100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4.2 TrustPilot
logo-home
Examen

Brunel - Computer Science - CS3609 Cybersecurity Exam Practice Questions with Solutions

Puntuación
-
Vendido
5
Páginas
7
Grado
A+
Subido en
28-02-2022
Escrito en
2020/2021

CS3609 Cybersecurity Exam Practice Questions with Solutions which I used to practice my essay writing and answers structure to achieve a first class honour in this module at Brunel University.

Institución
Grado









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Estudio
Grado

Información del documento

Subido en
28 de febrero de 2022
Número de páginas
7
Escrito en
2020/2021
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

Mitre Attack
Framework




An attack scenario can be described due to the findings of the Red Team exercise. Firstly, adversaries
would begin the attack with Reconnaissance tactics. The technique of ‘Active Scanning’, specifically
the subtechnique ‘Vulnerability Scanning’ (MITRE ATT&CK, T1595.002) would be executed. This is
accomplished by using an application or software tool, which gathers information including
identifying systems, services, and the version type (Andrew, 2020). This attack scenario would be
performed outside the network and would use a non-intrusive scan. This would then identify that
Brunel Tech is running an outdated version of the Apache Tomcat server. This version of the
software has a bug and therefore attackers will exploit this vulnerability (CVE Mitre 2019-0232). The
attackers would not have been able to continue with their attack if Brunel Tech kept their software
up to date. However, due to the identification of the vulnerability, the adversary will now commence
the attack. Additionally, mitigations at this stage may be difficult, being a start-up company, Brunel
Tech is unlikely to have cyber security experts working to monitor suspicious network traffic.

Since the adversaries have discovered a vulnerability with the server, their next step is to begin the
Initial Access tactic. The ‘Exploit Public-Facing Application’ technique will be used to take advantage
and establish access into the network (MITRE ATT&CK, T1190). Brunel Tech could consider investing
in vulnerability scanners themselves in order to patch up any weaknesses identified.



The next step is for the Execution tactic to begin. The Common Gateway Interface (CGI) is the
interface to execute programs and applications on the web server. The vulnerability discovered is
that ‘enableCmdLineArguments’ is enabled, which allows for the adversaries to execute scripts and
commands to the server. This is referred to as the ‘Command and Scripting Interpreter’ technique.
(MITRE ATT&CK, T1059). The attacker will deploy unauthorised scripts and commands associated
with account creation using PowerShell.

Therefore, the attacker will have now moved onto using a Persistence tactic to use the technique
‘Create Account’ to maintain access to Brunel Tech’s systems (MITRE ATT&CK, T1136.001).
Mitigations include a multi-factor authentication; Brunel tech should use a 2 Factor Authentication
(2FA). This is when a system would request for an additional token once a user logs on, which would
have been effective to avoid this attack scenario. For example, inserting a physical smart card to
access a machine or browse files which only Brunel Tech employees would have.

, The adversaries are now in the final phases and will use the Command and Control tactic, and scripts
can be used to download and launch Remote Access Software. The attacker will now be able to roam
the infested machines using the Remote Access software ‘LogMein’ (MITRE ATT&CK, T1219). The
attacker having gained access will now pose a threat to several of Brunel Tech’s assets, including
customer and employee data and will now be stolen, violating their privacy, as the attackers
commits data theft.

Brunel Tech is likely to have information such as payroll slips with banking details and National
Insurance numbers. Additionally, names, contact information and other sensitive data will be
extracted and the attacker will now have the ability to share the data, as well as commit identify
theft. This will be complete through the Exfiltration tactic, with the technique ‘Transfer Data to
Cloud Account’ (MITRE ATT&CK, T1537). This consists of transferring all the accessible data on the
infested machine, to a cloud account the attacker has access to for example Mega.nz.

Overall, the threat agent in this scenario being a Black-Hat Hacker reveals the potential threats,
which have been identified within this attack scenario, including but not limited to data theft and
data loss to the assets, this being customer and employee data. The impact of this can be
detrimental to the company, with the impact including fines from the UK government due to the
lack of security and being responsible for the breach in the General Data Protection Regulation.




Intrusion Detection Systems (IDS) is a device or piece of software that monitors networks for
malicious activity, policy violations or unwanted intrusions. Anomaly based IDS uses statistical
techniques to discover unusual behaviour. The objective is to find patterns in network traffic that do
not conform to the expected normal behaviour.

One apporach of anomaly-based IDS includes the statistical approach. This approach looks for
correlations and deviations from the normal data and uses statistical tests to identify what the
correlations are for the data and flag up any signficant changes from the norm. One example
includes the t-test which is one of the simplist statistical tests used to determine the difference
between the means of two groups. Prior to executing these tests, there must be a large amount of
data available and the data must be normal which can be done through the application of the
kolmogorov-smirnov test for normalist which ensures the data is normal. If the data is not normal,
parametric stastic techniques cannot be used and therefore a non-parametric test such as chi
squared test can be used through ranking the data.
$21.60
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
cslbrunel Brunel University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
63
Miembro desde
3 año
Número de seguidores
34
Documentos
29
Última venta
4 meses hace
Brunel Computer Science (1st Class Honours)

I achieved a First Class Honours degree in Computer Science from Brunel University - I will be uploading some of my work. Please do not purchase any documents looking for the solution to your assignments or deliverables. No refunds / exchanges.

5.0

2 reseñas

5
2
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes