100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Overig

Brunel - Computer Science - CS3609 Cybersecurity (Pass)

Beoordeling
5,0
(1)
Verkocht
10
Pagina's
8
Geüpload op
28-02-2022
Geschreven in
2020/2021

An assignment or coursework done for Brunel University for Cybersecurity module CS3609- Pass or fail. (2021)

Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Studie
Vak

Documentinformatie

Geüpload op
28 februari 2022
Aantal pagina's
8
Geschreven in
2020/2021
Type
Overig
Persoon
Onbekend

Onderwerpen

Voorbeeld van de inhoud

CS3609 CYBERSECURITY COURSEWORK
Task 1: Network Diagram


The following is a network diagram, referencing the Brunel Tech Start-up Scenario.

BRUNEL TECH START-UP SCENARIO:
A tech start-up company has just moved into a new office space and is setting up office equipment. Each desk
in the office space will have a PC connected to a local area network. A meeting space in the office will have a
projector, a gaming PC for graphics requirements and voice over IP (VoIP) devices for conference calls. The
company has set up a Windows server in its machine room to host its website and internal document storage,
CS3609 Cybersecurity Task 1 – Threshold Coursework for 2020/21 Updated October 2020 2 of 4 Department of
Computer Science which includes customer and employee contact details. Brunel Tech is also using Amazon
Web Services (S3 in particular) to back-up all internal documents to the cloud. Brunel Tech’s employees will also
be able to access documents from home computers and mobile devices, typically using a Wi-Fi network –
including the office WiFi network. In addition, a Linux-based controller (on the wall) connects to a Linux server
in the machine room and stores CCTV still images, captured from cameras in the office space, in an SQL
database.

, Task 2: Threat reporting and Attack Vector Mapping


An attack scenario can be described due to the findings of the Red Team exercise. Firstly, adversaries would
begin the attack with Reconnaissance tactics. The technique of Active Scanning, specifically the sub-technique
Vulnerability Scanning (MITRE ATT&CK, T1595.002) would be executed. This is using an application or software
tool, which gathers information including identifying systems, services, and the version type (Andrew, 2020).
This attack scenario would be performed outside the network and would use a non-intrusive scan, and with
these scans identifying that the target, Brunel Tech, is running an outdated version of Apache Tomcat server
(CVE Mitre 2019-0232). The attackers would not have been able to continue passed this stage if Brunel Tech
kept their software up to date. With the identification of the vulnerability the adversary will now commence
the attack. Additionally, mitigations at this stage may be difficult and being a start-up company, Brunel Tech is
unlikely to have cyber security experts and controls in place working to monitor suspicious network traffic
which would indicate scanning.

Since the adversaries have discovered a vulnerability with the server, their next step is now to begin the Initial
Access tactic. The Exploit Public-Facing Application technique will be used to take advantage and establish
access into the network. (MITRE ATT&CK, T1190) Brunel Tech could consider investing in vulnerabilities
scanners themselves in order to patch up any weaknesses identified.

The next step is for the Execution tactic to begin. The Common Gateway Interface (CGI) is the interface to
execute programs and applications on the web server. The vulnerability discovered being that
enableCmdLineArguments is enabled, which allows for the adversaries to execute scripts and commands to
the server which is referred to as the Command and Scripting Interpreter technique. (MITRE ATT&CK, T1059)
The attacker will use PowerShell commands and scripts to deploy unauthorised scripts and commands,
associated with account creation.

Therefore, the attacker will have now moved onto using a Persistence tactic to use the technique Create
Account to maintain access to Brunel Tech’s systems and network. (MITRE ATT&CK, T1136.001) Mitigations
include a multi-factor authentication, for Brunel tech using a 2 Factor Authentication (2FA) which consists of a
request for an additional token once a user logs onto a system would have been effective to avoid this attack
scenario, for example a inserting a physical smart card to access a machine or browse files which only Brunel
Tech employees would have.

The adversaries are now in the final phases and can simply use the Command and Control tactic, scripts can be
used to download and launch Remote Access Software. With the company having infested machines, the
attacker having created accounts, can now access, and roam the machines using the Remote Access software
LogMein. (MITRE ATT&CK, T1219) The attacker having gained access will now pose a threat to several of
Brunel Tech’s assets. Brunel Tech’s asset of customer and employee data will now be stolen, violating their
privacy, as the attackers commit data theft.

Brunel Tech is likely to have information such as payroll slips with banking details and National Insurance
numbers. Additionally, names, contact information and other sensitive data will be extracted and the attacker
will now have the ability to share the data as well as commit identify theft. This will be complete through the
Exfiltration tactic, with the technique to Transfer Data to Cloud Account (MITRE ATT&CK, T1537). This consists
of transferring all the accessible data on the infested machine, to a cloud account they have access to.

Overall, the threat agent in this scenario being a Black-Hat Hacker reveals the potential threats, which have
been identified within this attack scenario, including but not limited to data theft and data loss to the asset’s
customer and employee data. The impact of this can be detrimental to the company, with the impact including
fines from the UK government due to the lack of security and being responsible for the breach in the General
Data Protection Regulation.



1
€24,00
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Beoordelingen van geverifieerde kopers

Alle reviews worden weergegeven
3 jaar geleden

5,0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
cslbrunel Brunel University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
63
Lid sinds
3 jaar
Aantal volgers
34
Documenten
29
Laatst verkocht
4 maanden geleden
Brunel Computer Science (1st Class Honours)

I achieved a First Class Honours degree in Computer Science from Brunel University - I will be uploading some of my work. Please do not purchase any documents looking for the solution to your assignments or deliverables. No refunds / exchanges.

5,0

2 beoordelingen

5
2
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen