Culminating AssignmentConcept Paper: Red Team Assessment Strategies in CybersecurityDirections:1. Read

 Culminating AssignmentConcept Paper:   Red Team Assessment Strategies in CybersecurityDirections:1.  Read the scenario, access the resources, and review the rubric below to help you understand the assignment.  The final paper will be due in Week 7.  You should begin working on the assignment right away, and you will share your progress in Week 6.  2.  Write a paper that follows the listed parameters, addresses the important concepts, and includes the required sections:Parameters: 

  • Ranges from 4 – 5 double-spaced pages and use IEEE formatting style. 
  • Uses Times New Roman font (size 12), with one-inch margins on all sides.
  • Includes at least three (3) quality resources to support your ideas.  You may use the resources provided and/or others of your choosing.  They must be cited appropriately.

Important Concepts:

  • Compare and contrast red teaming versus penetration testing based on the presented case.
  • Describe the approach to red team assessment.
  • Discuss how different types of organizations are utilizing red teaming.

Required Sections:

  • Title 
  • Introduction:  Clear description of the topic, including a summary of what is already known about that topic.
  • Body: 
    • Address important concepts.  
    • What evidence do you have to support your topic?  
  • Conclusion:  Why is it important to study this topic? Why is this worth investigating further?
  • Reference Page:  IEEE style  

3.  Your paper should enable a casual reader to understand this topic and its importance.  Please make sure the following outcomes are addressed within your paper:

  • Explain the common tools and tactics used in red teaming.
  • Use technology and information resources to research the evolution of red team assessment techniques.

Due:  In week 7 with the specific date posted in Blackboard.  You will be directed to complete and share parts of this assignment in Week 6.  Scenario:  A large multinational fintech wanted to conduct a Red Team Assessment to evaluate its ability to detect and respond to a real-world cybersecurity attack.The read team started their assessment by sending a phishing email that persuaded the victim to log in to a fake portal hosted on a server to obtain valid credentials. While a small number of users clicked on the malicious link sent in the email, none of them submitted their credentials. This could be attributed to the regular social engineering tests and security awareness training delivered to staff.After the failed phishing campaign, the team went back to the drawing board to come up with a new plan of attack.  Reviewing the company’s Twitter account, the team discovered that they host a monthly community event at one of their buildings. The team registered for the event to deploy a purpose-built device into their internal network. The device will allow the team to gain remote access to the network using either an independent wireless connection or a 3G/4G mobile connection.Two members of the red team attended the event. They managed to slip away from the main event to see if there were any unlocked offices or conference rooms. Once a room had been found. One team member acted as a lookout while the other plugged the device and checked that he could reach it from his mobile phone. Shortly afterward the testers left the event and joined the rest of the team in a coffee shop down the road.  Once connected to the network, the team started mapping the internal network and gathering additional information. Over the next couple of days, the team captured several password hashes, which were achieved by exploiting a weakness in Windows’ broadcast protocols. However, users appeared to be using strong complex passwords and it was not possible to crack the hashes to recover clear-text passwords. The team then decided to relay a captured hash belonging to a user and use it to log in into a workstation where they had local administrative privileges. This allowed them to extract the clear-text password of the currently logged-in users from memory.Resources to help you complete this assignment:

Rubric:Points: Assignment: Red Team Assessment Strategies in CybersecurityCriteriaNeeds ImprovementBelow 60-70 FFair70-79 CProficient80-89 BExemplary90-100 A1. Compare and contrast red teaming versus penetration testing based on the presented case. Met outcomes.Weight: 25%Did not submit or incompletely compared and contrasted red teaming versus penetration testing based on the presented case.  Did not meet outcomes.Partially compared and contrasted red teaming versus penetration testing based on the presented case.  Partially met outcomes.Satisfactorily compared and contrasted red teaming versus penetration testing based on the presented case.  Met outcomes.Thoroughly compared and contrasted red teaming versus penetration testing based on the presented case. Exceeded outcomes.2. Describe the approach to red team assessment.Weight: 30%Did not submit or incompletely described the approach to red team assessment.Partially described the approach to red team assessment.Satisfactorily described the approach to red team assessment.Thoroughly described the approach to red team assessment.3. Discuss how different types of organizations are utilizing red teaming.Weight: 30%Did not submit or incompletely discussed how different types of organizations are utilizing red teaming.Partially discussed how different types of organizations are utilizing red teaming.Satisfactorily discussed how different types of organizations are utilizing red teaming.Thoroughly discussed how different types of organizations are utilizing red teaming.5. 3 ReferencesWeight: 5%No references were provided.Does not meet the required number of references; some or all references poor quality choices.Meets the number of required references; all references high-quality choices.Exceeds the number of required references; all references high-quality choices.6. Clarity, writing mechanics,  formatting.Weight: 10%More than 6 errors present5-6 errors present3-4 errors present0-2 errors present 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Part 1: Dividend Analysis (two to three paragraphs): Create a

  Part 1: Dividend Analysis (two to three paragraphs): Create a table that illustrates the annual dividends per share paid by your selected company (VERIZON) over the past 10 years. If the company has not paid dividends for 10 years, include as many years as available. Calculate the growth in annual dividends

It is critical that financial leaders have a firm grasp

It is critical that financial leaders have a firm grasp of the organization’s receivables, because roughly 75 percent of a provider’s current assets is tied up in AR (Zelman, McCue, Glick, & Thomas, 2014). In addition to your text (linked in Resources), select three journal articles to support your conclusions.

Globalization gets you far – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

In this final part of our discussion board I would

In this final part of our discussion board I would like you to start by rereading the posts by your classmates to Discussion Board Part 2. I would like you to write around 250-300 words here where you summarize (a) what you learned from the discussion boards and (b) what

Values can be found in the individual, ethics in groups

  Values can be found in the individual, ethics in groups or organizations, and laws in larger societies.  What other differences are there between values, ethics, and laws? Why are there ethics for counselors? Depending on your program of study, which codes of ethics will you abide by and why?

An individual written report (using Microsoft Word, e.g. doc) in

An individual written report (using Microsoft Word, e.g. doc) in which you must: • identify and discuss the criteria1 [a minimum of 3] that academics and others2 use to assess the relative success3 (or health) of a family business. • discuss and justify how well your family business, or one

Are companies supposed to be totally honest with their customers?

The research paper should be typed, double-spaced, using Times New Roman 12-point font, and 1-inch margins on all sides. A cover sheet should be used to identify the title of the paper and the name of the student. A separate “Works Cited” page should be included to identify the bibliography

Morrissey v. Brewer (1972) Link (Links to an external site.)

  Morrissey v. Brewer (1972) Link (Links to an external site.) Gagnon v. Scarpelli (1973) Link (Links to an external site.) You should summarize the cases and explain the impact they have on the Criminal Justice System.  Do you agree with the outcome of the cases? Do you think the impact they

nit 2 Assignment: Competitive Advantage and the Value Chain The

nit 2 Assignment: Competitive Advantage and the Value Chain The purpose of this assignment is to confirm your understanding of the direct correlation between an effective value chain and a firm’s competitive advantage by examining the relationship between customer delight, profitability, competitive advantage, and effective value chain management. Directions Use

POWERPOINT presentation explaining the key components of your research proposal.  Include the following points: A brief introduction, including your

POWERPOINT presentation explaining the key components of your research proposal.  Include the following points: A brief introduction, including your research questions and hypothesis The significance to nursing An overview of your literature review A summary of your design and methodology Include: Your sample procedures Your data collection procedures An overview

consider how the categories of “youth” and “childhood” vary over

  consider how the categories of “youth” and “childhood” vary over time and across cultures. To do this, you will answer a series of questions regarding photos you select of the “jobs” of young people in three different contexts: (1) 19th and early 20th-century America; (2) Present day America; and

write a Journal Entry reflecting on your clinical strengths and

  write a Journal Entry reflecting on your clinical strengths and opportunities for improvement. Journal Entry (2–3 pages):  Based on your experience, Describe an interesting case or a case that you have never seen before. Explain what you found challenging. Explain what you would do differently from your Preceptor. Explain

Go online and select an open access article such as

Go online and select an open access article such as in the Journal of Business Research, the Westcliff International Journal of Applied Research, Springer Business Research Journal, MDPI, and BRQ Business Research Quarterly and select an article published within the past two years. Select an article of interest to you

STRATEGIC STAFFING AT CHERN’S: A CASE STUDY

Chapter 5: Conduct a transition analysis. Summarize the internal labor market and highlight any trends or forecast gaps. Based on the transition probability matrix, calculate how many new full-time sales associates should be hired externally. Calculate the number of applicants needed to acquire the number of new hires you forecast.

The United Nations (UN) has hired you as a consultant,

  The United Nations (UN) has hired you as a consultant, your task is to assess the impact that global warming is expected to have on population growth and the ability of societies in the developing world to ensure the adequate security of their food supplies. Case Assessment Summary (see