Essay Available:
Pages:
1 page/≈275 words
Sources:
Check Instructions
Style:
APA
Subject:
IT & Computer Science
Type:
Case Study
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 6.08
Topic:
Detecting Hackers in the Alexander Rocco Network IT & Computer Science
Case Study Instructions:
You receive a frantic call from the system administrator of the Alexander Rocco Network, JW Tabacchi. He tells you he has identified several intrusion attempts from sources over the internet. You're not sure if the hackers have gained access to the internal network. First, based on the tools described in this chapter and some techniques you've learned in this book , write a one page report about the things you might look for to identify an attacker or a compromised host on your network. Second, make some recommendations on how you might instrument the network with network protection systems to better direct and prevent compromises in the future.
Case Study Sample Content Preview:
Memorandum
To: JW Tabachi, Administrator of the Alexander Rocco Network
From: Your Name
Date: October 6, 2020
Subject: Assessment of the Alexander Rocco Network
This request is in line with the previous correspondence made between the Alexander Rocco Network and this office. Based on the details of the conversation, it seems that there have been several malicious attempts to gain access to the network, which also prompted the immediate attention of our team. In the subsequent sections, we would like to provide some of our suggestions on how to determine these attempts using Indicators of Compromise (IoCs).
Large number of Same-file request
The first IoC that you can use to determine access is the Number of Requests for the same file. One of the most common methods used by hackers to get access to a site or a database is a trial and error method that focuses on a specific file. In a report made by the IBM X-force, they noted that this method is one of the most common ways hackers use because it reduces the amount of time and resources needed to gain access to a system CITATION Kuh16 \l 1033 (Kuhn, ...
To: JW Tabachi, Administrator of the Alexander Rocco Network
From: Your Name
Date: October 6, 2020
Subject: Assessment of the Alexander Rocco Network
This request is in line with the previous correspondence made between the Alexander Rocco Network and this office. Based on the details of the conversation, it seems that there have been several malicious attempts to gain access to the network, which also prompted the immediate attention of our team. In the subsequent sections, we would like to provide some of our suggestions on how to determine these attempts using Indicators of Compromise (IoCs).
Large number of Same-file request
The first IoC that you can use to determine access is the Number of Requests for the same file. One of the most common methods used by hackers to get access to a site or a database is a trial and error method that focuses on a specific file. In a report made by the IBM X-force, they noted that this method is one of the most common ways hackers use because it reduces the amount of time and resources needed to gain access to a system CITATION Kuh16 \l 1033 (Kuhn, ...
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:
You Might Also Like Other Topics Related to scientific essays:
- Agriculture : Biological & Biomedical Sciences Essay3 pages/≈825 words | Other | Biological & Biomedical Sciences | Essay |
- Biomedical Ethics: Death and Dying (Life Sciences Essay)5 pages/≈1375 words | APA | Life Sciences | Essay |
- Computer System Recommendation (IT & Computer Science Research Paper)3 pages/≈825 words | MLA | IT & Computer Science | Research Paper |
- Research Proposal: The Bond between Humans and Dolphins (Social Sciences Research Paper)5 pages/≈1375 words | Chicago | Social Sciences | Research Paper |
- Allegory of the Cave by Plato (Social Sciences Essay)3 pages/≈825 words | APA | Social Sciences | Essay |
- Cultural Diversity (Social Sciences Term Paper)4 pages/≈1100 words | APA | Social Sciences | Term Paper |
- Genetically Modified Organisms (Biological & Biomedical Sciences Essay)5 pages/≈1375 words | MLA | Biological & Biomedical Sciences | Essay |