Computer Science Homework Help

Georgia Aviation and Technical College Security Assessment

 

Transcript

You are part of a collaborative team that was created to address cyber threats and exploitation of US financial systems’ critical infrastructure. Your team has been assembled by the White House cyber national security staff to provide situational awareness about a current network breach and cyberattack against several financial service institutions.

Your team consists of four roles:

  • A representative from the financial services sector, who has discovered the network breach and the cyber attacks. These attacks include distributed denial-of-service attacks, DDOS, web defacements, sensitive data exfiltration, and other attack vectors typical of this nation-state actor.
  • A representative from law enforcement, who has provided additional evidence of network attacks found using network defense tools.
  • A representative from the intelligence agency, who has identified the nation-state actor from numerous public and government-provided threat intelligence reports. This representative will provide threat intelligence on the tools, techniques, and procedures of this nation-state actor.
  • A representative from the Department of Homeland Security, who will provide the risk, response, and recovery actions taken as a result of this cyber threat.

Your team will have to provide education and security awareness to the financial services sector about the threats,

vulnerabilities, risks, and risk mitigation and remediation procedures to be implemented to maintain a robust security posture.

Finally, your team will take the lessons learned from this cyber incident and share that knowledge with the rest of the cyber threat analysis community. At the end of the response to this cyber incident, your team will provide two deliverables.

The United States’ critical infrastructure—power, water, oil and natural gas, military systems, financial systems—have become the target of cyber and physical attacks as more critical infrastructure systems are integrated with the internet and other digital controls systems. The lesson learned in mitigating and defending against cyberattacks is that no entity can prevent or resolve cyberattacks on its own. Collaboration and information sharing are key for success and survival.

This is a group exercise, representing collaboration across all sectors to support and defend US critical infrastructure. In the working world, a team like this would include agencies, industrial partners, and private sector corporations. Each organization has different strengths and skills, different access to information, and different authorities to report to. When the sectors work together and share resources and skills, the result is that everyone benefits from the defense and protection of US IT infrastructure.

In your teams, you can model the same collaboration, leveraging each other’s expertise, sharing each other’s knowledge, and teaching each other. This will include providing contributions specific to your role in the scenario:

  • Financial Services Representative, special task in Step 3
  • Law Enforcement Representative, special task in Step 4
  • Intelligence Agency Representative, special task in Step 5
  • Homeland Security Representative, special task in Step 6

There are seven steps that will help you create your final deliverables. The deliverables for this project are as follows:

  1. Security Assessment Report (SAR): This report should be a 14- to 15-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
  2. After Action Report (AAR): This report should be a 10- to 15-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
  3. Presentation: This should be a five- to eight-slide PowerPoint presentation for executives, along with a narrated or in-class presentation, summarizing your SAR and AAR repor
  4. Start Here
  5. Step 1: Establish Roles
  6. Step 2: Assess Suspicious Activity
  7. Step 3: The Financial Sector
  8. Step 4: Law Enforcement
  9. Step 5: The Intelligence Community
  10. Step 6: Homeland Security
  11. Step 7: The SAR and AAR