Investigate Software Insurance, Supply Chain Risks, and Software

In this Project, your team (Australia) is focused on preventing future incursions into the network and developing a business continuity plan to be deployed in case a breach occurs. There are 14 steps to be completed by the team, with the project culminating in the production of a video and forensics report that summarizes the lessons learned from the recent network breach.

This project should take 14 days to complete. After reading the scenario below, proceed to Step 1 where you will establish your team agreement plan. Image of computer server room with many servers functioning. Lights go out in the room, and then lights on servers go dark and room is plunged into darkness. Before the summit, each nation set up its own secure comms network. As summit events began, your team responded to anomalous network activity that was detected on your agency’s server. Now, to make matters worse, the next day you awaken to the news that summit attendees are unable to get access to the confidential summit data needed for the conference. All of the computer screens show a pop-up message that says: “Your Computer has been involved in Child Porn Activity!!! and has been locked down by the FBI and the Justice Department. Unless you pay the sum of $500 (FIVE HUNDRED DOLLARS)—in Bitcoin you will be arrested immediately! You have 48 hours to pay up via email – fines@fbi.gov.” Your CISO has called an emergency meeting with your team. She begins to speak to the group. “We’ve just been hit with the Reveton ransom attack, which pretends to be a warning from a country’s law enforcement agency. It locks you out of your PC and threatens criminal proceedings within 48 hours based upon very serious offenses. The message informs you that you can avoid prosecution by paying a fine to the attackers via Bitcoin.

Based on the time of the incident, we believe that a single threat actor or group is responsible. This person or group is still unidentified.” The CISO continues to brief you on the attack, confirming that no further information is known about the file, permissions, or tools used. Currently, systems show no signs of infection or additional malicious indicators. The attendees at the summit are divided on what should be done. Some of them want to pay the money—it’s a small sum to be holding up the proceedings. However, cyber insiders know that once you pay a ransom, you set a precedent for further attacks since you appear vulnerable. In addition, you want to know how the attackers were able to infiltrate the system and plant the malware. What current protections are in place for systems at the summit? What methods and procedures are your team employing in response to the current attack? What is the plan if protections fall short? These are the questions pouring in from leadership, down to your CISO—and now, to you. Your CISO continues: “I need your team to provide a series of reports that will track this incident from start to recovery. Risk management briefings. Forensic reports. Situational reports. I need it all. They’ll all come in handy when it’s time to debrief our nation’s leaders.”

#Investigate #Software #Insurance #Supply #Chain #Risks #Software

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

During the world wars of the twentieth century, Russia gained

  During the world wars of the twentieth century, Russia gained a reputation for being absolutely ruthless towards its own people.   Russian soldiers would routinely burn villages and crops and shoot livestock in order to leave nothing for enemy soldiers to live on – but this left their own civilians

Strange Case of Dr. Jekyll and Mr. Hyde.

 Read over Chapters 1-6 of Strange Case of Dr. Jekyll and Mr. Hyde. A free link to the book is provided below. Then follow the directions listed below and attached materials to complete the assignment. http://www.gutenberg.org/ebooks/43?msg=welcome_stranger INSTRUCTIONS: Imagine that you’re working at a company that wants to publish a new

• Explain the doctrine of employment-at-will, and its relationship with

  • Explain the doctrine of employment-at-will, and its relationship with wrongful discharge. Several steps ensure the successful development and implementation of policies and procedures. Identify the process. What must an organization do in order to become an “employer of choice?” • What would be typically included in an “expectations of standards

Ethical Argumentental essay

– title is : Should education be free for Florida public universities? – thesis: The education should be free for students in public universities located in florida. audience : government/people who deal with the education system – THE PRIMARY ETHICAL PRINCIPAL BEING USED IS CONSEQUENTIAL. BUT THE ESSAY NEEDS TO HAVE

Data, Info, Knowledge Paper

Using the readings from Week 2, how would you define the key concepts of data, information, and knowledge. Your paper should compare and contrast the characteristics of the terms as described in the textbook and the Zins (2007) article. Select and present the 3 – 4 most useful or understandable

This assignment builds on the Topic 4 CLC assignment. Utilize

This assignment builds on the Topic 4 CLC assignment. Utilize the team charter from the previous assignment in this CLC assignment. Ensuring appropriate communication in teams is essential. The dynamics of a global economy has increased the complexity of both team operations and project success. Planning for communication creates a

Instructions One of the reasons that the statute of frauds

Instructions One of the reasons that the statute of frauds requires that certain contracts be in writing is because proof of the contract (and the terms within) is easier than if the contract is verbal, but written contracts are sometimes several pages long and contain legal terms that may mean

DHA 715 University of Phoenix Health & Medical Paper Nursing Assignment Help

Expert Solution Preview Introduction: As a medical professor, my role is to design and conduct lectures, evaluate student performance, and provide feedback through examinations and assignments. This involves creating engaging and comprehensive assignments that challenge medical college students and assess their understanding of the content. I strive to ensure that

Name three possible areas of focus in schools for an

Name three possible areas of focus in schools for an action research proposal in order to generate a variety of topics to consider for all course participants.  Reflect on why one of those focus areas is of particular interest to you.  ANSWER THE ABOVE DISCUSSION QUESTION THEN REPLY TO MY

After you have made any necessary revisions, submit your final

After you have made any necessary revisions, submit your final single-page version in M12 – Due!, by the date listed in the course outline and also on the Canvas calendar. You have read about resumes in your text and postings provided by the instructor. Continue with more research of your own.  For interior design

An interesting topic related to this week’s material is the

  An interesting topic related to this week’s material is the topic of Nanotechnology. Nanotechnology has been around for a while but there have been lot of amazing advances recently that I wanted to make you all aware of!  Read over the info in the chapter on Nanotechnology and then

Select two discussion questions from the chapter below and post

 Select two discussion questions from the chapter below and post your response addressing the two questions in one posting response (be sure to identify the questions you selected in your response).     Chapter 7- The Courts and Legal Professionals- Select Two Questions Below: 1. What is the difference between

Based on the theory of attachment, what behaviors would a

 Based on the theory of attachment, what behaviors would a nurse attempt to stimulate when working with parent to promote health attachment?   Please use APA 7th Edition. Minimum 450 words, use in text citation, with 2 scholarly references (Within 5 years).  Also include 2 replies to the same discussion post

Inner Office Memo Assignment Write a memo To: new office

  Inner Office Memo Assignment Write a memo To:  new office hires From:  your name Date:  due date Subject:    Importance of good communication skills and the amount of time spent in all forms of  communication The contents of this document is to be a discussion about the average amount of

· Define evidence-based practice in your own words. · Explain

   · Define evidence-based practice in your own words. · Explain how you can improve your practice and achieve your professional goals by reading articles about practice or attending trainings and continuing education. · Explain how you can improve practice by evaluating the outcomes of practice. o Provide an example

The Big Picture, Tracking the Macroeconomy General Instructions: Download your

  The Big Picture, Tracking the Macroeconomy  General Instructions: Download your assignment template document from Course Documents. You will find this in the “Course Resources” module in the left navigation area which is located under your Digital Book. Select the “Load More” button at the bottom of the list to