week 1 assignments 2
APA format is required. References should be listed immediately after the question that is being answered. Each question lists a minimum number of unique scholarly references; the textbook is considered one unique reference (per question) regardless of how many times it is used. All references should be from the years 2007 to present day. Each assignment should be at lease 250 words.
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlinesOrder Paper Now
A disgruntled former hospital employee with exceptional computer skills hacks into the hospital network from their home computer and plants a very aggressive computer virus into a Computer-Aided Facility Management (CAFM) system. The computer virus activates at 1:00 a.m., shutting down the Hospital Ventilation Air Conditioning (HVAC) system, security system, building automation, and patient medical monitoring 57 system. Please explain how the hospitalâ€™s cyber security team (CST) went about resolving the problem.
A diversified Fortune 500 corporation that provides products and services to domestic and foreign governments and commercial customers suspected that a deceptive intruder was in their network; however, they knew neither the extent of the compromise, nor what (if any) data had been breached. The persistent deceptive intruders used tools and techniques that left trace evidence on each computer system they compromised. These host-based indicators of compromise are present every time the intruders attack a
network. The corporation (client) called a team of advanced persistent
threat (APT) experts to validate their concerns, scope the intrusion, and provide a remediation strategy. APTs are used to identify, scope, and remediate the APT in the government and defense industrial base. The APT consists of skilled and sophisticated deceptive hackers who deploy a complex arsenal of deception malware against specific targets in the Defense Industrial Base (DIB), financial, manufacturing, and research industries. Please explain how the APT went about resolving the problem.
Letâ€™s look at a real-world scenario of how one of the worldâ€™s largest banks was challenged to harden network and data center critical infrastructure security deception measures without degrading the high performance required in the financial services industry. The bankâ€™s network security team (NST) was charged with institutionalizing a network security certification process to measure the resiliency (performance, security, and stability) of every element of the network before and after deployment. The goal for the team was to right size the critical infrastructure for each line of business without introducing risk, ensuring that they did not overor underinvest in the network infrastructure. The team used a standardized and repeatable program to certify that devices are able to:
â€¢ Protect sensitive customer data from external deception attacks and
â€¢ Ensure cyber secure, rapid financial transactions.
â€¢ Reduce the risk of legal liabilities associated with noncompliance.
Explain how the bankâ€™s network security team should handle this