Sign In
Not register? Register Now!
Pages:
1 page/≈275 words
Sources:
Check Instructions
Style:
APA
Subject:
IT & Computer Science
Type:
Case Study
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 6.08
Topic:

Detecting Hackers in the Alexander Rocco Network IT & Computer Science

Case Study Instructions:

You receive a frantic call from the system administrator of the Alexander Rocco Network, JW Tabacchi. He tells you he has identified several intrusion attempts from sources over the internet. You're not sure if the hackers have gained access to the internal network. First, based on the tools described in this chapter and some techniques you've learned in this book , write a one page report about the things you might look for to identify an attacker or a compromised host on your network. Second, make some recommendations on how you might instrument the network with network protection systems to better direct and prevent compromises in the future.

Case Study Sample Content Preview:
Memorandum
To: JW Tabachi, Administrator of the Alexander Rocco Network
From: Your Name
Date: October 6, 2020
Subject: Assessment of the Alexander Rocco Network
This request is in line with the previous correspondence made between the Alexander Rocco Network and this office. Based on the details of the conversation, it seems that there have been several malicious attempts to gain access to the network, which also prompted the immediate attention of our team. In the subsequent sections, we would like to provide some of our suggestions on how to determine these attempts using Indicators of Compromise (IoCs).
Large number of Same-file request
The first IoC that you can use to determine access is the Number of Requests for the same file. One of the most common methods used by hackers to get access to a site or a database is a trial and error method that focuses on a specific file. In a report made by the IBM X-force, they noted that this method is one of the most common ways hackers use because it reduces the amount of time and resources needed to gain access to a system CITATION Kuh16 \l 1033 (Kuhn, ...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to scientific essays:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!