paper

You are currently working in a research wing for a standard SOC (Security Operations Center).  The SOC keeps analytics on the current trends within the network.  Your team will be assigned a current issue that has been seen at the border of the network, trying to infiltrate the organizations network/systems.  Upon being assigned your item, it will be your job to go out and search OSINT (Open Source Intelligence) for more information on the attack being observed.  This could be a single port number, a series of attacks that has been identified, or an IP address to research and identify; your professor will assign this.  Your deliverable will be a 5 page APA style research report with your findings.  Discover current attacks being performed through this port, or current state of a known scanning suite.  Find sources, if possible, source code of attacks that are known to exploit this weakness and break down the code.  List known services on the affected ports that are associated and current attacks being performed on these services (list any CVE findings and briefly list and explain).  Look at SNORT rules that watch for these attacks and list that SID.
Finally, to wrap-up your research, present the current risk level associated with this threat.  Use the FAIR methodology to derive your threat assessment.  The attached FAIR PDF will walk you through your analysis.  To complete the FAIR document:
Step 1:  Asset at Risk will be the organization’s primary e-commerce web server.
Step 2:  You will provide this answer based on your research.
Step 3:  You will provide this answer based on your research; however, keep in mind how many times per day this is scanning the network, which will be given to your when you receive your topic.
Step 4:  You will provide this answer based on your research.
Step 5:  Assume the e-Commerce server is fully up-to-date and running the following base software:  Red Hat Linux, Apache, MariaDB, Drupal, PHP and is hardened based on base NIST recommendations for operations.
Step 6-7:  Calculate
Step 8:  Assume Moderate
Step 9:  Assume Moderate
Step 10:  Calculate and create this chart in excel with the appropriate item highlighted.  Include this chart in your paper and presentation.

You can choose 1 of the following topics:
China Chopper Scans
Peppa Pig Scans
WannaCry
Port 3389
Port 9530
C99 Web Shell
Petya and PetyaWrap
Wicked (Mirai Variant)
Miori (Mirai Variant)

For this week, you will be working through the steps of an affinity diagram.  Choose one of the following problem statements:

Power outages cause downtime
Malicious code causes systems to crash and production loss
Hardware failure causes data loss on the database server

Once you pick a statement, generate ideas and brainstorm based on this article: 
https://asq.org/quality-resources/affinity
For your peer responses, pick 2 and group the ideas based on step 3.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our Guarantees

Money-back Guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism Guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision Policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy Policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation Guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more