week 1 assignments 2
APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used. All references should be from the years 2007 to present day. Each assignment should be at lease 250 words.
Problem 1:
A disgruntled former hospital employee with exceptional computer skills hacks into the hospital network from their home computer and plants a very aggressive computer virus into a Computer-Aided Facility Management (CAFM) system. The computer virus activates at 1:00 a.m., shutting down the Hospital Ventilation Air Conditioning (HVAC) system, security system, building automation, and patient medical monitoring 57 system. Please explain how the hospital’s cyber security team (CST) went about resolving the problem.
Problem:2
A diversified Fortune 500 corporation that provides products and services to domestic and foreign governments and commercial customers suspected that a deceptive intruder was in their network; however, they knew neither the extent of the compromise, nor what (if any) data had been breached. The persistent deceptive intruders used tools and techniques that left trace evidence on each computer system they compromised. These host-based indicators of compromise are present every time the intruders attack a
network. The corporation (client) called a team of advanced persistent
threat (APT) experts to validate their concerns, scope the intrusion, and provide a remediation strategy. APTs are used to identify, scope, and remediate the APT in the government and defense industrial base. The APT consists of skilled and sophisticated deceptive hackers who deploy a complex arsenal of deception malware against specific targets in the Defense Industrial Base (DIB), financial, manufacturing, and research industries. Please explain how the APT went about resolving the problem.
Problem: 3
Let’s look at a real-world scenario of how one of the world’s largest banks was challenged to harden network and data center critical infrastructure security deception measures without degrading the high performance required in the financial services industry. The bank’s network security team (NST) was charged with institutionalizing a network security certification process to measure the resiliency (performance, security, and stability) of every element of the network before and after deployment. The goal for the team was to right size the critical infrastructure for each line of business without introducing risk, ensuring that they did not overor underinvest in the network infrastructure. The team used a standardized and repeatable program to certify that devices are able to:
• Protect sensitive customer data from external deception attacks and
insider threats.
• Ensure cyber secure, rapid financial transactions.
• Reduce the risk of legal liabilities associated with noncompliance.
Explain how the bank’s network security team should handle this
situation.