Investigate Software Insurance, Supply Chain Risks, and Software

In this Project, your team (Australia) is focused on preventing future incursions into the network and developing a business continuity plan to be deployed in case a breach occurs. There are 14 steps to be completed by the team, with the project culminating in the production of a video and forensics report that summarizes the lessons learned from the recent network breach.

This project should take 14 days to complete. After reading the scenario below, proceed to Step 1 where you will establish your team agreement plan. Image of computer server room with many servers functioning. Lights go out in the room, and then lights on servers go dark and room is plunged into darkness. Before the summit, each nation set up its own secure comms network. As summit events began, your team responded to anomalous network activity that was detected on your agency’s server. Now, to make matters worse, the next day you awaken to the news that summit attendees are unable to get access to the confidential summit data needed for the conference. All of the computer screens show a pop-up message that says: “Your Computer has been involved in Child Porn Activity!!! and has been locked down by the FBI and the Justice Department. Unless you pay the sum of $500 (FIVE HUNDRED DOLLARS)—in Bitcoin you will be arrested immediately! You have 48 hours to pay up via email – fines@fbi.gov.” Your CISO has called an emergency meeting with your team. She begins to speak to the group. “We’ve just been hit with the Reveton ransom attack, which pretends to be a warning from a country’s law enforcement agency. It locks you out of your PC and threatens criminal proceedings within 48 hours based upon very serious offenses. The message informs you that you can avoid prosecution by paying a fine to the attackers via Bitcoin.

Based on the time of the incident, we believe that a single threat actor or group is responsible. This person or group is still unidentified.” The CISO continues to brief you on the attack, confirming that no further information is known about the file, permissions, or tools used. Currently, systems show no signs of infection or additional malicious indicators. The attendees at the summit are divided on what should be done. Some of them want to pay the money—it’s a small sum to be holding up the proceedings. However, cyber insiders know that once you pay a ransom, you set a precedent for further attacks since you appear vulnerable. In addition, you want to know how the attackers were able to infiltrate the system and plant the malware. What current protections are in place for systems at the summit? What methods and procedures are your team employing in response to the current attack? What is the plan if protections fall short? These are the questions pouring in from leadership, down to your CISO—and now, to you. Your CISO continues: “I need your team to provide a series of reports that will track this incident from start to recovery. Risk management briefings. Forensic reports. Situational reports. I need it all. They’ll all come in handy when it’s time to debrief our nation’s leaders.”

#Investigate #Software #Insurance #Supply #Chain #Risks #Software

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

The purpose of this assignment is to apply basic terminology

 The  purpose of this assignment is to apply basic terminology and processes,  and expected course of care associated with the circumstances of a  designated patient population by demonstrating the cyclical process of  assessment, plan, intervention, and evaluation of child life services.  (CLC1d; CLC1a)     you  can use the child of

Writing Requirements 3–5 pages in length (excluding cover page, abstract,

Premium Paper Help is a professional writing service that provides original papers. Our products include academic papers of varying complexity and other personalized services, along with research materials for assistance purposes only. All the materials from our website should be used with proper references.

CASE STUDY: Preschool Child: Ricky Ricky, age 4 years, arrives

 CASE STUDY: Preschool Child: Ricky Ricky, age 4 years, arrives in the clinic with his mother. Ricky lives with his mother and father, who both work full-time, and his infant sister. Their extended family lives in a different state more than 100 miles away. Both parents are of average height

Think of an organization you have worked for or one

Think of an organization you have worked for or one with which you are very familiar.  Diagnose the need for change and present a plan to transform the organization, utilizing Kotter’s 8-Step Approach. You will need to research the Kotter 8 Step Change Model extensively. You are encouraged to first

Imagine that you own a business. Your business could be

Imagine that you own a business. Your business could be anything from a coffee shop to a home-based healthcare facility to an accounting firm. As the business owner, you are about to analyze the performance of your company and will need the information from your cash flow statement, horizontal analysis,

Security Administrator Handbook: Develop the basic procedures and

One of the responsibilities of a Security Administrator is to create and document policies that protect the organization and guide users to making smart decisions. In this assignment, you will build a handbook that can be used for such a purpose. The NIST’s Special Publications Website, a government operated Website,

Create a 5- to 6-slide PowerPoint presentation that explores professional

 Create a 5- to 6-slide PowerPoint presentation that explores professional ethics and responsibilities. You can use information from the CSU Online Library or other reliable sources. (Note: Websites such as Wikipedia are not acceptable academic sources.) You may use the slide notes function to explain slide contents as necessary. In

Critique assignment( health disparities)

I. Identify a peer reviewed published description of a community based participatory research effort designed to reduce health disparities. Select an article published between 2013 and 2019. II. Provide a brief paragraph about the purpose of the study and the health or health care disparity being addressed. III. Using Green

Post a response for ALL of topics below: 1) Why

Post a response for ALL of topics below: 1) Why do only 40% of Americans take part in the political process OR VOTE? Will love to hear your comments. 2) If we are the leading figure on Democracy in the world, why do so many Americans distrust our Political Process?

150 words The cases described (attached) and reflect on how

150 words The cases described  (attached) and reflect on how you would deal with this case from an ethical perspective. Include how your own cultural identity and experiences have shaped your thinking about this particular client’s case. What additional training and consultation would you need to be an ethical practitioner

Due tomorrow the 11th at 11:59pm Book: Initimate Relationships (third

 Due tomorrow the 11th at 11:59pm Book: Initimate Relationships (third edition) Thomas N Badbury In the course text, the authors suggest one way we understand/experience conflict is as a result of competing goals (originally proposed by Kurt Lewin). You are expected to provide a (non-violent) interpersonal relationship conflict scenario – there

Australian Tobacco and Hookah market Research

Australian Tobacco and Hookah market Research Detailed overview/introduction, Detailed history, Detailed market analysis per state, Detailed manufacture profiles, Detailed market forecast, tax and Detailed legislation for each state, Detailed Distributors, Traders and Dealers who sell Hookah., future market analysis and Target Market.   #Australian #Tobacco #Hookah #market #Research

ASSESS GLOBAL VALUE CHAIN

 What activities, if any, in your organization’s value chain are candidates for relocation to the country selected in Step 8? If there are no activities that can be relocated, please explain why. If there are activities that can be relocated, provide a brief justification and examine the challenges you see

The Socio-Ecological model of mental health LC Eco Model 2.2021.

The Socio-Ecological model of mental health LC Eco Model 2.2021. Which provides a framework on understand how individuals, families, organization, community and social factors influence an individual. Review the Socio-Ecological Model for mental health. Discuss how you would apply each level of influence in your understanding of how it explains

Reflective essay: Describe the rationale for group work

Reflective essay 2000 words   a)        Describe the rationale for group work  This section begins with a historical overview of the development of groupwork theory and practice. The advantages and disadvantages of working in groups are explored and compared with working individually. The different types of groups are identified, including