1. Homepage
  2. Exam
  3. [2020] COMPSCI5077 Enterprise Cyber Security (M) - Question 2 Cyber Attack and Protection

[2020] COMPSCI5077 Enterprise Cyber Security (M) - Question 2 Cyber Attack and Protection

This question has been solved
Engage in a Conversation

CourseNana.COM

2. The Lena Corporation design various Image Processing Units (IPUs) for portable devices, such as smartphones and tablets. The company remains competitive due to a number of valuable trade secrets related to the design of its IPUs. However, many of these trade secrets have now been leaked to the public in a suspected cyber-attack. CourseNana.COM

The management team are concerned that attackers have intruded into company systems that were perceived as secure from such threats. The management team have requested Simon, Stallman and Stroustrup to investigate and to determine the anatomy of the suspected cyber-attack as well as suggest appropriate defences. CourseNana.COM

a. CourseNana.COM

Simon, Stallman and Stroustrup have reviewed the log of security incidents, that have been reported in the past 12 months within the company. The pair have already determined several relevant incidents: CourseNana.COM

  • §  Two removable media drives (USB memory drives) with the label ‘HR department’ written on them have been discovered in the toilets in separate site offices. The USB memory drives contain various Microsoft Excel files.
  • §  36 suspicious emails have been reported within the organisation, specifically in the administration office. Each email has been structured to appear from the immediate superior to the recipient, such as their line manager or team leader.
  • §  14 suspicious attachments, specifically Microsoft Excel files, that appear relevant to the recipient’s role and benign, but contain a malicious payload. An example would be a financial analyst receiving a spreadsheet labelled ‘Annual Budget’.
  • §  Remote administration tools have been located on various employee systems, that were not present at the previous inspection.
  • §  Several employees report receiving suspicious friend requests and messages on social networking services from profiles masquerading as colleagues.

The trio agree that the identified incidents alone are not sufficient to gain insight into the anatomy of the cyber-attack. The trio propose using an approach to better understand the cyber-attack, but cannot agree on an optimal approach. CourseNana.COM

Simon proposes using Attack Trees, Stallman suggests the Cyber Kill Chain approach, while Stroustrup advocates for the STRIDE approach. CourseNana.COM

Appraise each of the proposed approaches from Simon, Stallman and Stroustrup in the given context. Argue for the optimal approach and formulate the anatomy of the cyber-attack in the given context. CourseNana.COM

(approximately 750 words) CourseNana.COM

  CourseNana.COM

Get the Solution to This Question

WeChat (微信) WeChat (微信)
Whatsapp WhatsApp
COMPSCI5077代写,Glasgow代写,Enterprise Cyber Security代写,Exam代写,COMPSCI5077代编,Glasgow代编,Enterprise Cyber Security代编,Exam代编,COMPSCI5077代考,Glasgow代考,Enterprise Cyber Security代考,Exam代考,COMPSCI5077help,Glasgowhelp,Enterprise Cyber Securityhelp,Examhelp,COMPSCI5077作业代写,Glasgow作业代写,Enterprise Cyber Security作业代写,Exam作业代写,COMPSCI5077编程代写,Glasgow编程代写,Enterprise Cyber Security编程代写,Exam编程代写,COMPSCI5077programming help,Glasgowprogramming help,Enterprise Cyber Securityprogramming help,Examprogramming help,COMPSCI5077assignment help,Glasgowassignment help,Enterprise Cyber Securityassignment help,Examassignment help,COMPSCI5077solution,Glasgowsolution,Enterprise Cyber Securitysolution,Examsolution,