profjohnspense@gmail.com
+1 (941)-281-5715
LOGIN / REGISTER
MY ACCOUNT
Write Paper4u
  • Home
  • How it works
  • Service
  • About us
  • Contact us
ORDER NOW
Write Paper4u
  • Home
  • How it works
  • Service
  • About us
  • Contact us
ORDER NOW
MY ACCOUNT

weaknesses and vulnerabilities exploited

This essay focuses on the weaknesses and vulnerabilities exploited by the attackers.. Your immediate task is to assist in analyzing and reporting on a Red Team penetration test described later in this document. As part of that report.

 

weaknesses and vulnerabilities exploited by the attackers

You have been assigned to assist with After Action Reporting in support of the Sifers-Grayson Blue Team.However,  Your immediate task is to assist in analyzing  As part of that report, you will identify weaknesses and vulnerabilities exploited by the attackers (the Red Team), compile a set of lessons learned, and then make recommendations for actions the company should take to close the gaps in their cybersecurity posture (at a minimum, you must address the identified vulnerabilities and weaknesses that were exploited by the Red Team).

The Blue Team has provided you with a set of enterprise architecture diagrams (see figures 1-4 in this file) to help with your analysis of the incident and preparation of the summary report.

You should also use the readings from Weeks 1-4 to help you identify security gaps and incident response capabilities .
Background
Engineering Department: SCADA Lab

The SCADA lab was originally setup in 1974.However,  It has been in upgrade and  in rehabb several times since then. However, The most recent hardware and software upgrades are in  completion  three years ago after the lab is with a ransomware attack that exploits several Windows XP vulnerabilities.

At that time, the engineering and design workstations were in upgrade to Windows 8.1 professional.

A second successful ransomware attack occurred three months ago.However, the company paid the ransom in both cases because the lab did not have file backups that it could use to recover the damaged files (in the first case) and did not have system backups that it could use to rebuild the system hard drives (in the second case).

The SCADA Lab is in lock into using Windows 8.1.

The planned transition to Windows 10 is on indefinite hold due to technical problems encountered during previous attempts to modify required software applications to work under the new version of the operating system.However,  This means that an incident response and recovery capability for the lab must support the Windows 8.1 operating system and its utilities.

Engineering Department: R&D DevOps Lab

The R&D DevOps Lab was built in 2010 and is in use to develop, integrate, test, support, and maintain software and firmware (software embedd in chips) for the company’s robots, drones, and non-SCADA industrial control systems product lines. Finally,the workstations in this lab are running Windows 10 and are in configuration

Data Center & Enterprise IT Operations

The company uses a combination of Windows 10 workstations and laptops as the foundation of its enterprise IT capabilities. Moreover, The servers in the data center and the engineering R&D center are built .However, an external attacker could use the network path.

Contractual & Regulatory Requirements
Newly won government contracts now require compliance with DFARS §252.204-7008, 7009, and 7012

–      http://www.acq.osd.mil/dpap/dars/dfars/html/current/252204.htm

–      https://www.acquisition.gov/dfars
Derivative requirements include:

–      Implementation of and compliance with NIST SP 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations  https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r2.pdf –      Compliance with DFARS 252.239-7009 Representation of Use of Cloud Computing and 7010 Cloud Computing Services (see https://www.acq.osd.mil/dpap/dars/dfars/html/current/252239.htm#252.239-7009

Additional Contractual Requirements for Lab Operations include:

– Firstly,incident Response per NIST SP-800-61 (Computer Security Incident Handling Guide)

– Secondly, SCADA Security per NIST SP 800-82 (Guide to Industrial Control Systems Security)

–  Thirdly,  Software / Systems Development Lifecycle (SDLC) Security per NIST SP 800-64 (Security Considerations in the System Development Life Cycle)

–Further, configuration Management per NIST SP 800-128 (Guide for Security-Focused Configuration Management of Information Systems)
– Finally, initial configuration.

Why Choose US

Money Back Guarantee
Overnight delivery option
Experienced Experts
High Quality Work
24/7 support
Free revisions
Great discounts
Affordable prices
Paper Written from Scratch

Free Services

FREE Cover Page
FREE Reference page
FREE Table of Contents
FREE amendments and Revisions

Our services

Essay Writing
Term Papers
Dissertations writing
Research Papers
Assignments
Reports Writing
Thesis Writing
Editing
Resume Writing
GET A FREE QUOTE





  

Testimonials

I have had excellent experience with you! The writers which helped me in all my orders were excellent and they submitted before the deadline, even if the deadline was 24 hours or 7 days. Thank you a lot!

Client #50924
Business Management, 5 days ago

My experiences with cw.com has been great each time. I’m very honored to have such a team who care about the needs of their customers important matters. My work has never received a low grade only high ratings. Thank you

Client #5193
Philosophy, 3 Days ago

Thank you so much! This paper was written above reproach and I appreciate your dedication and attention to this project. Also, thank you for getting it to me early. This has been a major help! Ashley

Client #3214
Computer Science, 5 Days ago

We Accept

Services

  • Essay Typers
  • Write My Paper
  • Cheap Essay Writer
  • Essay Paper Writer
  • Write My Essay Paper
  • Dissertation Writers
  • Dissertation Writing Service
  • Freelance Essay Paper Writing
  • Research Paper Writing Service
  • Best Assignment Writing Help Service

Services

  • Case Study
  • Book Report
  • Master’s Essay
  • Term Paper
  • Shakespeare Essay
  • Application Paper
  • APA Style Papers
  • Essay Outline
  • University Essay
  • Custom Research Papers

Services

  • Dissertation/Thesis
  • Essay Outline
  • Essay Topics
  • Essay writers
  • Free Essays
  • Free Term Papers
  • Essay Topics
  • Essay writers
  • Extra services we offer:
  • Amazon listings

Services

  • Dissertation Writing Service
  • Do My Essay
  • Do My Essay For Me
  • Do My Paper
  • Doctoral Dissertation
  • Editing Writing
  • Essay Help
  • Product descriptions
  • Shopify listings
  • EBay listings

Quick Options

follow writepaper4u on Facebook

DMCA Protected - WritePaper4u.com
place an order now at writepaper4u
© 2020 writepaper4u.com. All Rights Reserved.