hosts,
applications, data), including systems’ hostnames, IP addresses,
and function
– If known, incident category, vectors of attack associated with
the incident, and indicators related to the incident (traffic
patterns, registry keys, etc.)
– Prioritization factors (functional impact, information impact,
recoverability, etc.)
– Mitigating factors (e.g., stolen laptop containing sensitive
data was using full disk encryption)
– Response actions performed (e.g., shut off host, disconnected
host from network)
– Other organizations contacted (e.g., software vendor)
3. Cause of the Incident (e.g., misconfigured application,
unpatched host)
4. Cost of the Incident
5. Business Impact of the Incident
6. General Comments
10/6/2017 Final Project: Incident Response Exercise & Report -
Submit Files - CSIA 310 6381 Cybersecurity Processes and
Technologies (2178) - UMUC …
https://learn.umuc.edu/d2l/lms/dropbox/user/folder_submit_files
.d2l?db=532069&grpid=0&isprv=0&bp=0&ou=247136 1/2
Rubric Name: Final Project - Incident Report
Criteria Excellent Outstanding Acceptable Needs Improvement
Needs Significant Improvement Missing or Unacceptable
Section 1:
Contact
Information
10 points
Provided an
acceptable �tle page
for the file. Provided
a complete sec�on 1
of the Incident
Report Form that
included realis�c but
fic�onalized data for
all of the following
fields:
Name
Role
Organiza�onal
Unit and
affilia�on
Email address
Phone
Number
loca�on
8.5 points
Provided an
acceptable �tle page
for the file. Provided
a complete sec�on 1
of the Incident
Report Form that
included realis�c but
fic�onalized data for
at least four of the
following fields:
Name
Role
Organiza�onal
Unit and
affilia�on
Email address
Phone
Number
loca�on
7 points
Provided an
acceptable �tle page
for the file. Provided
a complete sec�on 1
of the Incident
Report Form that
included realis�c but
fic�onalized data for
at least three of the
following fields:
Name
Role
Organiza�onal
Unit and
affilia�on
Email address
Phone
Number
loca�on
6 points
Provided an acceptable
�tle page for the file.
Provided informa�on
in at least 3 of the
following fields:
Name
Role
Organiza�onal
Unit and
affilia�on
Email address
Phone Number
loca�on
4 points
Provided a �tle page and sec�on 1.
The fields were sparsely completed.
0 points
Required content was
missing.
Section 2:
Incident Details
25 points
Provided an
excellent report of
the incident details
as required by the
NIST template.
Responses for all
items were clear,
concise, and
reflected the
analysis of the Blue
Team with addi�onal
contribu�ons by this
student.
22.5 points
Provided an
outstanding report
of the incident
details as required
by the NIST
template. Responses
for all items were
clear and reflected
the analysis efforts
of the Blue Team
with addi�onal
contribu�ons by this
student.
21 points
Provided an
acceptable report of
the incident details
as required by the
NIST template.
Responses for most
items were clear and
reflected some of
the analysis efforts
of the Blue Team
with addi�onal
contribu�ons by this
student.
15 points
Provided a report of
the incident details as
using the fields listed in
the NIST template.
Responses reflected
some of the analysis
efforts of the Blue
Team with a few
addi�onal
contribu�ons by this
student.
10 points
A�empted to complete Sec�on 2 of
the incident report form but the
informa�on was seriously lacking (a)
details and/or (b) originality (copied
rather than paraphrased).
0 points
No work submitted for
this section.
Section 3:
Cause of the
Incident
25 points
Provided an
excellent report of
the incident causes
using informa�on
reported by the Red
Team (from the
assignment) and
addi�onal analysis
performed by the
Blue Team and this
student.
Appropriately used
informa�on from the
Sifers-Grayson
Overview and
Enterprise
Architecture
diagrams. Repor�ng
of the analysis was
clear, concise, and
reflected the
analysis of the Blue
Team with addi�onal
contribu�ons by this
student.
22.5 points
Provided an
outstanding report
of the incident
causes using
informa�on reported
by the Red Team
(from the
assignment) and
addi�onal analysis
performed by the
Blue Team and this
student.
Appropriately used
informa�on from the
Sifers-Grayson
Overview and
Enterprise
Architecture
diagrams. Repor�ng
of the analysis was
clear and reflected
the analysis of the
Blue Team with
addi�onal
contribu�ons by this
student.
21 points
Provided an
acceptable analysis
and wri�en report of
the incident causes
using informa�on
reported by the Red
Team (from the
assignment) and
addi�onal analysis
performed by the
Blue Team and this
student.
Appropriately used
informa�on from the
Sifers-Grayson
Overview and
Enterprise
Architecture
diagrams. Repor�ng
of the analysis
included informa�on
from the Blue Team
with addi�onal
contribu�ons by this
student.
15 points
Provided an analysis of
the incident causes
using some
informa�on from the
Red Team and Blue
Team with a few
addi�onal
contribu�ons by this
student.
10 points
A�empted to complete Sec�on 3 of
the incident report form but the
informa�on was seriously lacking (a)
details and/or (b) originality (copied
rather than paraphrased).
0 points
No work submitted for
this section.
Sections 4 & 5:
Cost and Impact
10 points
Provided an
excellent analysis
of the potential
costs and impacts
of the incident as
reported by the
Red Team.
Analysis was clear
and concise.
Included
information from
the Blue Team and
8.5 points
Provided an
outstanding
analysis of the
potential costs and
impacts of the
incident as
reported by the
Red Team.
Analysis was clear
and included
information from
the Blue Team and
7 points
Provided an
acceptable analysis
of the potential
costs and impacts
of the incident as
reported by the
Red Team.
Analysis included
some information
from the Blue
Team and limited
6 points
Attempted to provide
an analysis of the
potential costs and
impacts of the
incident.
4 points
Addressed the potential impacts
of the incident but the analysis
was significantly lacking in (a)
details and/or (b) originality
(excessive copying with no
paraphrasing).
0 points
No work submitted.
10/6/2017 Final Project: Incident Response Exercise & Report -
Submit Files - CSIA 310 6381 Cybersecurity Processes and
Technologies (2178) - UMUC …
https://learn.umuc.edu/d2l/lms/dropbox/user/folder_submit_files
.d2l?db=532069&grpid=0&isprv=0&bp=0&ou=247136 2/2
supplemented it
with additional
analysis by this
student.
supplemented it
with additional
analysis by this
student.
additional analysis
by this student.
Section 6:
General
Comments
10 points
Provided an
excellent
discussion of the
contract
requirements and
derivative
requirements for
cybersecurity at
Sifers-Grayson
(clear, concise,
accurate). Included
information from
the Blue Team and
supplemented it
with additional
analysis by this
student.
Included additional
information as
necessary to
provide
explanations and
improve overall
clarity for the
incident response
report.
8.5 points
Provided an
outstanding
discussion of the
contract
requirements and
derivative
requirements for
cybersecurity at
Sifers-Grayson
(clear and
accurate). Included
information from
the Blue Team and
supplemented it
with additional
analysis by this
student.
Included additional
information as
necessary to
provide
explanations and
improve overall
clarity for the
incident response
report.
7 points
Provided an
acceptable
discussion of the
contract
requirements and
derivative
requirements for
cybersecurity at
Sifers-Grayson.
Included
information from
the Blue Team and
supplemented it
with additional
analysis by this
student.
6 points
Discussed some of
the contract
requirements and/or
derivative
requirements for
cybersecurity at
Sifers-Grayson.
Included information
from the Blue Team
and supplemented it
with additional
analysis by this
student. Important
points were missing
or were not
adequately covered.
4 points
Attempted to complete Section 6
of the incident report form but the
information was seriously lacking
(a) details and/or (b) originality
(copied rather than paraphrased).
0 points
Missing or no work
submitted.
Professionalism:
Execution
20 points
Work is
professional in
appearance and
organization
(appropriate and
consistent use of
fonts, headings,
color).
No word usage,
grammar, spelling, or
punctua�on errors.
All quota�ons
(copied text) are
properly marked and
cited using a
professional format.
(APA format
recommended but
not required.)
18 points
Work is
professional in
appearance and
organization
(appropriate and
consistent use of
fonts, headings,
color).
Work contains minor
errors in word usage,
grammar, spelling or
punctua�on which
do not significantly
impact professional
appearance. All
quota�ons (copied
text) are properly
marked and cited
using a professional
format. (APA format
recommended but
not required.)
16 points
Work is
professional in
appearance and
organization
(minor issues
allowable but
overall the work
contains
appropriate and
consistent use of
fonts, headings,
color).
Errors in word usage,
spelling, grammar, or
punctua�on which
detract from
professional
appearance of the
submi�ed work. All
quota�ons (copied
text) are properly
marked and cited
using a professional
format. (APA format
recommended but
not required.)
14 points
Submi�ed work has
numerous errors in
forma�ng,
organiza�on, word
usage, spelling,
grammar, or
punctua�on which
detract from
readability and
professional
appearance.
Punctua�on errors may
include failure to
properly mark quoted
or copied material (an
a�empt to name
original source is
required).
10 points
Submi�ed work is difficult to read /
understand and has significant
errors in forma�ng, appearance /
organiza�on, spelling, grammar,
punctua�on, or word usage.
Significant errors in presenta�on of
copied text (lacks proper
punctua�on and failed to a�ribute
material to original source).
0 points
No work submi�ed for this
assignment.
Overall Score
Excellent
90 or more
Outstanding
80 or more
Acceptable
70 or more
Needs Improvement
50 or more
Needs Significant Improvement
1 or more
No Submission
0 or more

More Related Content

Similar to Final Project Incident Response Exercise & ReportYour TaskYou hav.docx

IntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdfIntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdf
fantasiatheoutofthef
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
woodruffeloisa
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
manningchassidy
 
Computer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineeringComputer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineeringuniversity of sust.
 
Case Project 1-1 Defining and Designing a NetworkThe overview.docx
Case Project 1-1 Defining and Designing a NetworkThe overview.docxCase Project 1-1 Defining and Designing a NetworkThe overview.docx
Case Project 1-1 Defining and Designing a NetworkThe overview.docx
tidwellveronique
 
Assignment 3 TCSS 143 Programming Assignment 3 .docx
Assignment 3  TCSS 143 Programming Assignment 3  .docxAssignment 3  TCSS 143 Programming Assignment 3  .docx
Assignment 3 TCSS 143 Programming Assignment 3 .docx
ursabrooks36447
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
honey725342
 
Company Background & Operating EnvironmentThe assigned case study .docx
Company Background & Operating EnvironmentThe assigned case study .docxCompany Background & Operating EnvironmentThe assigned case study .docx
Company Background & Operating EnvironmentThe assigned case study .docx
brownliecarmella
 
ops300 Project(3)
ops300 Project(3)ops300 Project(3)
ops300 Project(3)
trayyoo
 
ops300 Project(4)
ops300 Project(4)ops300 Project(4)
ops300 Project(4)
trayyoo
 
Design Documents (4)
Design Documents (4)Design Documents (4)
Design Documents (4)Isidro Garcia
 
Microsoft 70-416 it certifications
Microsoft  70-416  it certificationsMicrosoft  70-416  it certifications
Microsoft 70-416 it certifications
lilylucy
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.com
PrescottLunt385
 
Assignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docxAssignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docx
annrodgerson
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final DocumentationJennifer Cordes
 

Similar to Final Project Incident Response Exercise & ReportYour TaskYou hav.docx (15)

IntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdfIntroductionThe capstone project is a �structured walkthrough� pen.pdf
IntroductionThe capstone project is a �structured walkthrough� pen.pdf
 
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docxProject Deliverable 5 Infrastructure and SecurityThis assignm.docx
Project Deliverable 5 Infrastructure and SecurityThis assignm.docx
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
Computer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineeringComputer aided design, computer aided manufacturing, computer aided engineering
Computer aided design, computer aided manufacturing, computer aided engineering
 
Case Project 1-1 Defining and Designing a NetworkThe overview.docx
Case Project 1-1 Defining and Designing a NetworkThe overview.docxCase Project 1-1 Defining and Designing a NetworkThe overview.docx
Case Project 1-1 Defining and Designing a NetworkThe overview.docx
 
Assignment 3 TCSS 143 Programming Assignment 3 .docx
Assignment 3  TCSS 143 Programming Assignment 3  .docxAssignment 3  TCSS 143 Programming Assignment 3  .docx
Assignment 3 TCSS 143 Programming Assignment 3 .docx
 
01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx01-01-2017 This section will lay out the implementation plan o.docx
01-01-2017 This section will lay out the implementation plan o.docx
 
Company Background & Operating EnvironmentThe assigned case study .docx
Company Background & Operating EnvironmentThe assigned case study .docxCompany Background & Operating EnvironmentThe assigned case study .docx
Company Background & Operating EnvironmentThe assigned case study .docx
 
ops300 Project(3)
ops300 Project(3)ops300 Project(3)
ops300 Project(3)
 
ops300 Project(4)
ops300 Project(4)ops300 Project(4)
ops300 Project(4)
 
Design Documents (4)
Design Documents (4)Design Documents (4)
Design Documents (4)
 
Microsoft 70-416 it certifications
Microsoft  70-416  it certificationsMicrosoft  70-416  it certifications
Microsoft 70-416 it certifications
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.com
 
Assignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docxAssignment 2 Implementing Network and Personnel Security Meas.docx
Assignment 2 Implementing Network and Personnel Security Meas.docx
 
CPIN 269 Final Documentation
CPIN 269 Final DocumentationCPIN 269 Final Documentation
CPIN 269 Final Documentation
 

More from AKHIL969626

One of the most common used risk management tools is the Incident Re.docx
One of the most common used risk management tools is the Incident Re.docxOne of the most common used risk management tools is the Incident Re.docx
One of the most common used risk management tools is the Incident Re.docx
AKHIL969626
 
One of the first anthropologists to examine religion in Africa was E.docx
One of the first anthropologists to examine religion in Africa was E.docxOne of the first anthropologists to examine religion in Africa was E.docx
One of the first anthropologists to examine religion in Africa was E.docx
AKHIL969626
 
One of the most important concepts in clinical practice and group wo.docx
One of the most important concepts in clinical practice and group wo.docxOne of the most important concepts in clinical practice and group wo.docx
One of the most important concepts in clinical practice and group wo.docx
AKHIL969626
 
One function of a leader is to provide the vision for the organizati.docx
One function of a leader is to provide the vision for the organizati.docxOne function of a leader is to provide the vision for the organizati.docx
One function of a leader is to provide the vision for the organizati.docx
AKHIL969626
 
One could argue that old-fashioned attitudes regarding gender and t.docx
One could argue that old-fashioned attitudes regarding gender and t.docxOne could argue that old-fashioned attitudes regarding gender and t.docx
One could argue that old-fashioned attitudes regarding gender and t.docx
AKHIL969626
 
One of the hallmarks of qualitative research is writing detailed obs.docx
One of the hallmarks of qualitative research is writing detailed obs.docxOne of the hallmarks of qualitative research is writing detailed obs.docx
One of the hallmarks of qualitative research is writing detailed obs.docx
AKHIL969626
 
One of the three main tenants of information security is availabilit.docx
One of the three main tenants of information security is availabilit.docxOne of the three main tenants of information security is availabilit.docx
One of the three main tenants of information security is availabilit.docx
AKHIL969626
 
One of the challenges in group problem solving is identifying the ac.docx
One of the challenges in group problem solving is identifying the ac.docxOne of the challenges in group problem solving is identifying the ac.docx
One of the challenges in group problem solving is identifying the ac.docx
AKHIL969626
 
One is the personal plot that unfolds around the relationships betwe.docx
One is the personal plot that unfolds around the relationships betwe.docxOne is the personal plot that unfolds around the relationships betwe.docx
One is the personal plot that unfolds around the relationships betwe.docx
AKHIL969626
 
One and half pagesimple, noplagarism Title page, abstr.docx
One and half pagesimple, noplagarism Title page, abstr.docxOne and half pagesimple, noplagarism Title page, abstr.docx
One and half pagesimple, noplagarism Title page, abstr.docx
AKHIL969626
 
One 750 - word essay exploring an art historical issue presented in .docx
One 750 - word essay exploring an art historical issue presented in .docxOne 750 - word essay exploring an art historical issue presented in .docx
One 750 - word essay exploring an art historical issue presented in .docx
AKHIL969626
 
One of the most interesting items in the communication realm of orga.docx
One of the most interesting items in the communication realm of orga.docxOne of the most interesting items in the communication realm of orga.docx
One of the most interesting items in the communication realm of orga.docx
AKHIL969626
 
One of the most important filmmakers of the twentieth centur.docx
One of the most important filmmakers of the twentieth centur.docxOne of the most important filmmakers of the twentieth centur.docx
One of the most important filmmakers of the twentieth centur.docx
AKHIL969626
 
One of the ways businesses provide secure access to their networ.docx
One of the ways businesses provide secure access to their networ.docxOne of the ways businesses provide secure access to their networ.docx
One of the ways businesses provide secure access to their networ.docx
AKHIL969626
 
On Stretching Time (250 Words)The given paradigms by which we.docx
On Stretching Time (250 Words)The given paradigms by which we.docxOn Stretching Time (250 Words)The given paradigms by which we.docx
On Stretching Time (250 Words)The given paradigms by which we.docx
AKHIL969626
 
On the evening news, social media and even in conversation, do you f.docx
On the evening news, social media and even in conversation, do you f.docxOn the evening news, social media and even in conversation, do you f.docx
On the evening news, social media and even in conversation, do you f.docx
AKHIL969626
 
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docxOn p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
AKHIL969626
 
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docx
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docxOn 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docx
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docx
AKHIL969626
 
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docx
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docxOn September 11, 2001 the U.S. changed forever. While the U.S. had s.docx
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docx
AKHIL969626
 
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docx
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docxOn January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docx
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docx
AKHIL969626
 

More from AKHIL969626 (20)

One of the most common used risk management tools is the Incident Re.docx
One of the most common used risk management tools is the Incident Re.docxOne of the most common used risk management tools is the Incident Re.docx
One of the most common used risk management tools is the Incident Re.docx
 
One of the first anthropologists to examine religion in Africa was E.docx
One of the first anthropologists to examine religion in Africa was E.docxOne of the first anthropologists to examine religion in Africa was E.docx
One of the first anthropologists to examine religion in Africa was E.docx
 
One of the most important concepts in clinical practice and group wo.docx
One of the most important concepts in clinical practice and group wo.docxOne of the most important concepts in clinical practice and group wo.docx
One of the most important concepts in clinical practice and group wo.docx
 
One function of a leader is to provide the vision for the organizati.docx
One function of a leader is to provide the vision for the organizati.docxOne function of a leader is to provide the vision for the organizati.docx
One function of a leader is to provide the vision for the organizati.docx
 
One could argue that old-fashioned attitudes regarding gender and t.docx
One could argue that old-fashioned attitudes regarding gender and t.docxOne could argue that old-fashioned attitudes regarding gender and t.docx
One could argue that old-fashioned attitudes regarding gender and t.docx
 
One of the hallmarks of qualitative research is writing detailed obs.docx
One of the hallmarks of qualitative research is writing detailed obs.docxOne of the hallmarks of qualitative research is writing detailed obs.docx
One of the hallmarks of qualitative research is writing detailed obs.docx
 
One of the three main tenants of information security is availabilit.docx
One of the three main tenants of information security is availabilit.docxOne of the three main tenants of information security is availabilit.docx
One of the three main tenants of information security is availabilit.docx
 
One of the challenges in group problem solving is identifying the ac.docx
One of the challenges in group problem solving is identifying the ac.docxOne of the challenges in group problem solving is identifying the ac.docx
One of the challenges in group problem solving is identifying the ac.docx
 
One is the personal plot that unfolds around the relationships betwe.docx
One is the personal plot that unfolds around the relationships betwe.docxOne is the personal plot that unfolds around the relationships betwe.docx
One is the personal plot that unfolds around the relationships betwe.docx
 
One and half pagesimple, noplagarism Title page, abstr.docx
One and half pagesimple, noplagarism Title page, abstr.docxOne and half pagesimple, noplagarism Title page, abstr.docx
One and half pagesimple, noplagarism Title page, abstr.docx
 
One 750 - word essay exploring an art historical issue presented in .docx
One 750 - word essay exploring an art historical issue presented in .docxOne 750 - word essay exploring an art historical issue presented in .docx
One 750 - word essay exploring an art historical issue presented in .docx
 
One of the most interesting items in the communication realm of orga.docx
One of the most interesting items in the communication realm of orga.docxOne of the most interesting items in the communication realm of orga.docx
One of the most interesting items in the communication realm of orga.docx
 
One of the most important filmmakers of the twentieth centur.docx
One of the most important filmmakers of the twentieth centur.docxOne of the most important filmmakers of the twentieth centur.docx
One of the most important filmmakers of the twentieth centur.docx
 
One of the ways businesses provide secure access to their networ.docx
One of the ways businesses provide secure access to their networ.docxOne of the ways businesses provide secure access to their networ.docx
One of the ways businesses provide secure access to their networ.docx
 
On Stretching Time (250 Words)The given paradigms by which we.docx
On Stretching Time (250 Words)The given paradigms by which we.docxOn Stretching Time (250 Words)The given paradigms by which we.docx
On Stretching Time (250 Words)The given paradigms by which we.docx
 
On the evening news, social media and even in conversation, do you f.docx
On the evening news, social media and even in conversation, do you f.docxOn the evening news, social media and even in conversation, do you f.docx
On the evening news, social media and even in conversation, do you f.docx
 
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docxOn p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
On p. 98-99 of Music and Capitalism, Tim Taylor writes, The.docx
 
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docx
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docxOn 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docx
On 1 January 2016, the 17 Sustainable Development Goals (SDGs) o.docx
 
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docx
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docxOn September 11, 2001 the U.S. changed forever. While the U.S. had s.docx
On September 11, 2001 the U.S. changed forever. While the U.S. had s.docx
 
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docx
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docxOn January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docx
On January 28, 1986, the Space Shuttle Challenger was destroyed  upo.docx
 

Recently uploaded

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
Nguyen Thanh Tu Collection
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
bennyroshan06
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 

Recently uploaded (20)

Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 

Final Project Incident Response Exercise & ReportYour TaskYou hav.docx

  • 1. Final Project: Incident Response Exercise & ReportYour Task You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident described below. The Blue Team has already created a set of enterprise architecture diagrams (see figures 1-4) to help with your analysis of the incident and preparation of the incident report as required by the company’s contracts with the federal government. After completing their penetration tests, the Red Team provided Sifers-Grayson executives with a diagram showing their analysis of the threat environment and potential weaknesses in the company’s security posture for the R&D DevOps Lab (see figure 5). Your Deliverable Complete and submit the Incident Report form found at the end of this file. Consult the “Notes to Students” for additional directions regarding completion of the form. Overview of the Incident Sifers-Grayson hired a cybersecurity consulting firm to help it meet the security requirements of a contract with a federal agency. The consulting firm’s Red Team conducted a penetration test and was able to gain access to the engineering center’s R&D servers by hacking into the enterprise network through an unprotected network connection (see figure 2). The Red Team proceeded to exfiltrate files from those servers and managed to steal 100% of the design documents and source code for the AX10 Drone System. The Red Team also reported that it had stolen passwords for 20% of the employee logins using keylogging software installed on USB keys that were left on the lunch table in the headquarters building employee lounge (see Figure 3). The Red Team also noted that the Sifers-Grayson employees were quite friendly and talkative as they opened the RFID controlled doors for the “new folks” on the engineering staff (who were actually Red Teamers).
  • 2. The Red Team continued its efforts to penetrate the enterprise and used a stolen login to install malware over the network onto a workstation connected to a PROM burner in the R&D DevOps lab (See Figure 3). This malware made its way onto a PROM that was then installed in an AX10-a test vehicle undergoing flight trials at the Sifers-Grayson test range (See Figures 1 and 4). The malware “phoned home” to the Red Team over a cellular connection to the R&D center. The Red Team took control of the test vehicle and flew it from the test range to a safe landing in the parking lot at Sifers-Grayson headquarters. Background Sifers-Grayson is a family owned business headquartered in Grayson County, Kentucky, USA. The company’s physical address is 1555 Pine Knob Trail, Pine Knob, KY 42721. The president of the company is Ira John Sifers, III. He is the great- grandson of one of the company’s founders and is also the head of the engineering department. The chief operating officer is Michael Coles, Jr. who is Ira John’s great nephew. Mary Beth Sifers is the chief financial officer and also serves as the head of personnel for the company. Recent contracts with the Departments of Defense and Homeland Security have imposed additional security requirements upon the company and its R&D DevOps and SCADA labs operations. The company is now required to comply with NIST Special Publication 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations. The company must also comply with provisions of the Defense Federal Acquisition Regulations (DFARS) including section 252-204-7012 Safeguarding Covered Defense Information and Cyber Incident Reporting. These requirements are designed to ensure that sensitive technical information, provided by the federal government and stored on computer systems in the Sifers-Grayson R&D DevOps and SCADA labs, is protected from unauthorized disclosure. This
  • 3. information includes software designs and source code. The contract requirements also mandate that Sifers-Grayson report cyber incidents to the federal government in a timely manner.SCADA Lab The SCADA lab was originally setup in 1974. It has been upgraded and rehabbed several times since then. The most recent hardware and software upgrades were completed three years ago after the lab was hit with a ransomware attack that exploited several Windows XP vulnerabilities. At that time, the engineering and design workstations were upgraded to Windows 8.1 professional. A second successful ransomware attack occurred three months ago. The company paid the ransom in both cases because the lab did not have file backups that it could use to recover the damaged files (in the first case) and did not have system backups that it could use to rebuild the system hard drives (in the second case). The SCADA Lab is locked into using Windows 8.1. The planned transition to Windows 10 is on indefinite hold due to technical problems encountered during previous attempts to modify required software applications to work under the new version of the operating system. This means that an incident response and recovery capability for the lab must support the Windows 8.1 operating system and its utilities.R&D DevOps Lab The R&D DevOps Lab was built in 2010 and is used to develop, integrate, test, support, and maintain software and firmware (software embedded in chips) for the company’s robots, drones, and non-SCADA industrial control systems product lines. The workstations in this lab are running Windows 10 and are configured to receive security updates per Microsoft’s monthly schedule. Enterprise IT Operations The company uses a combination of Windows 10 workstations and laptops as the foundation of its enterprise IT capabilities. The servers in the data center and the engineering R&D center are built upon Windows Server 2012. Issues Summary:
  • 4. 1. Newly won government contracts now require compliance with DFARS §252.204-7008, 7009, and 7012 · http://www.acq.osd.mil/dpap/dars/dfars/html/current/252204.ht m · http://www.acq.osd.mil/se/docs/DFARS-guide.pdf 2. Derivative requirements include: · Implementation of and compliance with NIST SP 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.8 00-171.pdf · Compliance with DFARS 252.239-7009 Representation of Use of Cloud Computing and 7010 Cloud Computing Services (see http://www.acq.osd.mil/dpap/dars/dfars/html/current/252239.ht m) 3. Additional Contractual Requirements for Lab Operations include: · Incident Response per NIST SP-800-61 (Computer Security Incident Handling Guide) · SCADA Security per NIST SP 800-82 (Guide to Industrial Control Systems Security) · Software / Systems Development Lifecycle (SDLC) Security per NIST SP 800-64 (Security Considerations in the System Development Life Cycle) · Configuration Management per NIST SP 800-128 (Guide for Security-Focused Configuration Management of Information Systems) Notes to Students: 1. Your final deliverable should be professionally formatted and should not exceed 10 pages. The goal is to be clear and concise in your reporting of your analysis of this incident. 2. You may include annotated diagrams if necessary to illustrate your analysis and/or make your point(s). You may use the figures in this assignment as the foundation for diagrams in
  • 5. your final report (no citations required). 3. Use the NIST Incident Handling Process (see Table 1) to guide your incident analysis. 4. You may assume that the company has implemented one or more of the IT products that you recommended in your Case Studies for this course. You may also assume that the company is using the incident response guidance documents that you wrote for your labs and that the associated operating systems utilities are in use (e.g. you can assume that system backups are being made, etc.). 5. DOCUMENT YOUR ASSUMPTIONS about people, processes, and technologies as if they were fact. But, don’t change any of the factual information provided in the incident report from the Red Team. 6. Use the incident report form that appears at the end of this file. Copy it to a new MS Word document. After you perform your incident analysis, fill in the required information, attach the file to your assignment folder entry, and submit it for grading as your final project. 7. For section 1 of the form, use your own name but provide reasonable but fictitious information for the remaining fields. 8. For section 2 of the form, assign IP addresses in the following ranges to any servers, workstations, or network connections that you need to discuss. a. R&D Center 10.10.150.0/24 b. Test Range 10.10.148.0/24 c. Corporate Headquarters 10.10.155.0/24 9. For sections 2, 3, and 5, you should use and interpret information provided in this file (Overview, Background, Issues Summary). You may use a judicious amount of creativity, if necessary, to fill in any missing information. 10. For section 4 of the form you may provide a fictitious cost estimate based upon $100 per hour for IT staff to perform “clean-up” activities. Reasonable estimates are probably in the range of 150 to 300 person hours. What’s important is that you document how you arrived at your cost estimate.
  • 6. 11. Discuss the contract requirements and derivative requirements for cybersecurity at Sifers-Grayson in 3 to 5 paragraphs under “Section 6 General Comments.” · Figure 1. Overview of Sifers-Grayson Enterprise IT Architecture Figure 2. Combined Network and Systems Views: Sifers-Grayson Headquarters, R&D Center, and Data Center Figure 3. Combined Network and Systems View for Sifers- Grayson R&D DevOps Lab Figure 4. Combined Communications and Systems Views for Sifers-Grayson Test Range Figure 5. Threat Landscape for Sifers-Grayson R&D DevOps Lab NIST Incident Handling Checklist by Phase Detection and Analysis 1.
  • 7. Determine whether an incident has occurred 1.1 Analyze the precursors and indicators 1.2 Look for correlating information 1.3 Perform research (e.g., search engines, knowledge base) 1.4 As soon as the handler believes an incident has occurred, begin documenting the investigation and gathering evidence 2. Prioritize handling the incident based on the relevant factors (functional impact, information impact, recoverability effort, etc.) 3. Report the incident to the appropriate internal personnel and external organizations Containment, Eradication, and Recovery 4. Acquire, preserve, secure, and document evidence 5. Contain the incident 6. Eradicate the incident 6.1 Identify and mitigate all vulnerabilities that were exploited 6.2 Remove malware, inappropriate materials, and other components 6.3 If more affected hosts are discovered (e.g., new malware infections), repeat the Detection and Analysis steps (1.1, 1.2) to identify all other affected hosts, then contain (5) and eradicate (6) the incident for them 7. Recover from the incident
  • 8. 7.1 Return affected systems to an operationally ready state 7.2 Confirm that the affected systems are functioning normally 7.3 If necessary, implement additional monitoring to look for future related activity Post-Incident Activity 8. Create a follow-up report 9. Hold a lessons learned meeting (mandatory for major incidents, optional otherwise) Source: NIST SP 800-61r2 Cichonski, P., Millar, T., Grance, T., & Scarfone, K. (2012). Computer security incident handling guide (NIST SP 800-62 rev. 2). http://dx.doi.org/10.6028/NIST.SP.800-61r2 1. Contact Information for the Incident Reporter and Handler – Name – Role – Organizational unit (e.g., agency, department, division, team) and affiliation – Email address – Phone number – Location (e.g., mailing address, office room number) 2. Incident Details – Status change date/timestamps (including time zone): when the incident started, when the incident was discovered/detected, when the incident was reported, when the incident was resolved/ended, etc. – Physical location of the incident (e.g., city, state) – Current status of the incident (e.g., ongoing attack) – Source/cause of the incident (if known), including hostnames and IP addresses
  • 9. – Description of the incident (e.g., how it was detected, what occurred) – Description of affected resources (e.g., networks, hosts, applications, data), including systems’ hostnames, IP addresses, and function – If known, incident category, vectors of attack associated with the incident, and indicators related to the incident (traffic patterns, registry keys, etc.) – Prioritization factors (functional impact, information impact, recoverability, etc.) – Mitigating factors (e.g., stolen laptop containing sensitive data was using full disk encryption) – Response actions performed (e.g., shut off host, disconnected host from network) – Other organizations contacted (e.g., software vendor) 3. Cause of the Incident (e.g., misconfigured application, unpatched host) 4. Cost of the Incident 5. Business Impact of the Incident 6. General Comments 10/6/2017 Final Project: Incident Response Exercise & Report - Submit Files - CSIA 310 6381 Cybersecurity Processes and Technologies (2178) - UMUC … https://learn.umuc.edu/d2l/lms/dropbox/user/folder_submit_files .d2l?db=532069&grpid=0&isprv=0&bp=0&ou=247136 1/2 Rubric Name: Final Project - Incident Report Criteria Excellent Outstanding Acceptable Needs Improvement Needs Significant Improvement Missing or Unacceptable
  • 10. Section 1: Contact Information 10 points Provided an acceptable �tle page for the file. Provided a complete sec�on 1 of the Incident Report Form that included realis�c but fic�onalized data for all of the following fields: Name Role Organiza�onal Unit and affilia�on Email address Phone Number loca�on 8.5 points Provided an acceptable �tle page for the file. Provided
  • 11. a complete sec�on 1 of the Incident Report Form that included realis�c but fic�onalized data for at least four of the following fields: Name Role Organiza�onal Unit and affilia�on Email address Phone Number loca�on 7 points Provided an acceptable �tle page for the file. Provided a complete sec�on 1 of the Incident Report Form that included realis�c but fic�onalized data for at least three of the following fields: Name Role
  • 12. Organiza�onal Unit and affilia�on Email address Phone Number loca�on 6 points Provided an acceptable �tle page for the file. Provided informa�on in at least 3 of the following fields: Name Role Organiza�onal Unit and affilia�on Email address Phone Number loca�on 4 points Provided a �tle page and sec�on 1. The fields were sparsely completed. 0 points
  • 13. Required content was missing. Section 2: Incident Details 25 points Provided an excellent report of the incident details as required by the NIST template. Responses for all items were clear, concise, and reflected the analysis of the Blue Team with addi�onal contribu�ons by this student. 22.5 points Provided an outstanding report of the incident details as required by the NIST template. Responses
  • 14. for all items were clear and reflected the analysis efforts of the Blue Team with addi�onal contribu�ons by this student. 21 points Provided an acceptable report of the incident details as required by the NIST template. Responses for most items were clear and reflected some of the analysis efforts of the Blue Team with addi�onal contribu�ons by this student. 15 points Provided a report of the incident details as using the fields listed in the NIST template. Responses reflected some of the analysis efforts of the Blue Team with a few
  • 15. addi�onal contribu�ons by this student. 10 points A�empted to complete Sec�on 2 of the incident report form but the informa�on was seriously lacking (a) details and/or (b) originality (copied rather than paraphrased). 0 points No work submitted for this section. Section 3: Cause of the Incident 25 points Provided an excellent report of the incident causes using informa�on reported by the Red Team (from the assignment) and addi�onal analysis performed by the
  • 16. Blue Team and this student. Appropriately used informa�on from the Sifers-Grayson Overview and Enterprise Architecture diagrams. Repor�ng of the analysis was clear, concise, and reflected the analysis of the Blue Team with addi�onal contribu�ons by this student. 22.5 points Provided an outstanding report of the incident causes using informa�on reported by the Red Team (from the assignment) and addi�onal analysis performed by the Blue Team and this student. Appropriately used informa�on from the Sifers-Grayson
  • 17. Overview and Enterprise Architecture diagrams. Repor�ng of the analysis was clear and reflected the analysis of the Blue Team with addi�onal contribu�ons by this student. 21 points Provided an acceptable analysis and wri�en report of the incident causes using informa�on reported by the Red Team (from the assignment) and addi�onal analysis performed by the Blue Team and this student. Appropriately used informa�on from the Sifers-Grayson Overview and Enterprise Architecture diagrams. Repor�ng of the analysis included informa�on
  • 18. from the Blue Team with addi�onal contribu�ons by this student. 15 points Provided an analysis of the incident causes using some informa�on from the Red Team and Blue Team with a few addi�onal contribu�ons by this student. 10 points A�empted to complete Sec�on 3 of the incident report form but the informa�on was seriously lacking (a) details and/or (b) originality (copied rather than paraphrased). 0 points No work submitted for this section. Sections 4 & 5: Cost and Impact
  • 19. 10 points Provided an excellent analysis of the potential costs and impacts of the incident as reported by the Red Team. Analysis was clear and concise. Included information from the Blue Team and 8.5 points Provided an outstanding analysis of the potential costs and impacts of the incident as reported by the Red Team. Analysis was clear and included information from the Blue Team and 7 points
  • 20. Provided an acceptable analysis of the potential costs and impacts of the incident as reported by the Red Team. Analysis included some information from the Blue Team and limited 6 points Attempted to provide an analysis of the potential costs and impacts of the incident. 4 points Addressed the potential impacts of the incident but the analysis was significantly lacking in (a) details and/or (b) originality (excessive copying with no paraphrasing). 0 points No work submitted.
  • 21. 10/6/2017 Final Project: Incident Response Exercise & Report - Submit Files - CSIA 310 6381 Cybersecurity Processes and Technologies (2178) - UMUC … https://learn.umuc.edu/d2l/lms/dropbox/user/folder_submit_files .d2l?db=532069&grpid=0&isprv=0&bp=0&ou=247136 2/2 supplemented it with additional analysis by this student. supplemented it with additional analysis by this student. additional analysis by this student. Section 6: General Comments 10 points Provided an excellent discussion of the contract requirements and derivative requirements for
  • 22. cybersecurity at Sifers-Grayson (clear, concise, accurate). Included information from the Blue Team and supplemented it with additional analysis by this student. Included additional information as necessary to provide explanations and improve overall clarity for the incident response report. 8.5 points Provided an outstanding discussion of the contract requirements and derivative requirements for cybersecurity at Sifers-Grayson (clear and accurate). Included information from
  • 23. the Blue Team and supplemented it with additional analysis by this student. Included additional information as necessary to provide explanations and improve overall clarity for the incident response report. 7 points Provided an acceptable discussion of the contract requirements and derivative requirements for cybersecurity at Sifers-Grayson. Included information from the Blue Team and supplemented it with additional analysis by this student.
  • 24. 6 points Discussed some of the contract requirements and/or derivative requirements for cybersecurity at Sifers-Grayson. Included information from the Blue Team and supplemented it with additional analysis by this student. Important points were missing or were not adequately covered. 4 points Attempted to complete Section 6 of the incident report form but the information was seriously lacking (a) details and/or (b) originality (copied rather than paraphrased). 0 points Missing or no work submitted. Professionalism:
  • 25. Execution 20 points Work is professional in appearance and organization (appropriate and consistent use of fonts, headings, color). No word usage, grammar, spelling, or punctua�on errors. All quota�ons (copied text) are properly marked and cited using a professional format. (APA format recommended but not required.) 18 points Work is professional in appearance and organization (appropriate and consistent use of
  • 26. fonts, headings, color). Work contains minor errors in word usage, grammar, spelling or punctua�on which do not significantly impact professional appearance. All quota�ons (copied text) are properly marked and cited using a professional format. (APA format recommended but not required.) 16 points Work is professional in appearance and organization (minor issues allowable but overall the work contains appropriate and consistent use of fonts, headings, color). Errors in word usage,
  • 27. spelling, grammar, or punctua�on which detract from professional appearance of the submi�ed work. All quota�ons (copied text) are properly marked and cited using a professional format. (APA format recommended but not required.) 14 points Submi�ed work has numerous errors in forma�ng, organiza�on, word usage, spelling, grammar, or punctua�on which detract from readability and professional appearance. Punctua�on errors may include failure to properly mark quoted or copied material (an a�empt to name original source is required).
  • 28. 10 points Submi�ed work is difficult to read / understand and has significant errors in forma�ng, appearance / organiza�on, spelling, grammar, punctua�on, or word usage. Significant errors in presenta�on of copied text (lacks proper punctua�on and failed to a�ribute material to original source). 0 points No work submi�ed for this assignment. Overall Score Excellent 90 or more Outstanding 80 or more Acceptable 70 or more Needs Improvement
  • 29. 50 or more Needs Significant Improvement 1 or more No Submission 0 or more