100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Other

Brunel - Computer Science - CS3609 Cybersecurity (Pass)

Rating
5.0
(1)
Sold
10
Pages
8
Uploaded on
28-02-2022
Written in
2020/2021

An assignment or coursework done for Brunel University for Cybersecurity module CS3609- Pass or fail. (2021)

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
February 28, 2022
Number of pages
8
Written in
2020/2021
Type
Other
Person
Unknown

Subjects

Content preview

CS3609 CYBERSECURITY COURSEWORK
Task 1: Network Diagram


The following is a network diagram, referencing the Brunel Tech Start-up Scenario.

BRUNEL TECH START-UP SCENARIO:
A tech start-up company has just moved into a new office space and is setting up office equipment. Each desk
in the office space will have a PC connected to a local area network. A meeting space in the office will have a
projector, a gaming PC for graphics requirements and voice over IP (VoIP) devices for conference calls. The
company has set up a Windows server in its machine room to host its website and internal document storage,
CS3609 Cybersecurity Task 1 – Threshold Coursework for 2020/21 Updated October 2020 2 of 4 Department of
Computer Science which includes customer and employee contact details. Brunel Tech is also using Amazon
Web Services (S3 in particular) to back-up all internal documents to the cloud. Brunel Tech’s employees will also
be able to access documents from home computers and mobile devices, typically using a Wi-Fi network –
including the office WiFi network. In addition, a Linux-based controller (on the wall) connects to a Linux server
in the machine room and stores CCTV still images, captured from cameras in the office space, in an SQL
database.

, Task 2: Threat reporting and Attack Vector Mapping


An attack scenario can be described due to the findings of the Red Team exercise. Firstly, adversaries would
begin the attack with Reconnaissance tactics. The technique of Active Scanning, specifically the sub-technique
Vulnerability Scanning (MITRE ATT&CK, T1595.002) would be executed. This is using an application or software
tool, which gathers information including identifying systems, services, and the version type (Andrew, 2020).
This attack scenario would be performed outside the network and would use a non-intrusive scan, and with
these scans identifying that the target, Brunel Tech, is running an outdated version of Apache Tomcat server
(CVE Mitre 2019-0232). The attackers would not have been able to continue passed this stage if Brunel Tech
kept their software up to date. With the identification of the vulnerability the adversary will now commence
the attack. Additionally, mitigations at this stage may be difficult and being a start-up company, Brunel Tech is
unlikely to have cyber security experts and controls in place working to monitor suspicious network traffic
which would indicate scanning.

Since the adversaries have discovered a vulnerability with the server, their next step is now to begin the Initial
Access tactic. The Exploit Public-Facing Application technique will be used to take advantage and establish
access into the network. (MITRE ATT&CK, T1190) Brunel Tech could consider investing in vulnerabilities
scanners themselves in order to patch up any weaknesses identified.

The next step is for the Execution tactic to begin. The Common Gateway Interface (CGI) is the interface to
execute programs and applications on the web server. The vulnerability discovered being that
enableCmdLineArguments is enabled, which allows for the adversaries to execute scripts and commands to
the server which is referred to as the Command and Scripting Interpreter technique. (MITRE ATT&CK, T1059)
The attacker will use PowerShell commands and scripts to deploy unauthorised scripts and commands,
associated with account creation.

Therefore, the attacker will have now moved onto using a Persistence tactic to use the technique Create
Account to maintain access to Brunel Tech’s systems and network. (MITRE ATT&CK, T1136.001) Mitigations
include a multi-factor authentication, for Brunel tech using a 2 Factor Authentication (2FA) which consists of a
request for an additional token once a user logs onto a system would have been effective to avoid this attack
scenario, for example a inserting a physical smart card to access a machine or browse files which only Brunel
Tech employees would have.

The adversaries are now in the final phases and can simply use the Command and Control tactic, scripts can be
used to download and launch Remote Access Software. With the company having infested machines, the
attacker having created accounts, can now access, and roam the machines using the Remote Access software
LogMein. (MITRE ATT&CK, T1219) The attacker having gained access will now pose a threat to several of
Brunel Tech’s assets. Brunel Tech’s asset of customer and employee data will now be stolen, violating their
privacy, as the attackers commit data theft.

Brunel Tech is likely to have information such as payroll slips with banking details and National Insurance
numbers. Additionally, names, contact information and other sensitive data will be extracted and the attacker
will now have the ability to share the data as well as commit identify theft. This will be complete through the
Exfiltration tactic, with the technique to Transfer Data to Cloud Account (MITRE ATT&CK, T1537). This consists
of transferring all the accessible data on the infested machine, to a cloud account they have access to.

Overall, the threat agent in this scenario being a Black-Hat Hacker reveals the potential threats, which have
been identified within this attack scenario, including but not limited to data theft and data loss to the asset’s
customer and employee data. The impact of this can be detrimental to the company, with the impact including
fines from the UK government due to the lack of security and being responsible for the breach in the General
Data Protection Regulation.



1
$28.16
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Reviews from verified buyers

Showing all reviews
3 year ago

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
cslbrunel Brunel University
Follow You need to be logged in order to follow users or courses
Sold
63
Member since
3 year
Number of followers
34
Documents
29
Last sold
4 months ago
Brunel Computer Science (1st Class Honours)

I achieved a First Class Honours degree in Computer Science from Brunel University - I will be uploading some of my work. Please do not purchase any documents looking for the solution to your assignments or deliverables. No refunds / exchanges.

5.0

2 reviews

5
2
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions