(Answered) Investigate Software Insurance, Supply Chain Risks, and Software Development Life Cycle Process Assessment

0
(0)

In this Project, your team (Australia) is focused on preventing future incursions into the network and developing a business continuity plan to be deployed in case a breach occurs. There are 14 steps to be completed by the team, with the project culminating in the production of a video and forensics report that summarizes the lessons learned from the recent network breach.

This project should take 14 days to complete. After reading the scenario below, proceed to Step 1 where you will establish your team agreement plan. Image of computer server room with many servers functioning. Lights go out in the room, and then lights on servers go dark and room is plunged into darkness. Before the summit, each nation set up its own secure comms network. As summit events began, your team responded to anomalous network activity that was detected on your agency’s server. Now, to make matters worse, the next day you awaken to the news that summit attendees are unable to get access to the confidential summit data needed for the conference. All of the computer screens show a pop-up message that says: “Your Computer has been involved in Child Porn Activity!!! and has been locked down by the FBI and the Justice Department. Unless you pay the sum of $500 (FIVE HUNDRED DOLLARS)—in Bitcoin you will be arrested immediately! You have 48 hours to pay up via email – fines@fbi.gov.” Your CISO has called an emergency meeting with your team. She begins to speak to the group. “We’ve just been hit with the Reveton ransom attack, which pretends to be a warning from a country’s law enforcement agency. It locks you out of your PC and threatens criminal proceedings within 48 hours based upon very serious offenses. The message informs you that you can avoid prosecution by paying a fine to the attackers via Bitcoin.

Based on the time of the incident, we believe that a single threat actor or group is responsible. This person or group is still unidentified.” The CISO continues to brief you on the attack, confirming that no further information is known about the file, permissions, or tools used. Currently, systems show no signs of infection or additional malicious indicators. The attendees at the summit are divided on what should be done. Some of them want to pay the money—it’s a small sum to be holding up the proceedings. However, cyber insiders know that once you pay a ransom, you set a precedent for further attacks since you appear vulnerable. In addition, you want to know how the attackers were able to infiltrate the system and plant the malware. What current protections are in place for systems at the summit? What methods and procedures are your team employing in response to the current attack? What is the plan if protections fall short? These are the questions pouring in from leadership, down to your CISO—and now, to you. Your CISO continues: “I need your team to provide a series of reports that will track this incident from start to recovery. Risk management briefings. Forensic reports. Situational reports. I need it all. They’ll all come in handy when it’s time to debrief our nation’s leaders.”

#Investigate #Software #Insurance #Supply #Chain #Risks #Software #Development #Life #Cycle #Process #Assessment

How useful was this post?

Click on a star to rate it!

Average rating 0 / 5. Vote count: 0

No votes so far! Be the first to rate this post.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

(Answered) Task 2: Argumentative Research Paper- Organic foods verses GMOs

0 (0) Writing a research paper gives you an opportunity to explore a topic of special interest, research that topic, and organize your research findings in writing for an academic audience.   Through your preparation work, you have established an argumentative thesis statement and have planned a clear organization of

(Answered) M3A1: Citizens United

0 (0) (copy and paste the link) Review Campaign Finance: Abuses and Reforms. [Video File] [48 min 25 sec] before you participate in this activity. Parts of the video will discuss aspects of campaign finance and reform. Before engaging in this activity, please return to the first discussion topic on

(Answered) The decision in Williams v Roffey Bros signals that the courts in deciding whether or not to enforce a promise, may be guided less by technical questions of consideration than by questions of fairness, reasonableness and commercial utility.

0 (0) The decision in Williams v Roffey Bros signals that the courts in deciding whether or not to enforce a promise, may be guided less by technical questions of consideration than by questions of fairness, reasonableness and commercial utility.   The assignment will be in accordance with the following

(Answered) What are the effects of Ketamine treatment on treatment resistant depression?

0 (0) • Introductory statement clearly describes the phenomenon and main health issue • Clearly identifies the problem and gives an argument for examining the problem • Thesis statement is clear and well-articulated • Clearly articulates the particular population with clinical setting provided 1. Operational Definitions • Operational definitions of

(Answered) Management and Organizational Behavior.

0 (0) Description Exercise 17: Read Annual Pay Raises (W-68-69). This is located in the color-coded workbook section in the back of your book. ( Uhl-Bien, M., Osborn, R. N., & Schermerhorn, J. R. (2014).) Organizational Behavior. Hoboken, NJ: Wiley. ISBN:9781118517376 Review the exercise and complete steps 1 and 2.

(Answered) The Wall of Silence Reflective Journal

0 (0)  Assignment Instructions: For this course, you will be reading The Wall of Silence by Gibson and Singh (2003). Please read the book and reflect upon what you have read, and complete the assignment as described. The purpose of this reflective assignment is to provide the approach for connecting

(Answered) HEPATITIS C USING APRI SCORE

0 (0) Determination of Human Subjects Research Form and my project proposal. please, research about IRB. write the Description. Referencing the Determination Checklist on Page 2, briefly describe project objectives, the subject population and types of data/specimens to be collected and analyzed, how the data/specimens will be obtained, and why

(Answered) Company Description and SWOT

0 (0) Non Alcoholic Beverage company!!!! n this assignment, you will conduct a SWOT (Strength, Weakness, Opportunity, and Threat) analysis for the type of beverage you have selected, and for your company overall. As you work on the assignment, consider why you have chosen one type of non-alcoholic beverage over

(Answered) Oral Language chart of phone conversation

0 (0) Instructions In an APA formatted paper, paste the template found in doc. sharing. Define each of the terms and then watch the video of two children talking on the phone. Rate the language development of one of the two children in the video found at Use the SOLOM.

(Answered) Motivations of Private-Sector Organizations

0 (0)  Presidential Policy Directive 8 (PPD-8) is part of the national preparedness goal and provides a description for preparing for the threats in an all-hazards approach that pose the greatest risk to the United States. Community preparedness is a shared responsibility of the whole community. In addition to the

(Answered) Effective Resource Allocation

0 (0)  The discussion assignment for this week includes a review of the Key Assignment Outline completed by one of your classmates, as well as a substantial response to at least one other student. Primary Task Response: Your first task is to post your own Key Assignment Outline to the

(Answered) Ethics Case Study

0 (0) A student’s analysis of the ethic case must use the following written structural framework, which can be written as a memorandum to the file. Without the bullet points – these indicate required headings for each of the four sections. The following the description heading below to form a

(Answered) The Relativist Ethical Position.

0 (0)  In your post, address the following: To what extent would you agree with the view that research should rely on a relativist ethical position—rules or duties may vary across different communities and professional groups? What examples could you suggest to support this view? References: – Doing Research in

(Answered) Poverty in the classroom

0 (0) A four-unit research paper in APA formatting centered around the effects of poverty in education. The first unit needs to be about the effects poverty has on students in the classroom and needs to be 8-10 pages. Second unit is on the effects of substance abuse on students

(Answered) Causes of America’s War in Vietnam

0 (0) Description Formatting 12 font or smaller, standard script (e.g. Calibri, New Times Roman), 1.00-1.25 margins maximum, double spaced, clean appearance, etc. Basic organization is simple— don’t make it difficult Title— choose one that reflects your views on the topic to inform and engage your reader from the start,

(Answered) Workflows in telemetry

0 (0) Workflow analysis aims to determine workflow patterns that maximize the effective use of resources and minimize activities that do not add value. There are a variety of tools that can be used to analyze the workflow of processes and clarify potential avenues for eliminating waste. Flowcharts are a

(Answered) Critical Decision Making for Providers

0 (0) View the scenario called “Critical Decision Making for Providers”. In a 750-1,200 word paper, describe the scenario involving Mike, the lab technician, and answer the following questions: What were the consequences of a failure to report? What impact did his decision have on patient safety, on the risk