diff_months: 10

The following 6 points are element of the assignment.

Download Solution Now
Added on: 2024-11-23 18:30:32
Order Code: SA Student Navya IT Computer Science Assignment(5_24_42725_743)
Question Task Id: 508201

The following 6 points are element of the assignment.

Type of assets, what is the target asset in this case? Antiques, potentially money or cash.

Approach points, mapping the attacks surface. Possible logical, physical entry points.

For example, authorised/ unauthorised entry A logical example would be guessing a password getting inside the system, physical point would be going into the house.

Something that sit between the physical and logical entry point is, lets say if am driving outs of the organisation and if Im withing the Wi Fi range, I will try to connect to the gust Wi fi, so that would become logical as well as physical entry point because the Wi fi point is physically connected to the rest of the LAN network.

Goal (motivation) >> as stated earlier is Money.

List of impact>> what kind of impact it might have? So, you now are doing the vulnerability analysis from a hacker point of view. In this case we have an antiques dealer, he also stores some antiques in his place.

It might be a lack of trust in the dealer/ reputation, monitory loss.

Identify hacker or hacking groups that could possibly be associated with this form of attack. You can get an inspiration from the open media report, what kind of thing are associated with this.

When there is an increase in crimes, generally police will look at their existing database, they will l look at the signature of their crime and map those signatures with the existing database and they will find if its potentially one of those.

Describe an example of which a similar approach has been used in a similar context. Example of such and exploit/ stealth elsewhere in the world.

Lets say the same kind of burglary was done elsewhere, you will use that an example or an inspiration if that guy or girl did it maybe I can do it to.

So we are trying to identify vulnerability under what circumstance it can occur, what could be the possible motivation behind exploiting that vulnerability what could be the potential impact on the target or you as an offensive attacker trying to inflict on the target. What kind of attacking groups are showing that signature.

Use examples from elsewhere in the world on how that technical or logical attack was exploited, so a combination of that will form 3 of those vulnerabilities.

vulnerability 1,2, and 3 You will have to analyse 3 vulnerabilities for your chosen organisation.

If you have used organisation for your assessment 2, dont use it for assessment 3. chose different organisation. And you must declare that.

Execution plan: How will a vulnerability or a combination of vulnerabilities results in a successful compromise?

As purely hypothetical and simplified execution scenario below.

(Kill chain)

Passive reconnaissance: observe the house and gather information >> who goes in who comes out at what pointing time.

Active reconnaissance: access the house as a support staff and mapping the entry points identify the type and location of safe room,>> maybe use the fake ID

one of the burglaries from the attack team (equivalent to cyber- attack group). Posing as computer technician (social engineering) enter the premises and connect the wifi devise to the CCTV monitoring system(breach the perimeter) this enter allows him to control the CCTV remotely( command and control).

The attack team members befriend the security guard and gain information about the merchandise movement from the warehouse to the dealers house (social engineering).

The computer technician overwrites the monitoring CCTV system and start relaying a false information, while another team member distracts the security guard. They are acting as a team; one person will distract the security guard and the other person will overwrite the CCTV cameras.

2 team members from the attack team, posing as delivery drivers from the antiques warehouse, enter the dealers house in a delivery van that looks exactly like the one used by the dealers trusted contractors (Social engineering, strop effect, spoofing). One of the personnel

The stolen merchandise is loaded, and the truck leaves the premises (exploit successful). The CCTV is unable to capture any of this because it has been overridden by the computer technician (maintain stealth)

Team composition: drivers, Locksmith, Computers and CCTV cameras

Hardware required: Locksmith tool, remote usb Wi fi devise, delivery van, fake IDs.

Software CCTV overwrite software (Trojan)

Assumption: state all the assumption here

Recommendation: add all the recommendations to improve the security

Suggested Document outline

Executive summary: start with the goals of the assessment, high level findings and recommendations. Description of the target.

Vulnerability analysis: For each vulnerability clearly mention what the vulnerability is, under which circumstance can it occur. It could be one vulnerability or vulnerability that results as a combination factors. So which factor and circumstance it can occur. How can it be exploited. What is the impact (Must read and address all the points in the assignment description on LMS) map it to the course materials.

You will have to do that for 3 vulnerabilities.

Vulnerability 1.

Vulnerability 2.

Vulnerability 3.

Executive plan: clearly specify all the steps (technical and non-technical) how you execute the exploit all the way down to the eventual outcome. All assumptions must be specified. You will detail all the resources, personnel, hardware, software (must address all the points in the assignment on LMS)

Defensive Plan: As a cybersecurity defender, suggest how you are going to minimise the risk in your scenario?

  • Uploaded By : Pooja Dhaka
  • Posted on : November 23rd, 2024
  • Downloads : 0
  • Views : 186

Download Solution Now

Can't find what you're looking for?

Whatsapp Tap to ChatGet instant assistance

Choose a Plan

Premium

80 USD
  • All in Gold, plus:
  • 30-minute live one-to-one session with an expert
    • Understanding Marking Rubric
    • Understanding task requirements
    • Structuring & Formatting
    • Referencing & Citing
Most
Popular

Gold

30 50 USD
  • Get the Full Used Solution
    (Solution is already submitted and 100% plagiarised.
    Can only be used for reference purposes)
Save 33%

Silver

20 USD
  • Journals
  • Peer-Reviewed Articles
  • Books
  • Various other Data Sources – ProQuest, Informit, Scopus, Academic Search Complete, EBSCO, Exerpta Medica Database, and more