Emerging Threats and counter measures exercise problems

Emerging Threats and counter measures exercise problems.

I need help with a Computer Science question. All explanations and answers will be used to help me learn.

exercise problem:

A disgruntled former hospital employee with exceptional computer skills hacks into the hospital network from their home computer and plants a very aggressive computer virus into a Computer-Aided Facility

Management (CAFM) system. The computer virus activates at 1:00 a.m., shutting down the Hospital

Ventilation Air Conditioning (HVAC) system, security system, building automation, and patient medical

monitoring system. Please explain how the hospital’s cyber security team (CST) went about resolving the


case projects problem:

Let’s look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These

attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial

ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is

shut down, telephone traffic is seriously limited and satellite communications are down (limiting the

Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce

and financial institutions are also severely hit. Please explain how DHS should handle this situation.

Exercise Problem:

A diversified Fortune 500 corporation that provides products and services to domestic and foreign

governments and commercial customers suspected that a deceptive intruder was in their network; however,

they knew neither the extent of the compromise, nor what (if any) data had been breached. The persistent

deceptive intruders used tools and techniques that left trace evidence on each computer system they

compromised. These host-based indicators of compromise are present every time the intruders attack a

network. The corporation (client) called a team of advanced persistent threat (APT) experts to validate their

concerns, scope the intrusion, and provide a remediation strategy. APTs are used to identify, scope, and

remediate the APT in the government and defense industrial base. The APT consists of skilled and

sophisticated deceptive hackers who deploy a complex arsenal of deception malware against specific targets in

the Defense Industrial Base (DIB), financial, manufacturing, and research industries. Please explain how the

APT went about resolving the problem.

Case Project Problem:

Yahoo! is focused on delivering fast and reliable commerce, communications, and social networking services to

millions of users around the world. With one of the world’s largest network and cloud infrastructures, Yahoo!

faces unique challenges as it fulfills its vision to be the center of people’s online lives by delivering personally

relevant, meaningful Internet experiences. Yahoo!’s traffic volume and application complexity has grown

rapidly over the past decade, driving the company to build out a massive network and application

infrastructure to support more and more load. The company continues to invest in high-capacity servers, load

balancers, routers, and switches, plus massive firewalls. Previously, however, Yahoo!’s security team had no

way to stress this enormous critical infrastructure and measure its resiliency to ensure performance, stability,

and cyber security. Yahoo! needed a solution to validate the performance, functionality, and capacity of its

systems under a wide mix of real-world traffic, including video, instant messaging, and web applications, as

well as live cyber security attacks and load from millions of users. Please identify how Yahoo!’s security team

stressed their enormous critical infrastructure and measured its resiliency to ensure performance, stability, and

cyber security.

Please provide 250 words for each question and references.

Emerging Threats and counter measures exercise problems

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount

Posted in Uncategorized