Paper Writing Services if possible, source code of attacks that are known to exploit ts weakness and break down the code. List known services on
Abstract |
---|
you through your analysis. To complete the FAIR document: · Step 1: Asset at Risk will be the organization’s primary e-commerce web server. · Step 2: You will provide ts answer based on your research. · Step 3: You will provide ts answer based on your research; however, keep in mind how many times per day ts is |
Your team currently works as a research wing for a standard SOC (Security Operations Center). The SOC keeps analytics on the current trends witn the network. Your team will be assigned a current issue that has been seen at the border of the network, trying to infiltrate the organizations network/systems. Upon being assigned your item, it will be your job to go out and search OSINT (Open Source Intelligence) for more information on the attack being observed. Ts could be a single port number(Port22), a series of attacks that has been identified, or an IP address to research and identify. Your deliverable will be a 5 page APA style research report with your findings. Discover current attacks being performed through ts port, or current state of a known scanning suite. Find sources, if possible, source code of attacks that are known to exploit ts weakness and break down the code. List known services on the affected ports that are associated and current attacks being performed on these services (list any CVE findings and briefly list and explain). Look at SNORT rules that watch for these attacks and list that SID. Finally, to wrap-up your research, present the current risk level associated with ts threat. Use the FAIR methodology to derive your threat assessment. The attached FAIR PDF will walk you through your analysis. To complete the FAIR document: · Step 1: Asset at Risk will be the organization’s primary e-commerce web server. · Step 2: You will provide ts answer based on your research. · Step 3: You will provide ts answer based on your research; however, keep in mind how many times per day ts is scanning the network, wch will be given to your when you receive your topic. · Step 4: You will provide ts answer based on your research. · Step 5: Assume the e-Commerce server is fully up-to-date and running the following base software: Red Hat Linux, Apache, MariaDB, Drupal, PHP and is hardened based on base NIST recommendations for operations. · Step 6-7: Calculate · Step 8: Assume Moderate · Step 9: Assume Moderate
Sample references |
---|
|
Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.
Click Here to Make an Order Click Here to Hire a Writer