Culminating AssignmentConcept Paper: Red Team Assessment Strategies in CybersecurityDirections:1. Read

 Culminating AssignmentConcept Paper:   Red Team Assessment Strategies in CybersecurityDirections:1.  Read the scenario, access the resources, and review the rubric below to help you understand the assignment.  The final paper will be due in Week 7.  You should begin working on the assignment right away, and you will share your progress in Week 6.  2.  Write a paper that follows the listed parameters, addresses the important concepts, and includes the required sections:Parameters: 

  • Ranges from 4 – 5 double-spaced pages and use IEEE formatting style. 
  • Uses Times New Roman font (size 12), with one-inch margins on all sides.
  • Includes at least three (3) quality resources to support your ideas.  You may use the resources provided and/or others of your choosing.  They must be cited appropriately.

Important Concepts:

  • Compare and contrast red teaming versus penetration testing based on the presented case.
  • Describe the approach to red team assessment.
  • Discuss how different types of organizations are utilizing red teaming.

Required Sections:

  • Title 
  • Introduction:  Clear description of the topic, including a summary of what is already known about that topic.
  • Body: 
    • Address important concepts.  
    • What evidence do you have to support your topic?  
  • Conclusion:  Why is it important to study this topic? Why is this worth investigating further?
  • Reference Page:  IEEE style  

3.  Your paper should enable a casual reader to understand this topic and its importance.  Please make sure the following outcomes are addressed within your paper:

  • Explain the common tools and tactics used in red teaming.
  • Use technology and information resources to research the evolution of red team assessment techniques.

Due:  In week 7 with the specific date posted in Blackboard.  You will be directed to complete and share parts of this assignment in Week 6.  Scenario:  A large multinational fintech wanted to conduct a Red Team Assessment to evaluate its ability to detect and respond to a real-world cybersecurity attack.The read team started their assessment by sending a phishing email that persuaded the victim to log in to a fake portal hosted on a server to obtain valid credentials. While a small number of users clicked on the malicious link sent in the email, none of them submitted their credentials. This could be attributed to the regular social engineering tests and security awareness training delivered to staff.After the failed phishing campaign, the team went back to the drawing board to come up with a new plan of attack.  Reviewing the company’s Twitter account, the team discovered that they host a monthly community event at one of their buildings. The team registered for the event to deploy a purpose-built device into their internal network. The device will allow the team to gain remote access to the network using either an independent wireless connection or a 3G/4G mobile connection.Two members of the red team attended the event. They managed to slip away from the main event to see if there were any unlocked offices or conference rooms. Once a room had been found. One team member acted as a lookout while the other plugged the device and checked that he could reach it from his mobile phone. Shortly afterward the testers left the event and joined the rest of the team in a coffee shop down the road.  Once connected to the network, the team started mapping the internal network and gathering additional information. Over the next couple of days, the team captured several password hashes, which were achieved by exploiting a weakness in Windows’ broadcast protocols. However, users appeared to be using strong complex passwords and it was not possible to crack the hashes to recover clear-text passwords. The team then decided to relay a captured hash belonging to a user and use it to log in into a workstation where they had local administrative privileges. This allowed them to extract the clear-text password of the currently logged-in users from memory.Resources to help you complete this assignment:

Rubric:Points: Assignment: Red Team Assessment Strategies in CybersecurityCriteriaNeeds ImprovementBelow 60-70 FFair70-79 CProficient80-89 BExemplary90-100 A1. Compare and contrast red teaming versus penetration testing based on the presented case. Met outcomes.Weight: 25%Did not submit or incompletely compared and contrasted red teaming versus penetration testing based on the presented case.  Did not meet outcomes.Partially compared and contrasted red teaming versus penetration testing based on the presented case.  Partially met outcomes.Satisfactorily compared and contrasted red teaming versus penetration testing based on the presented case.  Met outcomes.Thoroughly compared and contrasted red teaming versus penetration testing based on the presented case. Exceeded outcomes.2. Describe the approach to red team assessment.Weight: 30%Did not submit or incompletely described the approach to red team assessment.Partially described the approach to red team assessment.Satisfactorily described the approach to red team assessment.Thoroughly described the approach to red team assessment.3. Discuss how different types of organizations are utilizing red teaming.Weight: 30%Did not submit or incompletely discussed how different types of organizations are utilizing red teaming.Partially discussed how different types of organizations are utilizing red teaming.Satisfactorily discussed how different types of organizations are utilizing red teaming.Thoroughly discussed how different types of organizations are utilizing red teaming.5. 3 ReferencesWeight: 5%No references were provided.Does not meet the required number of references; some or all references poor quality choices.Meets the number of required references; all references high-quality choices.Exceeds the number of required references; all references high-quality choices.6. Clarity, writing mechanics,  formatting.Weight: 10%More than 6 errors present5-6 errors present3-4 errors present0-2 errors present 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Discussion – Facebook, Privacy, and Advertising

 Conduct a news search online using the terms “privacy and Facebook.” Take a moment to read some of the available articles, and consider how concepts of private and public information are different now versus six years ago (before the social media explosion). Has the change been for the better? Why

Level 1 establishes the foundation for effective business presentations based

Level 1 establishes the foundation for effective business presentations based on emotional intelligence principles aiding the effort to connect with an audience. As suggested in the Level 1 material, emotions influence decision making. As such, I would say that a strong connection with the target audience is very important. Level

Essay #2 Guidelines: Race, Crime, & Justice

Guidelines: During Part 1 of the semester, you learned about race/ethnic-specific offending, victimization, and criminal justice involvement. Now you must explain one of these patterns using the criminological theories you learned in Part 2. First, choose and briefly discuss one race/ethnic-specific pattern as the topic of your paper (i.e., the

We discuss authentication from the perspective of computers and users.

We discuss authentication from the perspective of computers and users. For this discussion, pivot to consider the modern world and human-to-human interactions. We are often faced with authenticating people we don’t know in various ways. For example, this might be an in-person Craigslist transaction in a parking lot, a blind

Deliverable 6 – Managing Financial Risk Assignment Content Competency Devise

CompetencyDevise risk mitigation strategies in financial management. Student Success CriteriaView the grading rubric for this deliverable by selecting the “This item is graded with a rubric” link, which is located in the Details & Information pane. ScenarioYou are the manager of the procurement department in a large manufacturing firm. Part

Aman Resort Case analysis

 Keep in mind that your analysis with your thoughts and interpretation matter. Questions 1.Describe the Aman guest experience and how the company, and its resorts, differs from other similar lodging products? Why are people consistently paying $1,200 on average for a room? (30 Points) 2.What are the difference/uniqueness of Aman’s

Diagnostic Labels as Powerful Communications

A diagnosis is powerful in the effect it can have on a person’s life and treatment protocol. When working with a client, a social worker must make important decisions—not only about the diagnostic label itself but about whom to tell and when. In this Discussion, you evaluate the use and

ACC 307 Final Project Part II Guidelines and Rubric Overview

 ACC 307 Final Project Part II Guidelines and Rubric Overview The production and analysis of financial statements are core tasks for accounting professionals. The activities for this final project have traditionally been performed monthly by accountants in most organizations. However, with automation making accounting more efficient, many executives are requiring

Write a Three-Page on how to get workers at all

 Write a Three-Page on how to get workers at all levels of the company to become more aware of a cyber threat.  Offer a Strategic-Planning (Long Term planning, usually three to five years), and a decision-making process method of getting workers to be more aware of a cyber threat.   Write

Art Interpretive Evaluation – Premium Paper Help

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

QUESTION 1. Succinctly explain what is the Digital Disintermedia)on and

QUESTION 1. Succinctly explain what is the Digital Disintermedia)on and how it is formed. Use a real case example to make your case.QUESTION 2.Explain in detail what Digital Capital is and how it has influenced the decision-making process by which companies allocate budget and investment. QUESTION 3.Explains how Digital Transforma)on

An educational leader promotes the success of every student by

An educational leader promotes the success of every student by building a student-centered culture that is inclusive, inviting, and supports the personal and academic growth of all. This culture is visible and communicated through the school’s mission and vision, as well as through practices, policies, and procedures that align to

For this assignment, you will select three current options for

  For this assignment, you will select three current options for creating multimedia presentations that you have available to you. For example, you might wish to compare a narrated PowerPoint, a Screencast-O-Matic recording, and a Prezi presentation. Feel free to use these three options or to select the options that

Review the changes and challenges a particular religion faces in

 Review the changes and challenges a particular religion faces in the modern world. Now, imagine you have gone through some kind of space-time rift and returned five hundred or a thousand years from now. How is the religion, if it still exists, being practiced and conceived?   Please  write this

Provide a description of the rationale and complexities that were

Provide a description of the rationale and complexities that were taken into account from the perspective of each company including the political, economic, socio-cultural, legal and technological factors for the geographic areas where they have grown.  2) How have the companies used international operations to sustain and grow their competitive

Culture and Ethnic Studies

 Instructions for writing a summary Summaries should be about 1 single spaced page, approximately three paragraphs. The first paragraph must contain the following information: • Author and title (Eg. Yael Zerubavel, Recovered Roots) • One sentence on the topic of the piece (eg. Zerubavel looks at how Zionism recreated and