SlideShare a Scribd company logo
1 of 24
Unit III Assessment:
Question 1
1. Compare and contrast two learning theories. Which one do
you believe is most effective? Why?
Your response should be at least 200 words in length.
Question 2
1. Explain how practice helps learning. Give examples of how
this has helped you.
Your response should be at least 200 words in length.
Running head: RANSOMWARE ATTACK 1
RANSOMWARE ATTACK
2
Situational Report on Ransomware Attack
Name
Institution
Date
Ransomware Attack-Situational Report
The current attack involves ransomware located inside the
organizational network. The ransomware attacker has also
raised the demand to $5000 in Bitcoin per nation-state. Virtual
currencies such as Bitcoin present significant challenges and
has widespread financial implications. The malware was zipped
and protected with a password. The affected hosts had
executable files and also malicious artifacts. The malware
dropped some items in the database. The malware also had to
write privileges as it uploaded some files to the webserver
(Johnson, Badger, Waltermire Snyder & Skorupka, 2016). The
malware also retrieved some files from the server using the
“GET” HTTP request. The file hash and requested passed onto
the urls indicate a breach of security.
Security Incident Report / SITREP #2017-Month-Report#
Incident Detector’s Information
Date/Time of Report
15/02/2018 1.40 p.m.
First Name
Amanda
Last Name
Smith
OPDIV
Avitel/Information Security
Title/Position
System Analyst
Work Email Address
[email protected]
Contact Phone Numbers
Work 321-527-4477
Government Mobile
Government Pager
Other
Reported Incident Information
Initial Report Filed With (Name, Organization)
CISO, Avitel Analysts
Start Date/Time
15/02/2018
Incident Location
HR Office
Incident Point of Contact (if different than above)
Internal Ransomware
Priority
Level 2
Possible Violation of ISO/IEC 27002:2013
YES ISO/IEC 27002
Privacy Information - ISO 27000 (Country Privacy Act Law)
The incident violated ISO 27000. The attack is an indication of
failure in the state of the corporate network or existing security
policies.
The target suffered adversely by limiting the conference
participants from accessing the network resources. The
violation was intentional.
Incident Type
Alteration of information from the server. There are database
queries indicating that the attack involved modifying some
entries in the database.
US-CERT Category
Ransomware/ Unauthorized Access
CERT Submission Number, where it exists
The ransomware attack can be reported to the CCIRC Canadian
Cyber Incidence Response Centre Team for an appropriate
response to the incident.
Description
The ransomware makes it quite difficult to guess the password
unless the conference participants pay the demanded amount.
The Crypto-ransomware locks the system unless the system is
unlocked via the password.
1. User asked to update links
2. User disables security controls
3. Malware opens a command prompt
4. The script uploads the files attackescript.txt and
ransomware.exe to the WordPress site
internal.nationstate.cyb670
5. Two files (attackscript.exe and ransomware.txt) were then
downloaded to VM and the user files are then encrypted
Additional Support Action Requested
Detection of possible breach of internal control policies.
Method Detected
Log Reviews and Intrusion Detection Systems were used to
identify the incident. Diagnostics and monitoring tools
identified essential leads for the ransomware attack into the
organization’s network.
Number of Hosts Affected
120
OPDIV / Department Impact
Low – Medium
Information Sharing
System
Entire Network within the organization (Windows)
Status
Ongoing
Attacking Computer(s) Information
IP Address / Range
Host Name
Operating System
Ports Targeted
System Purpose
52.94.225.236
Internal.nationstate.cyb670
Windows 7
443,80
Attack System
Victim's Computer(s) Information
IP Address / Range
Host Name
Operating System
Ports Targeted
System Purpose
172.21.21.232
N/A
Windows7/Mac
80, 443
HR System
Action Plan
Action Description
Control further attack by the m
Requestor
CISO
Assignee
Head, Information Security, CISO
Time Frame
12 hours
Status
Ongoing
Conclusion / Summary
Entities Notified
Departmental Head, CIO, CISO, IT Manager, VP Operations,
and FVEY
Resolution
The information security team seeks to control the ransomware
attack without making any payment in Bitcoin currency. Using
Wireshark and other tools IT team was able to recover password
and decrypt all files that were encrypted. Was also able to
create Snort and Yara rules to help detect any other possible
attacks like this on our system
References
Adamov, A., & Carlsson, A. (2017, September). The state of
ransomware. Trends and mitigation techniques. In East-West
Design & Test Symposium (EWDTS), 2017 IEEE (pp. 1-8).
IEEE.
Johnson, C., Badger, L., Waltermire, D., Snyder, J., &
Skorupka, C. (2016). Guide to cyber threat information
sharing. NIST special publication, 800, 150.
SITREP #
Classification - Viewable by X (Secret//REL TO FVEY)
TREP #2017-Month-Report#
Business Continuity Plan
By
Contents
Justification for Plan 4
Roles and Responsibilities 5
Canadian Delegation Employee Responsibilities 5
Incident Response Team Responsibilities 6
Security Personnel Responsibilities 7
Critical Systems 8
Normal Operations 8
Critical Functions 9
Communication in Email Outage 10
Email Server 10
File Servers 11
Canadian Government-owned User devices 11
Event Reactions 12
Ransomware Infection 12
Dedicated Denial of Service 13
Rogue Access Points 13
Business Continuity Checklist 15
IR Response Flow DDOS 17
IR Response Flow Insider Threat 18
References 19
Justification for Plan
In the event of a cyber event that drastically impacts the
communication posture of the Canadian delegation is it
necessary that a plan be developed to maintain critical functions
of the delegation. Regardless of a dramatic cyber event,
members of the delegation must be able to effectively
communicate in at all times with each other and decision makers
back inside the homeland. Failure to maintain this important
function does not only jeopardizes the delegation located in the
UK, but could also have serious consequences for the Canadian
government as a whole. It is important to remember that
adversaries may plot to disrupt communications for a variety of
reasons ranging from a simple desire to embarrass the Canadian
government to a goal of drastically infiltrating government
communication systems to corrupt or exfiltrate data. In either
event, efforts must be taken to prevent the adversary from
realizing their goals while maintaining the functions of the
government. In order to ensure that there is a roadmap in place
to maintain critical functions of the mission a Business
Continuity Plan (BCP) must be created. A BCP is not to be
confused with a Disaster Recovery Plan, though the two are
often used interchangeably. A BCP is a plan for how a business
will maintain operations in the event of a disaster, while a
Disaster Recovery Plan is an actual plan for disaster
remediation (Kunthe, 2012). In this document aspects of each
plan will be discussed, but the primary focus will be on the BCP
portion of incident response.
Failure to properly secure the government security functions
could have dramatic consequences for communication systems
back inside Canada if the failure allows malicious actors to
leverage vulnerabilities within the delegation communication
network to execute a lateral move into primary Canadian
government systems. This outcome must be avoided at all costs
and may require the temporary shutdown of some systems,
critical and non-critical, until the possibility of increased
malicious actor access is eliminated. This proposal will focus
on plans to maintain the communication abilities of the
delegation. For the purposes of this plan, communication
includes not only person-to-person communication between
delegates within the UK and/or back to the homeland, but also
includes communication between various devices on the
Canadian delegation network. To that end, the list of critical
systems will encompass a wide array of devices and shall not be
limited to only include end user communication devices. Roles
and Responsibilities
With any plan the roles and responsibilities of all stakeholders
must be clearly defined prior to the triggering incident. The
clear communication of these roles and responsibilities, and
appropriate corresponding education, will be key to the swift
and efficient restoration of functions. To that end, this
document clearly defines the roles of users within the network
and their responsibilities within the Business Continuity
Plan.Canadian Delegation Employee Responsibilities
The majority of users will fall within the basic end user role.
These are individuals who do not have administrator access
within the network and do not fill a security and/or digital
forensic role. An example would be a diplomat within the
delegation who uses the communication network, but does not
perform any administration or configuration within the network.
In the event of a critical event, it is the responsibility of these
end users to maintain situational awareness and continue to
adhere to previously outlined security practices and incorporate
any additional guidance into their functions. These users must
make every event to review bulletins put out by the Network
Security Officer and/or other network security personnel. These
users are not authorized to make any independent action in
reaction to the event as doing so could exacerbate the situation
(such as attempting to download a new anti-virus which is
either disguised ransomware or conflicts with existing
software).
End users within the delegation, not network related, will make
every effort to contact immediate supervisors to receive their
operational status update. In the event that the delegation
network is down, users are authorized to use personal devices
(within reason) to receive the update. Note that classification
levels and the appropriate protections are not waived in the
event of a critical event and still must be observed.Incident
Response Team Responsibilities
Immediately upon confirmation that a large scale cyber incident
is taking place the Incident Response Plan will be initiated and
an Incident Response Team will be formed. The roles and
responsibilities within the team were previously outlined within
a previous document and will not be explored in full here. For
the sake of this document, all personnel conducting network
analysis, diagnosis, and correction will be referred to as
“Network Analyst” though their official titles will vary.
The Network Analyst will immediately upon discovery initiate
a Situation Report (SITREP) to document the event and provide
a document for other stakeholders to review. Documentation
will continue throughout the entire course of the event. The
Network Analyst will also contact appropriate security
personnel to keep them appraised of the situation and if deemed
necessary issue an alert to end-users providing situation
awareness and/or event response guidance. Note that any
notices to end-users will only include basic descriptions of the
event, recommended or required end user actions, and/or
estimated time to system restoration. Comprehensive reports of
the situation will not be issued regarding the event until the full
details are known and will be issued by security personnel.
The analyst will also make attempt to safeguard any critical
systems (to be described further in the document) which are
jeopardized by the event and immediately take any available
steps to safeguard the systems. Critical Systems must be
identified prior to any event (a non-comprehensive list is
included with this document), so as to expedite the process of
securing the systems. In the event a critical system is damaged
by the event the analyst will immediately begin remediation
efforts to bring the system back online. If a non-critical system
is also affected the critical system will always take precedence.
The network analyst will document all discoveries and
remediation steps (as previously stated). Additionally, the
analyst will provide periodic updates to security personnel and
senior leaders. Periodic updates to end users will be issued as
necessary.Security Personnel Responsibilities
Upon notification by the Incident Response Team, security
personnel will open a file regarding the event and record any
appropriate details. In the event of a ransomware attack
information related to the ransom will be recorded and will
document pertinent details to include the date/time ransom
request was received, method of receipt (email, via malware
infection, etc), amount of ransom, currency requested, recipient
of funds (to include any banking information or crypto-currency
wallets), and/or details failure to pay ransom. Note that this
information should also have been recorded by the Incident
Response Team. Once the information is documented security
personnel will inform senior leaders of the situation from their
perspective understanding that the Incident Response Team will
also be reporting to senior leaders from their perspective.
It may be deemed necessary for a bulletin to be put out
regarding full details of the event. If that case security
personnel will draft the bulletin, minus technical details, and
provide it to affected end users. Note that ever effort must be
made to not reveal information which could reveals sources and
methods, sensitive areas which may have been affected, and/or
sensitive details of ongoing investigations. The bulletin should
include all details needed for end users to be informed of
incident and implement identified methods to safeguard
systems, but not provide critical information to adversaries who
may be launching an operation. Critical Systems
As previously stated, critical systems take precedent when
resolving the cyber incident as they are necessary to
maintaining the core functions of organization operations
(Gibson, 2015). In order to ascertain what systems should be
designated as mission critical a review of the core duties and
requirements of the mission must be conducted. In this
scenario, the delegation must be able to communicate
effectively (to carry out normal mission and coordinate incident
response), while also accessing documents of importance.
Those documents remaining uncorrupted and complete is also
key as delegates operating under corrupted or intentionally
altered data could have drastic consequences to the government
operations. To that end, communication system components and
document storage and retrieval mechanisms are most certainly
mission-critical systems.Normal Operations
In the normal operation of the network users should be
permitted to send and receive emails with attachments as usual.
There is already a method in place to PKI protect emails in
order for recipients to verify that messages were received from
authorized individuals. There is also rudimentary malware
scanning of documents. The program that updates the anti-virus
software sends patches to user machines on a periodic basis,
though it requires the machine to be powered on to receive the
update. If the machine is powered down the update will not be
received until the next patch push in which the machine is
powered on.
For users sharing files there are a few authorized means to send
and/or receive files. As previously mentioned, users can send
files via email attachments provided the classification of the
document does not exceed the security requirements for this
transmission method and the file is within the size restrictions
for email attachments. Users can also send documents via a
Dropbox type mechanism. In this method a user would navigate
to the intended recipient’s dropbox and upload the file. Only
the user who owns the dropbox (or those who have been given
authorization by the owner), can download files stored there.
This method is useful for files which exceed the size or
classification restrictions for email. Finally, users can send
each other the file path for the file so that the recipient can
navigate to it within the network, provided they have the
appropriate credentials.
In regard to typical communication, users can communicate via
email, chat, phone or conference. A review of organization
communication trends revealed that email is the most popular
communication method, followed by chat, and calling.
Conferencing was the least utilized communication method.
Unfortunately, users were not asked to specify between mobile
text messaging and online chat.
The entire system is backed up once a day to offsite servers in
the event a system rollback is necessary. Unfortunately, any
changes which were implemented after the last backup will be
lost in the event of a rollback and may not be
retrievable.Critical Functions
In event of a crisis, Canadian officials are still obligated to
carry out the functions of the delegation at the Summit. This
includes relaying Canadian government objectives and positions
to the international community. Additionally, security posture
must be maintained to include the physical and cyber security of
all Canadian owned and occupied locations. These are
functions which cannot be dropped and as such all systems
which facilitate the execution of these functions must be
safeguarded prior to an event, and prioritized in the event an
incident occurs. These systems would include communication
systems and systems which facilitate file
access/sharing.Communication in Email Outage
In the event that an incident occurs which completely takes
down all online communications methods users should be
instructed to contact their immediate supervisor using a phone
(assuming phone lines remain unaffected). Preferably the user
would utilize a landline phone within the delegation spaces;
however, if the option is not available the use of either
government-issued or personally owned mobile devices are
authorized so long as appropriate security practices are
followed.
Within the office spaces the user of short range radios can be
used for communication by critical personnel. Precedence will
be given to individuals actively working to resolve the
communications issue.Email Server
Given the fact that the majority of communication for the
delegation occurs via email, in the event email servers remain
minimally affected users will communicate via that medium.
An email should be sent to all users on the network (PKI
protected) informing them of the ongoing issues and providing
any steps which must be taken. If email is affected then, if
necessary, a determination will be made which will result in
critical personnel accounts being recovered first.
Network analysts will review the email servers to determine if
there is any unauthorized access or if any user account displays
anomalous behavior. Strange behavior on a user account could
indicate unauthorized access which could potentially lead to
further infections within the network. If such behavior is noted
network administrators will make an executive decision as to
whether or not to suspect account access in an abundance of
caution. Additionally, analyst should review the possible
benefits to restricting the account owners access to other areas
in the network.
If at all possible, history email messages should also be
retrieved from backups and or user person PST files. Access to
historic data could be critical to decisions which must be made
by delegation employees.File Servers
Following communication between users, maintaining the
integrity and security of files on the network is also key. A file
server is a server that allows for the sharing of files across
different devices on a network (Brunelli, 2016). In the event of
a crisis critical files have to be retrievable by authorized users.
To that end, a periodic cloud backup of file servers should be
conducted in order to ensure that an uncorrupted version of files
is stored offsite in the event anything occurs to the onsite file
server. Additionally, periodic reviews of user authorizations on
the network, to include areas users are allowed to access should
be reviewed.
Following a crisis, the user access list currently in place should
be compared to the documented list to determine if any changes
have been implemented. Such a change could indicate
malicious actor escalation of privileges. If such a change exists
an authorization rollback should be conducted ahead of an
examination of the discrepancy. If such a discrepancy does not
exist then a review of files should be done to ascertain if
documents stored on servers can be trusted. If widespread
corruption or tampering is suspected then a rollback to the
previously saved backup can be implemented.Canadian
Government-owned User devices
Mission critical end user devices should be completely backed
upon a periodic basic on par with the backups of file servers. In
the event of a crisis these machines can be rolled back to the
last backup. Prior to rollback, the systems should be reviewed
for unusual login activity or activity which is outside the
normal parameters for the authorized userEvent Reactions
Part of an effective Incident Response Plan, Business
Continuity Plan, or Disaster Response Plan, is determining what
action will be taking in response to any identified threat. To
this end, a series of responses have been compiled in the event
of common cyber threats are encountered by the
delegation.Ransomware Infection
In the event of a ransomware infection, as previously stated, all
information related to the incident will be recorded. The
information should immediately be reported to the Canadian
Cyber Incident Response Centre (CCIRC) which is responsible
for reducing cyber risks to Canadian critical infrastructure and
systems (Department of Public Safety and Emergency
Preparedness , 2016). However, no ransom will be paid.
Ransomware launched against government systems has a far
greater implication then when launched against civilian systems
and has been compared to terrorism (Zurkus, 2016). The
Canadian government will not negotiate with such actors nor
encourage such behavior by paying a requested ransom.
Ransomware attacks pose a few security threats. The primary
threat, and the most noticeable, is the manipulation and/or
corruption of files on a target system. This can be demonstrated
by the encryption of files or the altering of programs on the
machine to negatively affect its operation. Additionally, a user
is unable to determine (without in-depth review of the network)
if the malicious actor still has access to the victim machine. If
so, then paying the ransom once could just result in another
infection and follow-up ransom. Additionally, the ransom could
be meant to distract from or hide other actions the malicious
actor is taking on the machine. Users may be too concerned
about the ransomware to notice that the actor is copying files
out of the machine or changing account privileges. Dedicated
Denial of Service
In the event of a Dedicated Denial of Service (DDOS) attack the
network administrator should carry out a few steps. First the
router should be rate limited to protect the web server. Rate
limiting is a process in which controls the amount of data which
flows to and/or from a network (Key CDN, 2017). Filters can
also be added to router security which informs the router to
discard packs which originate from previously identified attack
sources. Additionally, the router can be instructed to drop any
packets which are malformed or duplicates. Finally, the network
analysts can lower SYN, ICMP, and UDP flood drop thresholds
(Rubens, 2016).
In the event that this does not solve the issue, DDOS attacks can
last for 24 hours, then network administrators could take other
methods. One option is to block all communications originating
from a specific country. For example, the network
administrators notice that the majority of calls are coming from
China, then connections to China could be blocked to allow
other packets through. This is a temporary fix, as a savvy cyber
actor will switch to using proxies from another nation. Network
administrators could also whitelist any typical connections and
block all others. This would allow users who habitually use a
system to gain access but would prevent new or periodic users
from doing so. In the event of an event that triggers the BCP,
this may be the best option as critical personnel would most
likely be within the habitual user set and included in the
whitelist (Buntinx, 2017).Rogue Access Points
In order to discover and eliminate rogue access points, network
administrators should maintain a list (both digital and hard-
copy) of authorized access points (AP) within the network.
Authorized access points being wireless access points that are
put in place by company IT personnel and are the only devices
approved to allow users access to the WLAN. The need for the
hard-copy list is a precaution in the event of a hack in which
malicious actors attempt to alter the digital copy of the AP list.
The list of authorized APs should document official devices by
both media access control (MAC) address and Service Set
Identifier (SSID). This dual listing is required because of the
possible existence of multiple WLANs within the delegation
network.
In order to detect unauthorized AP, the Canadian delegation
will employ both mobile and bundled wireless intrusion
detection and prevention systems (WIDPS). These systems
could detect APs which are not authorized to be on the network.
Bundled WIDPS come bundled with an AP, so authorized APs
can serve a dual purpose of providing access to the network and
detecting unauthorized devices. Mobile WIDPS systems allow
security personnel to walk the premises with the device and
detect them on the go. This can be useful if an authorized AP is
detected, but the exact physical location of the device is
unknown. In this way, the bundled and mobile versions of the
system can work in tandem, with one providing the initial
detection and the second being used for location.
Business Continuity Checklist
· Validate the security incident
· Begin incident response documentation/reporting process
· Review network activity and/or log analysis to identify
irregular data
· Identify data which may have been compromised
· In event of DDOS
· Identify possible source of DDOS
· Identify, if possible, the method of DDOS
· Identify, if possible, the source of the breach
· Assemble incident response team
· Assign Incident Response Manager
· Assign Security Analysts
· Assign Security Researchers
· Identify additional internal and external stakeholders
· Coordinate response communication workflow
· Determine status and scope of breach
· Ensure all portions of investigation and findings are
documented
· Ensure preservation of all evidence discovered
· Determine if the breach is ongoing or if it is post-breach
· Identify all effected machines, data, or network components
· If breach is ongoing immediately take actions to prevent
further data loss
· Block unauthorized access
· If necessary take isolate affected portions of network
· If necessary shutdown and/or remove affected network
components
· If criminal activity is suspected notify law enforcement
· Take remediation efforts
· Take steps to remove any malicious files that may be present
on affected machines
· In event of DDOS
· Take DDOS remediation steps
· If necessary create whitelist of routine network activity
· Carry out data recovery
· Utilize system backups
· Hash comparison should be utilized to ensure data remains
uncorrupted
· Update relevant security patches
· Update anti-viruses, IDS, IPS, and other software to detect
identified malicious activity to prevent reoccurrence
· Conduct interviews with key personnel
· If necessary, have Human Resources attend interviews
· Above is mandatory in case of suspected insider threat
· If criminal activity is suspected contact local law enforcement
prior to interview
· Above is mandatory in case of suspected insider threat
· Inform stakeholders of findings of breach investigation
· Internal stakeholders should be informed first
· Notify external stakeholders if deemed necessary
Business Continuity Plan
1
Business Continuity Plan
18
IR Response Flow DDOS
Initial Detector
Report Security Incident
Incident Response Team
Manager
Inform Delegation of findings
Yes/no
Criminal act suspected?
Assemble Analysts and Researchers
Security Analyst
Implement DDOS remediation
Report findings to delegation
Investigate technical details of incident
Security Researcher
Report findings to delegation
Research incident info available openly
General Counsel
Inform parties of legalities, review statements
Law Enforcement
Conduct and oversee criminal investigation
Canadian Delegation
Inform external stakeholders of situation
IR Response Flow Insider Threat
Initial Detector
Report Security Incident
Incident Response Team
Manager
Inform Delegation of findings
Yes/no
Criminal act suspected?
Assemble Analysts and Researchers
Security Analyst
Report findings to delegation
Investigate technical details of incident
Security Researcher
Research incident info available openly
Report findings to delegation
Human Resources
yes
Remove Employee access
Wrong doing suspected?
Review Employee access
Create Employee incident file
General Counsel
Inform parties of legalities, review statements
Law Enforcement
Conduct and oversee criminal investigation
Canadian Delegation
Inform external stakeholders of situation
References
Brunelli, M. (2016, June 8). What's the difference between a
file server and a NAS device? Retrieved from Carbonite:
https://www.carbonite.com/blog/article/2016/06/whats-the-
difference-between-a-file-server-and-a-nas-device/
Buntinx, J. (2017, January 31). How Do I Stop A DDoS Attack?
Retrieved from The Merkle: https://themerkle.com/how-do-i-
stop-a-ddos-attack/
Department of Public Safety and Emergency Preparedness .
(2016, May 4). Canadian Cyber Incident Response Centre
(CCIRC). Retrieved from Department of Public Safety and
Emergency Preparedness :
https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric-
en.aspx
Gibson, D. (2015). Managing Risk in Information Systems.
Burlington, MA: Jones & Bartlett Learning.
Key CDN. (2017, April 26). What Is Rate Limiting? . Retrieved
from Key CDN: https://www.keycdn.com/support/rate-limiting/
Kunthe, C. (2012, October 12). Difference between BCP and
DR. Retrieved from ISACA:
http://www.isaca.org/Groups/Professional-English/business-
continuity-disaster-recovery-
planning/Pages/ViewDiscussion.aspx?PostID=72
Rubens, P. (2016, January 26). 6 Tips for Fighting DDoS
Attacks. Retrieved from eSecurity Planet:
https://www.esecurityplanet.com/network-security/5-tips-for-
fighting-ddos-attacks.html
Zurkus, K. (2016, July 11). Why you shouldn't pay the
ransomware fee. Retrieved from CSO Online:
https://www.csoonline.com/article/3092278/backup-
recovery/why-you-shouldnt-pay-the-ransomware-fee.html
Scenario
Before the summit, each nation set up its own secure comms
network. As summit events began, your team responded to
anomalous network activity that was detected on your agency's
server.
Now, to make matters worse, the next day you awaken to the
news that summit attendees are unable to get access to the
confidential summit data needed for the conference. All of the
computer screens show a pop-up message that says:
"Your Computer has been involved in Child Porn Activity!!!
and has been locked down by the FBI and the Justice
Department. Unless you pay the sum of $500 (FIVE HUNDRED
DOLLARS)—in Bitcoin you will be arrested immediately! You
have 48 hours to pay up via email - [email protected]"
Your CISO has called an emergency meeting with your team.
She begins to speak to the group.
"We've just been hit with the Reveton ransom attack, which
pretends to be a warning from a country's law enforcement
agency. It locks you out of your PC and threatens criminal
proceedings within 48 hours based upon very serious offenses.
The message informs you that you can avoid prosecution by
paying a fine to the attackers via Bitcoin. Based on the time of
the incident, we believe that a single threat actor or group is
responsible. This person or group is still unidentified."
The CISO continues to brief you on the attack, confirming that
no further information is known about the file, permissions, or
tools used. Currently, systems show no signs of infection or
additional malicious indicators.
The attendees at the summit are divided on what should be
done. Some of them want to pay the money—it's a small sum to
be holding up the proceedings. However, cyber insiders know
that once you pay a ransom, you set a precedent for further
attacks since you appear vulnerable.
In addition, you want to know how the attackers were able to
infiltrate the system and plant the malware. What current
protections are in place for systems at the summit? What
methods and procedures are your team employing in response to
the current attack? What is the plan if protections fall short?
These are the questions pouring in from leadership, down to
your CISO—and now, to you.
Your CISO continues: "I need your team to provide a series of
reports that will track this incident from start to recovery. Risk
management briefings. Forensic reports. Situational reports. I
need it all. They'll all come in handy when it's time to debrief
our nation's leaders."
Unit III Project:
Improving Organizational Culture: Acceptance of Religion and
Orientation Fig Technologies has identified concerns at several
of their offices globally. Division has been noted on key teams
based upon religion and sexual orientation. Several team
members have complained that the non-Christian holidays and
LGBT celebrations are not recognized by the established
company celebrations or paid time off for observance. There
have been complaints with regard to coworkers making
harassing comments to this effect. The Executive Leadership
Council has asked for you to draft an assessment of these
concerns and then to propose a plan of action for addressing
these concerns. Further, include a preliminary draft of policy to
be included as an addendum to the organizational policy on
discrimination and harassment.
In your report, be sure to address the following: Compare the
impact of different religious beliefs and practices (choose three
to four different religions) and how these affect the
organizational culture, and describe how your new plan and
policy will improve organizational culture through inclusion of
different religious beliefs and practices. Compare how belief
systems of different gender orientations and sexual orientations
may impact the organizational culture, and describe the effects
of discrimination against any of these. In your plan of action,
address how inclusion and assimilation of different orientations
will improve organizational culture. Support your
recommendation through the use of at least two sources.
Content should be two to three pages in length. Length does not
include an assessment tool, if used, though it may be added as
an addendum (recommended, not required).
All sources used, including the textbook, must be referenced;
paraphrased and quoted material must have accompanying
citations. All references and citations used must be in APA
style.

More Related Content

Similar to Unit III AssessmentQuestion 1 1. Compare and contrast two.docx

Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008John Gilligan
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices FrameworkSujata Raskar
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
 
Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Dave Darnell
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Edgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics ReportEdgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics ReportEoin Keary
 
2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdf2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdfssuserc3d7ec1
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management SystemIRJET Journal
 
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero SurveyDDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero SurveyStephanie Weagle
 
Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEMJoseph DeFever
 
Overview of Ransomware Solutions from Protection to Detection and Response.pptx
Overview of Ransomware Solutions from Protection to Detection and Response.pptxOverview of Ransomware Solutions from Protection to Detection and Response.pptx
Overview of Ransomware Solutions from Protection to Detection and Response.pptxCompanySeceon
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanTripwire
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015Paul Ferrillo
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemAffine Analytics
 
NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)April Mardock CISSP
 

Similar to Unit III AssessmentQuestion 1 1. Compare and contrast two.docx (17)

Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008Consensus Audit Guidelines 2008
Consensus Audit Guidelines 2008
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16Cyber security white paper final PMD 12_28_16
Cyber security white paper final PMD 12_28_16
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Edgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics ReportEdgescan 2022 Vulnerability Statistics Report
Edgescan 2022 Vulnerability Statistics Report
 
2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdf2022 Vulnerability Statistics Report.pdf
2022 Vulnerability Statistics Report.pdf
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
Vulnerability Management System
Vulnerability Management SystemVulnerability Management System
Vulnerability Management System
 
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero SurveyDDoS Attacks Advancing and Enduring a SANS & Corero Survey
DDoS Attacks Advancing and Enduring a SANS & Corero Survey
 
Guide to high volume data sources for SIEM
Guide to high volume data sources for SIEMGuide to high volume data sources for SIEM
Guide to high volume data sources for SIEM
 
Overview of Ransomware Solutions from Protection to Detection and Response.pptx
Overview of Ransomware Solutions from Protection to Detection and Response.pptxOverview of Ransomware Solutions from Protection to Detection and Response.pptx
Overview of Ransomware Solutions from Protection to Detection and Response.pptx
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Developing a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action PlanDeveloping a Continuous Monitoring Action Plan
Developing a Continuous Monitoring Action Plan
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015
 
Deep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection systemDeep Learning based Threat / Intrusion detection system
Deep Learning based Threat / Intrusion detection system
 
NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)NIST CSF review - Essential Protections (a K12 perspective)
NIST CSF review - Essential Protections (a K12 perspective)
 

More from marilucorr

Cover LetterOne aspect of strategic planning is to develop a str.docx
Cover LetterOne aspect of strategic planning is to develop a str.docxCover LetterOne aspect of strategic planning is to develop a str.docx
Cover LetterOne aspect of strategic planning is to develop a str.docxmarilucorr
 
Cover Letter, Resume, and Portfolio Toussaint Casimir.docx
Cover Letter, Resume, and Portfolio Toussaint Casimir.docxCover Letter, Resume, and Portfolio Toussaint Casimir.docx
Cover Letter, Resume, and Portfolio Toussaint Casimir.docxmarilucorr
 
Cover Executive Summary (mention organization, key ‘out-take.docx
Cover Executive Summary (mention organization, key ‘out-take.docxCover Executive Summary (mention organization, key ‘out-take.docx
Cover Executive Summary (mention organization, key ‘out-take.docxmarilucorr
 
couse name Enterprise risk management  From your research, dis.docx
couse name  Enterprise risk management  From your research, dis.docxcouse name  Enterprise risk management  From your research, dis.docx
couse name Enterprise risk management  From your research, dis.docxmarilucorr
 
Courts have reasoned that hospitals have a duty to reserve their b.docx
Courts have reasoned that hospitals have a duty to reserve their b.docxCourts have reasoned that hospitals have a duty to reserve their b.docx
Courts have reasoned that hospitals have a duty to reserve their b.docxmarilucorr
 
Court Operations and Sentencing GuidelinesPeriodically, se.docx
Court Operations and Sentencing GuidelinesPeriodically, se.docxCourt Operations and Sentencing GuidelinesPeriodically, se.docx
Court Operations and Sentencing GuidelinesPeriodically, se.docxmarilucorr
 
Course Competencies Learning ObjectivesCourse Learning Objectiv.docx
Course Competencies Learning ObjectivesCourse Learning Objectiv.docxCourse Competencies Learning ObjectivesCourse Learning Objectiv.docx
Course Competencies Learning ObjectivesCourse Learning Objectiv.docxmarilucorr
 
Coursework 2 – Presentation Report The aim of this 1000-word r.docx
Coursework 2 – Presentation Report  The aim of this 1000-word r.docxCoursework 2 – Presentation Report  The aim of this 1000-word r.docx
Coursework 2 – Presentation Report The aim of this 1000-word r.docxmarilucorr
 
CourseOverview-MarketingChannelConceptsLecture1.docx
CourseOverview-MarketingChannelConceptsLecture1.docxCourseOverview-MarketingChannelConceptsLecture1.docx
CourseOverview-MarketingChannelConceptsLecture1.docxmarilucorr
 
course-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docx
course-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docxcourse-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docx
course-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docxmarilucorr
 
COURSE  InfoTech in a Global Economy Do you feel that countri.docx
COURSE  InfoTech in a Global Economy Do you feel that countri.docxCOURSE  InfoTech in a Global Economy Do you feel that countri.docx
COURSE  InfoTech in a Global Economy Do you feel that countri.docxmarilucorr
 
Course Themes Guide The English 112 course will focus o.docx
Course Themes Guide  The English 112 course will focus o.docxCourse Themes Guide  The English 112 course will focus o.docx
Course Themes Guide The English 112 course will focus o.docxmarilucorr
 
Course SyllabusPrerequisitesThere are no prerequisites for PHI20.docx
Course SyllabusPrerequisitesThere are no prerequisites for PHI20.docxCourse SyllabusPrerequisitesThere are no prerequisites for PHI20.docx
Course SyllabusPrerequisitesThere are no prerequisites for PHI20.docxmarilucorr
 
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docx
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docxCOURSE SYLLABUSData Analysis and Reporting Spring 2019.docx
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docxmarilucorr
 
COURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docx
COURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docxCOURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docx
COURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docxmarilucorr
 
Course SuccessHabits Matter1. Professors are influenced by you.docx
Course SuccessHabits Matter1. Professors are influenced by you.docxCourse SuccessHabits Matter1. Professors are influenced by you.docx
Course SuccessHabits Matter1. Professors are influenced by you.docxmarilucorr
 
Course ScenarioYou have been hired as the Human Resources Di.docx
Course ScenarioYou have been hired as the Human Resources Di.docxCourse ScenarioYou have been hired as the Human Resources Di.docx
Course ScenarioYou have been hired as the Human Resources Di.docxmarilucorr
 
Course ScenarioPresently, your multinational organization us.docx
Course ScenarioPresently, your multinational organization us.docxCourse ScenarioPresently, your multinational organization us.docx
Course ScenarioPresently, your multinational organization us.docxmarilucorr
 
COURSE RTM 300 (Recreation and Community Development (V. Ward)).docx
COURSE RTM 300 (Recreation and Community Development (V. Ward)).docxCOURSE RTM 300 (Recreation and Community Development (V. Ward)).docx
COURSE RTM 300 (Recreation and Community Development (V. Ward)).docxmarilucorr
 
Course Retail ManagementPart1DraftPart2Fin.docx
Course Retail ManagementPart1DraftPart2Fin.docxCourse Retail ManagementPart1DraftPart2Fin.docx
Course Retail ManagementPart1DraftPart2Fin.docxmarilucorr
 

More from marilucorr (20)

Cover LetterOne aspect of strategic planning is to develop a str.docx
Cover LetterOne aspect of strategic planning is to develop a str.docxCover LetterOne aspect of strategic planning is to develop a str.docx
Cover LetterOne aspect of strategic planning is to develop a str.docx
 
Cover Letter, Resume, and Portfolio Toussaint Casimir.docx
Cover Letter, Resume, and Portfolio Toussaint Casimir.docxCover Letter, Resume, and Portfolio Toussaint Casimir.docx
Cover Letter, Resume, and Portfolio Toussaint Casimir.docx
 
Cover Executive Summary (mention organization, key ‘out-take.docx
Cover Executive Summary (mention organization, key ‘out-take.docxCover Executive Summary (mention organization, key ‘out-take.docx
Cover Executive Summary (mention organization, key ‘out-take.docx
 
couse name Enterprise risk management  From your research, dis.docx
couse name  Enterprise risk management  From your research, dis.docxcouse name  Enterprise risk management  From your research, dis.docx
couse name Enterprise risk management  From your research, dis.docx
 
Courts have reasoned that hospitals have a duty to reserve their b.docx
Courts have reasoned that hospitals have a duty to reserve their b.docxCourts have reasoned that hospitals have a duty to reserve their b.docx
Courts have reasoned that hospitals have a duty to reserve their b.docx
 
Court Operations and Sentencing GuidelinesPeriodically, se.docx
Court Operations and Sentencing GuidelinesPeriodically, se.docxCourt Operations and Sentencing GuidelinesPeriodically, se.docx
Court Operations and Sentencing GuidelinesPeriodically, se.docx
 
Course Competencies Learning ObjectivesCourse Learning Objectiv.docx
Course Competencies Learning ObjectivesCourse Learning Objectiv.docxCourse Competencies Learning ObjectivesCourse Learning Objectiv.docx
Course Competencies Learning ObjectivesCourse Learning Objectiv.docx
 
Coursework 2 – Presentation Report The aim of this 1000-word r.docx
Coursework 2 – Presentation Report  The aim of this 1000-word r.docxCoursework 2 – Presentation Report  The aim of this 1000-word r.docx
Coursework 2 – Presentation Report The aim of this 1000-word r.docx
 
CourseOverview-MarketingChannelConceptsLecture1.docx
CourseOverview-MarketingChannelConceptsLecture1.docxCourseOverview-MarketingChannelConceptsLecture1.docx
CourseOverview-MarketingChannelConceptsLecture1.docx
 
course-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docx
course-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docxcourse-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docx
course-text-booksKeri E. Pearlson_ Carol S. Saunders - Managing.docx
 
COURSE  InfoTech in a Global Economy Do you feel that countri.docx
COURSE  InfoTech in a Global Economy Do you feel that countri.docxCOURSE  InfoTech in a Global Economy Do you feel that countri.docx
COURSE  InfoTech in a Global Economy Do you feel that countri.docx
 
Course Themes Guide The English 112 course will focus o.docx
Course Themes Guide  The English 112 course will focus o.docxCourse Themes Guide  The English 112 course will focus o.docx
Course Themes Guide The English 112 course will focus o.docx
 
Course SyllabusPrerequisitesThere are no prerequisites for PHI20.docx
Course SyllabusPrerequisitesThere are no prerequisites for PHI20.docxCourse SyllabusPrerequisitesThere are no prerequisites for PHI20.docx
Course SyllabusPrerequisitesThere are no prerequisites for PHI20.docx
 
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docx
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docxCOURSE SYLLABUSData Analysis and Reporting Spring 2019.docx
COURSE SYLLABUSData Analysis and Reporting Spring 2019.docx
 
COURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docx
COURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docxCOURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docx
COURSE SYLLABUS ADDENDUM INTEGRATED CASE ANALYSIS CRITERIA.docx
 
Course SuccessHabits Matter1. Professors are influenced by you.docx
Course SuccessHabits Matter1. Professors are influenced by you.docxCourse SuccessHabits Matter1. Professors are influenced by you.docx
Course SuccessHabits Matter1. Professors are influenced by you.docx
 
Course ScenarioYou have been hired as the Human Resources Di.docx
Course ScenarioYou have been hired as the Human Resources Di.docxCourse ScenarioYou have been hired as the Human Resources Di.docx
Course ScenarioYou have been hired as the Human Resources Di.docx
 
Course ScenarioPresently, your multinational organization us.docx
Course ScenarioPresently, your multinational organization us.docxCourse ScenarioPresently, your multinational organization us.docx
Course ScenarioPresently, your multinational organization us.docx
 
COURSE RTM 300 (Recreation and Community Development (V. Ward)).docx
COURSE RTM 300 (Recreation and Community Development (V. Ward)).docxCOURSE RTM 300 (Recreation and Community Development (V. Ward)).docx
COURSE RTM 300 (Recreation and Community Development (V. Ward)).docx
 
Course Retail ManagementPart1DraftPart2Fin.docx
Course Retail ManagementPart1DraftPart2Fin.docxCourse Retail ManagementPart1DraftPart2Fin.docx
Course Retail ManagementPart1DraftPart2Fin.docx
 

Recently uploaded

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

Unit III AssessmentQuestion 1 1. Compare and contrast two.docx

  • 1. Unit III Assessment: Question 1 1. Compare and contrast two learning theories. Which one do you believe is most effective? Why? Your response should be at least 200 words in length. Question 2 1. Explain how practice helps learning. Give examples of how this has helped you. Your response should be at least 200 words in length. Running head: RANSOMWARE ATTACK 1 RANSOMWARE ATTACK 2 Situational Report on Ransomware Attack Name
  • 2. Institution Date Ransomware Attack-Situational Report The current attack involves ransomware located inside the organizational network. The ransomware attacker has also raised the demand to $5000 in Bitcoin per nation-state. Virtual currencies such as Bitcoin present significant challenges and has widespread financial implications. The malware was zipped and protected with a password. The affected hosts had executable files and also malicious artifacts. The malware dropped some items in the database. The malware also had to write privileges as it uploaded some files to the webserver (Johnson, Badger, Waltermire Snyder & Skorupka, 2016). The malware also retrieved some files from the server using the “GET” HTTP request. The file hash and requested passed onto the urls indicate a breach of security. Security Incident Report / SITREP #2017-Month-Report# Incident Detector’s Information Date/Time of Report 15/02/2018 1.40 p.m. First Name Amanda Last Name Smith OPDIV Avitel/Information Security Title/Position System Analyst Work Email Address [email protected] Contact Phone Numbers Work 321-527-4477 Government Mobile Government Pager
  • 3. Other Reported Incident Information Initial Report Filed With (Name, Organization) CISO, Avitel Analysts Start Date/Time 15/02/2018 Incident Location HR Office Incident Point of Contact (if different than above) Internal Ransomware Priority Level 2 Possible Violation of ISO/IEC 27002:2013 YES ISO/IEC 27002 Privacy Information - ISO 27000 (Country Privacy Act Law) The incident violated ISO 27000. The attack is an indication of failure in the state of the corporate network or existing security policies. The target suffered adversely by limiting the conference participants from accessing the network resources. The violation was intentional. Incident Type Alteration of information from the server. There are database queries indicating that the attack involved modifying some entries in the database. US-CERT Category Ransomware/ Unauthorized Access CERT Submission Number, where it exists The ransomware attack can be reported to the CCIRC Canadian Cyber Incidence Response Centre Team for an appropriate response to the incident. Description The ransomware makes it quite difficult to guess the password
  • 4. unless the conference participants pay the demanded amount. The Crypto-ransomware locks the system unless the system is unlocked via the password. 1. User asked to update links 2. User disables security controls 3. Malware opens a command prompt 4. The script uploads the files attackescript.txt and ransomware.exe to the WordPress site internal.nationstate.cyb670 5. Two files (attackscript.exe and ransomware.txt) were then downloaded to VM and the user files are then encrypted Additional Support Action Requested Detection of possible breach of internal control policies. Method Detected Log Reviews and Intrusion Detection Systems were used to identify the incident. Diagnostics and monitoring tools identified essential leads for the ransomware attack into the organization’s network. Number of Hosts Affected 120 OPDIV / Department Impact Low – Medium Information Sharing System Entire Network within the organization (Windows) Status Ongoing Attacking Computer(s) Information IP Address / Range Host Name Operating System Ports Targeted System Purpose 52.94.225.236
  • 5. Internal.nationstate.cyb670 Windows 7 443,80 Attack System Victim's Computer(s) Information IP Address / Range Host Name Operating System Ports Targeted System Purpose 172.21.21.232 N/A Windows7/Mac 80, 443 HR System Action Plan Action Description Control further attack by the m Requestor CISO Assignee Head, Information Security, CISO Time Frame 12 hours Status Ongoing
  • 6. Conclusion / Summary Entities Notified Departmental Head, CIO, CISO, IT Manager, VP Operations, and FVEY Resolution The information security team seeks to control the ransomware attack without making any payment in Bitcoin currency. Using Wireshark and other tools IT team was able to recover password and decrypt all files that were encrypted. Was also able to create Snort and Yara rules to help detect any other possible attacks like this on our system References Adamov, A., & Carlsson, A. (2017, September). The state of ransomware. Trends and mitigation techniques. In East-West Design & Test Symposium (EWDTS), 2017 IEEE (pp. 1-8). IEEE. Johnson, C., Badger, L., Waltermire, D., Snyder, J., & Skorupka, C. (2016). Guide to cyber threat information sharing. NIST special publication, 800, 150. SITREP # Classification - Viewable by X (Secret//REL TO FVEY) TREP #2017-Month-Report# Business Continuity Plan By
  • 7. Contents Justification for Plan 4 Roles and Responsibilities 5 Canadian Delegation Employee Responsibilities 5 Incident Response Team Responsibilities 6 Security Personnel Responsibilities 7 Critical Systems 8 Normal Operations 8 Critical Functions 9 Communication in Email Outage 10 Email Server 10 File Servers 11 Canadian Government-owned User devices 11 Event Reactions 12 Ransomware Infection 12 Dedicated Denial of Service 13 Rogue Access Points 13 Business Continuity Checklist 15 IR Response Flow DDOS 17 IR Response Flow Insider Threat 18 References 19 Justification for Plan In the event of a cyber event that drastically impacts the communication posture of the Canadian delegation is it necessary that a plan be developed to maintain critical functions of the delegation. Regardless of a dramatic cyber event, members of the delegation must be able to effectively communicate in at all times with each other and decision makers
  • 8. back inside the homeland. Failure to maintain this important function does not only jeopardizes the delegation located in the UK, but could also have serious consequences for the Canadian government as a whole. It is important to remember that adversaries may plot to disrupt communications for a variety of reasons ranging from a simple desire to embarrass the Canadian government to a goal of drastically infiltrating government communication systems to corrupt or exfiltrate data. In either event, efforts must be taken to prevent the adversary from realizing their goals while maintaining the functions of the government. In order to ensure that there is a roadmap in place to maintain critical functions of the mission a Business Continuity Plan (BCP) must be created. A BCP is not to be confused with a Disaster Recovery Plan, though the two are often used interchangeably. A BCP is a plan for how a business will maintain operations in the event of a disaster, while a Disaster Recovery Plan is an actual plan for disaster remediation (Kunthe, 2012). In this document aspects of each plan will be discussed, but the primary focus will be on the BCP portion of incident response. Failure to properly secure the government security functions could have dramatic consequences for communication systems back inside Canada if the failure allows malicious actors to leverage vulnerabilities within the delegation communication network to execute a lateral move into primary Canadian government systems. This outcome must be avoided at all costs and may require the temporary shutdown of some systems, critical and non-critical, until the possibility of increased malicious actor access is eliminated. This proposal will focus on plans to maintain the communication abilities of the delegation. For the purposes of this plan, communication includes not only person-to-person communication between delegates within the UK and/or back to the homeland, but also includes communication between various devices on the Canadian delegation network. To that end, the list of critical systems will encompass a wide array of devices and shall not be
  • 9. limited to only include end user communication devices. Roles and Responsibilities With any plan the roles and responsibilities of all stakeholders must be clearly defined prior to the triggering incident. The clear communication of these roles and responsibilities, and appropriate corresponding education, will be key to the swift and efficient restoration of functions. To that end, this document clearly defines the roles of users within the network and their responsibilities within the Business Continuity Plan.Canadian Delegation Employee Responsibilities The majority of users will fall within the basic end user role. These are individuals who do not have administrator access within the network and do not fill a security and/or digital forensic role. An example would be a diplomat within the delegation who uses the communication network, but does not perform any administration or configuration within the network. In the event of a critical event, it is the responsibility of these end users to maintain situational awareness and continue to adhere to previously outlined security practices and incorporate any additional guidance into their functions. These users must make every event to review bulletins put out by the Network Security Officer and/or other network security personnel. These users are not authorized to make any independent action in reaction to the event as doing so could exacerbate the situation (such as attempting to download a new anti-virus which is either disguised ransomware or conflicts with existing software). End users within the delegation, not network related, will make every effort to contact immediate supervisors to receive their operational status update. In the event that the delegation network is down, users are authorized to use personal devices (within reason) to receive the update. Note that classification levels and the appropriate protections are not waived in the event of a critical event and still must be observed.Incident Response Team Responsibilities Immediately upon confirmation that a large scale cyber incident
  • 10. is taking place the Incident Response Plan will be initiated and an Incident Response Team will be formed. The roles and responsibilities within the team were previously outlined within a previous document and will not be explored in full here. For the sake of this document, all personnel conducting network analysis, diagnosis, and correction will be referred to as “Network Analyst” though their official titles will vary. The Network Analyst will immediately upon discovery initiate a Situation Report (SITREP) to document the event and provide a document for other stakeholders to review. Documentation will continue throughout the entire course of the event. The Network Analyst will also contact appropriate security personnel to keep them appraised of the situation and if deemed necessary issue an alert to end-users providing situation awareness and/or event response guidance. Note that any notices to end-users will only include basic descriptions of the event, recommended or required end user actions, and/or estimated time to system restoration. Comprehensive reports of the situation will not be issued regarding the event until the full details are known and will be issued by security personnel. The analyst will also make attempt to safeguard any critical systems (to be described further in the document) which are jeopardized by the event and immediately take any available steps to safeguard the systems. Critical Systems must be identified prior to any event (a non-comprehensive list is included with this document), so as to expedite the process of securing the systems. In the event a critical system is damaged by the event the analyst will immediately begin remediation efforts to bring the system back online. If a non-critical system is also affected the critical system will always take precedence. The network analyst will document all discoveries and remediation steps (as previously stated). Additionally, the analyst will provide periodic updates to security personnel and senior leaders. Periodic updates to end users will be issued as necessary.Security Personnel Responsibilities Upon notification by the Incident Response Team, security
  • 11. personnel will open a file regarding the event and record any appropriate details. In the event of a ransomware attack information related to the ransom will be recorded and will document pertinent details to include the date/time ransom request was received, method of receipt (email, via malware infection, etc), amount of ransom, currency requested, recipient of funds (to include any banking information or crypto-currency wallets), and/or details failure to pay ransom. Note that this information should also have been recorded by the Incident Response Team. Once the information is documented security personnel will inform senior leaders of the situation from their perspective understanding that the Incident Response Team will also be reporting to senior leaders from their perspective. It may be deemed necessary for a bulletin to be put out regarding full details of the event. If that case security personnel will draft the bulletin, minus technical details, and provide it to affected end users. Note that ever effort must be made to not reveal information which could reveals sources and methods, sensitive areas which may have been affected, and/or sensitive details of ongoing investigations. The bulletin should include all details needed for end users to be informed of incident and implement identified methods to safeguard systems, but not provide critical information to adversaries who may be launching an operation. Critical Systems As previously stated, critical systems take precedent when resolving the cyber incident as they are necessary to maintaining the core functions of organization operations (Gibson, 2015). In order to ascertain what systems should be designated as mission critical a review of the core duties and requirements of the mission must be conducted. In this scenario, the delegation must be able to communicate effectively (to carry out normal mission and coordinate incident response), while also accessing documents of importance. Those documents remaining uncorrupted and complete is also key as delegates operating under corrupted or intentionally altered data could have drastic consequences to the government
  • 12. operations. To that end, communication system components and document storage and retrieval mechanisms are most certainly mission-critical systems.Normal Operations In the normal operation of the network users should be permitted to send and receive emails with attachments as usual. There is already a method in place to PKI protect emails in order for recipients to verify that messages were received from authorized individuals. There is also rudimentary malware scanning of documents. The program that updates the anti-virus software sends patches to user machines on a periodic basis, though it requires the machine to be powered on to receive the update. If the machine is powered down the update will not be received until the next patch push in which the machine is powered on. For users sharing files there are a few authorized means to send and/or receive files. As previously mentioned, users can send files via email attachments provided the classification of the document does not exceed the security requirements for this transmission method and the file is within the size restrictions for email attachments. Users can also send documents via a Dropbox type mechanism. In this method a user would navigate to the intended recipient’s dropbox and upload the file. Only the user who owns the dropbox (or those who have been given authorization by the owner), can download files stored there. This method is useful for files which exceed the size or classification restrictions for email. Finally, users can send each other the file path for the file so that the recipient can navigate to it within the network, provided they have the appropriate credentials. In regard to typical communication, users can communicate via email, chat, phone or conference. A review of organization communication trends revealed that email is the most popular communication method, followed by chat, and calling. Conferencing was the least utilized communication method. Unfortunately, users were not asked to specify between mobile text messaging and online chat.
  • 13. The entire system is backed up once a day to offsite servers in the event a system rollback is necessary. Unfortunately, any changes which were implemented after the last backup will be lost in the event of a rollback and may not be retrievable.Critical Functions In event of a crisis, Canadian officials are still obligated to carry out the functions of the delegation at the Summit. This includes relaying Canadian government objectives and positions to the international community. Additionally, security posture must be maintained to include the physical and cyber security of all Canadian owned and occupied locations. These are functions which cannot be dropped and as such all systems which facilitate the execution of these functions must be safeguarded prior to an event, and prioritized in the event an incident occurs. These systems would include communication systems and systems which facilitate file access/sharing.Communication in Email Outage In the event that an incident occurs which completely takes down all online communications methods users should be instructed to contact their immediate supervisor using a phone (assuming phone lines remain unaffected). Preferably the user would utilize a landline phone within the delegation spaces; however, if the option is not available the use of either government-issued or personally owned mobile devices are authorized so long as appropriate security practices are followed. Within the office spaces the user of short range radios can be used for communication by critical personnel. Precedence will be given to individuals actively working to resolve the communications issue.Email Server Given the fact that the majority of communication for the delegation occurs via email, in the event email servers remain minimally affected users will communicate via that medium. An email should be sent to all users on the network (PKI protected) informing them of the ongoing issues and providing any steps which must be taken. If email is affected then, if
  • 14. necessary, a determination will be made which will result in critical personnel accounts being recovered first. Network analysts will review the email servers to determine if there is any unauthorized access or if any user account displays anomalous behavior. Strange behavior on a user account could indicate unauthorized access which could potentially lead to further infections within the network. If such behavior is noted network administrators will make an executive decision as to whether or not to suspect account access in an abundance of caution. Additionally, analyst should review the possible benefits to restricting the account owners access to other areas in the network. If at all possible, history email messages should also be retrieved from backups and or user person PST files. Access to historic data could be critical to decisions which must be made by delegation employees.File Servers Following communication between users, maintaining the integrity and security of files on the network is also key. A file server is a server that allows for the sharing of files across different devices on a network (Brunelli, 2016). In the event of a crisis critical files have to be retrievable by authorized users. To that end, a periodic cloud backup of file servers should be conducted in order to ensure that an uncorrupted version of files is stored offsite in the event anything occurs to the onsite file server. Additionally, periodic reviews of user authorizations on the network, to include areas users are allowed to access should be reviewed. Following a crisis, the user access list currently in place should be compared to the documented list to determine if any changes have been implemented. Such a change could indicate malicious actor escalation of privileges. If such a change exists an authorization rollback should be conducted ahead of an examination of the discrepancy. If such a discrepancy does not exist then a review of files should be done to ascertain if documents stored on servers can be trusted. If widespread corruption or tampering is suspected then a rollback to the
  • 15. previously saved backup can be implemented.Canadian Government-owned User devices Mission critical end user devices should be completely backed upon a periodic basic on par with the backups of file servers. In the event of a crisis these machines can be rolled back to the last backup. Prior to rollback, the systems should be reviewed for unusual login activity or activity which is outside the normal parameters for the authorized userEvent Reactions Part of an effective Incident Response Plan, Business Continuity Plan, or Disaster Response Plan, is determining what action will be taking in response to any identified threat. To this end, a series of responses have been compiled in the event of common cyber threats are encountered by the delegation.Ransomware Infection In the event of a ransomware infection, as previously stated, all information related to the incident will be recorded. The information should immediately be reported to the Canadian Cyber Incident Response Centre (CCIRC) which is responsible for reducing cyber risks to Canadian critical infrastructure and systems (Department of Public Safety and Emergency Preparedness , 2016). However, no ransom will be paid. Ransomware launched against government systems has a far greater implication then when launched against civilian systems and has been compared to terrorism (Zurkus, 2016). The Canadian government will not negotiate with such actors nor encourage such behavior by paying a requested ransom. Ransomware attacks pose a few security threats. The primary threat, and the most noticeable, is the manipulation and/or corruption of files on a target system. This can be demonstrated by the encryption of files or the altering of programs on the machine to negatively affect its operation. Additionally, a user is unable to determine (without in-depth review of the network) if the malicious actor still has access to the victim machine. If so, then paying the ransom once could just result in another infection and follow-up ransom. Additionally, the ransom could be meant to distract from or hide other actions the malicious
  • 16. actor is taking on the machine. Users may be too concerned about the ransomware to notice that the actor is copying files out of the machine or changing account privileges. Dedicated Denial of Service In the event of a Dedicated Denial of Service (DDOS) attack the network administrator should carry out a few steps. First the router should be rate limited to protect the web server. Rate limiting is a process in which controls the amount of data which flows to and/or from a network (Key CDN, 2017). Filters can also be added to router security which informs the router to discard packs which originate from previously identified attack sources. Additionally, the router can be instructed to drop any packets which are malformed or duplicates. Finally, the network analysts can lower SYN, ICMP, and UDP flood drop thresholds (Rubens, 2016). In the event that this does not solve the issue, DDOS attacks can last for 24 hours, then network administrators could take other methods. One option is to block all communications originating from a specific country. For example, the network administrators notice that the majority of calls are coming from China, then connections to China could be blocked to allow other packets through. This is a temporary fix, as a savvy cyber actor will switch to using proxies from another nation. Network administrators could also whitelist any typical connections and block all others. This would allow users who habitually use a system to gain access but would prevent new or periodic users from doing so. In the event of an event that triggers the BCP, this may be the best option as critical personnel would most likely be within the habitual user set and included in the whitelist (Buntinx, 2017).Rogue Access Points In order to discover and eliminate rogue access points, network administrators should maintain a list (both digital and hard- copy) of authorized access points (AP) within the network. Authorized access points being wireless access points that are put in place by company IT personnel and are the only devices approved to allow users access to the WLAN. The need for the
  • 17. hard-copy list is a precaution in the event of a hack in which malicious actors attempt to alter the digital copy of the AP list. The list of authorized APs should document official devices by both media access control (MAC) address and Service Set Identifier (SSID). This dual listing is required because of the possible existence of multiple WLANs within the delegation network. In order to detect unauthorized AP, the Canadian delegation will employ both mobile and bundled wireless intrusion detection and prevention systems (WIDPS). These systems could detect APs which are not authorized to be on the network. Bundled WIDPS come bundled with an AP, so authorized APs can serve a dual purpose of providing access to the network and detecting unauthorized devices. Mobile WIDPS systems allow security personnel to walk the premises with the device and detect them on the go. This can be useful if an authorized AP is detected, but the exact physical location of the device is unknown. In this way, the bundled and mobile versions of the system can work in tandem, with one providing the initial detection and the second being used for location. Business Continuity Checklist · Validate the security incident · Begin incident response documentation/reporting process · Review network activity and/or log analysis to identify irregular data · Identify data which may have been compromised · In event of DDOS · Identify possible source of DDOS · Identify, if possible, the method of DDOS · Identify, if possible, the source of the breach
  • 18. · Assemble incident response team · Assign Incident Response Manager · Assign Security Analysts · Assign Security Researchers · Identify additional internal and external stakeholders · Coordinate response communication workflow · Determine status and scope of breach · Ensure all portions of investigation and findings are documented · Ensure preservation of all evidence discovered · Determine if the breach is ongoing or if it is post-breach · Identify all effected machines, data, or network components · If breach is ongoing immediately take actions to prevent further data loss · Block unauthorized access · If necessary take isolate affected portions of network · If necessary shutdown and/or remove affected network components · If criminal activity is suspected notify law enforcement · Take remediation efforts · Take steps to remove any malicious files that may be present on affected machines · In event of DDOS · Take DDOS remediation steps · If necessary create whitelist of routine network activity · Carry out data recovery · Utilize system backups · Hash comparison should be utilized to ensure data remains uncorrupted · Update relevant security patches · Update anti-viruses, IDS, IPS, and other software to detect identified malicious activity to prevent reoccurrence · Conduct interviews with key personnel · If necessary, have Human Resources attend interviews · Above is mandatory in case of suspected insider threat · If criminal activity is suspected contact local law enforcement
  • 19. prior to interview · Above is mandatory in case of suspected insider threat · Inform stakeholders of findings of breach investigation · Internal stakeholders should be informed first · Notify external stakeholders if deemed necessary Business Continuity Plan 1 Business Continuity Plan 18 IR Response Flow DDOS Initial Detector Report Security Incident Incident Response Team Manager Inform Delegation of findings Yes/no Criminal act suspected? Assemble Analysts and Researchers Security Analyst Implement DDOS remediation Report findings to delegation Investigate technical details of incident Security Researcher Report findings to delegation
  • 20. Research incident info available openly General Counsel Inform parties of legalities, review statements Law Enforcement Conduct and oversee criminal investigation Canadian Delegation Inform external stakeholders of situation IR Response Flow Insider Threat Initial Detector Report Security Incident Incident Response Team Manager Inform Delegation of findings Yes/no Criminal act suspected? Assemble Analysts and Researchers Security Analyst Report findings to delegation Investigate technical details of incident Security Researcher Research incident info available openly Report findings to delegation
  • 21. Human Resources yes Remove Employee access Wrong doing suspected? Review Employee access Create Employee incident file General Counsel Inform parties of legalities, review statements Law Enforcement Conduct and oversee criminal investigation Canadian Delegation Inform external stakeholders of situation References Brunelli, M. (2016, June 8). What's the difference between a file server and a NAS device? Retrieved from Carbonite: https://www.carbonite.com/blog/article/2016/06/whats-the- difference-between-a-file-server-and-a-nas-device/ Buntinx, J. (2017, January 31). How Do I Stop A DDoS Attack? Retrieved from The Merkle: https://themerkle.com/how-do-i- stop-a-ddos-attack/ Department of Public Safety and Emergency Preparedness . (2016, May 4). Canadian Cyber Incident Response Centre (CCIRC). Retrieved from Department of Public Safety and Emergency Preparedness : https://www.publicsafety.gc.ca/cnt/ntnl-scrt/cbr-scrt/ccirc-ccric- en.aspx
  • 22. Gibson, D. (2015). Managing Risk in Information Systems. Burlington, MA: Jones & Bartlett Learning. Key CDN. (2017, April 26). What Is Rate Limiting? . Retrieved from Key CDN: https://www.keycdn.com/support/rate-limiting/ Kunthe, C. (2012, October 12). Difference between BCP and DR. Retrieved from ISACA: http://www.isaca.org/Groups/Professional-English/business- continuity-disaster-recovery- planning/Pages/ViewDiscussion.aspx?PostID=72 Rubens, P. (2016, January 26). 6 Tips for Fighting DDoS Attacks. Retrieved from eSecurity Planet: https://www.esecurityplanet.com/network-security/5-tips-for- fighting-ddos-attacks.html Zurkus, K. (2016, July 11). Why you shouldn't pay the ransomware fee. Retrieved from CSO Online: https://www.csoonline.com/article/3092278/backup- recovery/why-you-shouldnt-pay-the-ransomware-fee.html Scenario Before the summit, each nation set up its own secure comms network. As summit events began, your team responded to anomalous network activity that was detected on your agency's server. Now, to make matters worse, the next day you awaken to the news that summit attendees are unable to get access to the confidential summit data needed for the conference. All of the computer screens show a pop-up message that says: "Your Computer has been involved in Child Porn Activity!!! and has been locked down by the FBI and the Justice Department. Unless you pay the sum of $500 (FIVE HUNDRED DOLLARS)—in Bitcoin you will be arrested immediately! You have 48 hours to pay up via email - [email protected]" Your CISO has called an emergency meeting with your team. She begins to speak to the group. "We've just been hit with the Reveton ransom attack, which
  • 23. pretends to be a warning from a country's law enforcement agency. It locks you out of your PC and threatens criminal proceedings within 48 hours based upon very serious offenses. The message informs you that you can avoid prosecution by paying a fine to the attackers via Bitcoin. Based on the time of the incident, we believe that a single threat actor or group is responsible. This person or group is still unidentified." The CISO continues to brief you on the attack, confirming that no further information is known about the file, permissions, or tools used. Currently, systems show no signs of infection or additional malicious indicators. The attendees at the summit are divided on what should be done. Some of them want to pay the money—it's a small sum to be holding up the proceedings. However, cyber insiders know that once you pay a ransom, you set a precedent for further attacks since you appear vulnerable. In addition, you want to know how the attackers were able to infiltrate the system and plant the malware. What current protections are in place for systems at the summit? What methods and procedures are your team employing in response to the current attack? What is the plan if protections fall short? These are the questions pouring in from leadership, down to your CISO—and now, to you. Your CISO continues: "I need your team to provide a series of reports that will track this incident from start to recovery. Risk management briefings. Forensic reports. Situational reports. I need it all. They'll all come in handy when it's time to debrief our nation's leaders." Unit III Project: Improving Organizational Culture: Acceptance of Religion and Orientation Fig Technologies has identified concerns at several of their offices globally. Division has been noted on key teams based upon religion and sexual orientation. Several team members have complained that the non-Christian holidays and
  • 24. LGBT celebrations are not recognized by the established company celebrations or paid time off for observance. There have been complaints with regard to coworkers making harassing comments to this effect. The Executive Leadership Council has asked for you to draft an assessment of these concerns and then to propose a plan of action for addressing these concerns. Further, include a preliminary draft of policy to be included as an addendum to the organizational policy on discrimination and harassment. In your report, be sure to address the following: Compare the impact of different religious beliefs and practices (choose three to four different religions) and how these affect the organizational culture, and describe how your new plan and policy will improve organizational culture through inclusion of different religious beliefs and practices. Compare how belief systems of different gender orientations and sexual orientations may impact the organizational culture, and describe the effects of discrimination against any of these. In your plan of action, address how inclusion and assimilation of different orientations will improve organizational culture. Support your recommendation through the use of at least two sources. Content should be two to three pages in length. Length does not include an assessment tool, if used, though it may be added as an addendum (recommended, not required). All sources used, including the textbook, must be referenced; paraphrased and quoted material must have accompanying citations. All references and citations used must be in APA style.