DUE 30 August 2024 ; 100% TRUSTED Complete, trusted
solutions and explanations.
Josh has discovered that an organized hacking ring in China has
been targeting his company��s research and development
department. If these hackers have been able to uncover his
company’s research finding, this means they probably have
access to his company’s intellectual property. Josh thinks that an
e-mail server in his company’s DMZ may have been
successfully compromised and a rootkit loaded. Question 1
(Chapter 10) [20 marks] a) Based on the scenario above, draw a
process flow for the problem (10 marks) Answer? b) Identify the
states that could be implemented by Josh to show the progress of
the problem through its life cycle? (10 marks) Answer?
Let's address the two parts of the problem based on the scenario
where Josh suspects that his company’s e-mail server in the
DMZ has been compromised by hackers and potentially a
rootkit has been installed.
a) Process Flow for the Problem
Process Flow Diagram for Handling a Compromised E-mail
Server:
1. Detection and Alert:
o Input: Suspicious activities or alerts about potential
compromise.