I
, RM4728 Assignment 3 (COMPLETE ANSWERS) 2024 -
DUE 30 August 2024 ; 100% TRUSTED C
Josh has discovered that an organized hacking ring in China has
been targeting his company��s research and development
department. If these hackers have been able to uncover his
company’s research finding, this means they probably have
access to his company’s intellectual property. Josh thinks that
an e-mail server in his company’s DMZ may have been
successfully compromised and a rootkit loaded. Question 1
(Chapter 10) [20 marks] a) Based on the scenario above, draw a
process flow for the problem (10 marks) Answer? b) Identify the
states that could be implemented by Josh to show the progress
of the problem through its life cycle? (10 marks) Answer?
To address the scenario presented:
a) Process Flow for the Problem (10 marks)
The process flow should map out the steps from the initial
discovery of the hacking incident to the resolution of the issue.
Here's an outline of a possible process flow:
1. Detection of the Issue
o Josh detects unusual activity and suspects a breach.
2. Incident Identification
o Confirm whether the email server in the DMZ has
been compromised.
o Determine if a rootkit has been installed.
, RM4728 Assignment 3 (COMPLETE ANSWERS) 2024 -
DUE 30 August 2024 ; 100% TRUSTED C
Josh has discovered that an organized hacking ring in China has
been targeting his company��s research and development
department. If these hackers have been able to uncover his
company’s research finding, this means they probably have
access to his company’s intellectual property. Josh thinks that
an e-mail server in his company’s DMZ may have been
successfully compromised and a rootkit loaded. Question 1
(Chapter 10) [20 marks] a) Based on the scenario above, draw a
process flow for the problem (10 marks) Answer? b) Identify the
states that could be implemented by Josh to show the progress
of the problem through its life cycle? (10 marks) Answer?
To address the scenario presented:
a) Process Flow for the Problem (10 marks)
The process flow should map out the steps from the initial
discovery of the hacking incident to the resolution of the issue.
Here's an outline of a possible process flow:
1. Detection of the Issue
o Josh detects unusual activity and suspects a breach.
2. Incident Identification
o Confirm whether the email server in the DMZ has
been compromised.
o Determine if a rootkit has been installed.