The project consists of a scenario where a company has received a potential threat and you are
Question:
The project consists of a scenario where a company has received a potential threat and you are brought in as the Security Consultant to investigate the cyber security incident. In this document, you will find instructions, guidance, and key resources to successfully complete the project.
Technical Prerequisites:
You will need the following tools to perform the analysis.
Packet Analyzer:
a. Wireshark Text Editor:
a. Notepad++ or any file editor
Scenario:
ABC Corporation has received a suspicious extortion email to the office’s Tech Support email box. They want the ABC Corp to pay a ransomware of $50,000. You are hired as a Forensic Expert to analyze and provide an RCA/Report on how the attack happened and how to fix it
In the email, they added some data that they copied from the database server to confirm that the attack was real.
The RCA must include the following:
1. Write an Executive summary.
2. Provide the Incident timeline.
3. Technical Analysis:
a. Attack Origin
b. With all relevant evidence draft a story of what happened.
c. What resources were accessed
d. What time the things were accessed
e. What methodologies that the attacker uses to attack the victim’s machine?
f. What exact weakness does the attacker use to take control of the machine
The RCA must include the following:
1. Write an Executive summary.
2. Provide the Incident timeline.
3. Technical Analysis:
a. Attack Origin
b. With all relevant evidence draft a story of what happened.
c. What resources were accessed
d. What time the things were accessed
e. What methodologies that the attacker uses to attack the victim’s machine?
f. What exact weakness does the attacker use to take control of the machine
Construction accounting and financial management
ISBN: 978-0135017111
2nd Edition
Authors: Steven j. Peterson