Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Background: In December 2 0 2 1 , the tech world, still reeling from the impacts of the SolarWinds breach in December 2 0 2
Background:
In December the tech world, still reeling from the impacts of the SolarWinds breach in December was rocked again with news of a massively severe zeroday vulnerability in LogjLinks to an external site.. Logj is a prominent logging solution used for Java apps. "A zeroday vulnerability is an undiscovered flaw in an application or operating system, a gap in security for which there is no defense or patch because the software maker does not know it existstheyve had zero days to prepare an effective response," per HP EnterpriseLinks to an external site., when the vulnerability is publicly disclosed, often by the security researcher who discovered it If you're unfamiliar with logging this articleLinks to an external site. gives a brief overview of its importance and use cases.
This particular vulnerability was vulnerable to an attack called Remote Code ExecutionLinks to an external site..
Assignment:
For this assignment, imagine you are the Chief Information Security Officer CISO of a tech company. Your organization is using Java and Logj in all software products your company produces. Leveraging what you have learned in this class, a few curated articles, and your experiences and opinions, you will assess the vulnerability, its impact, and response to it
To do this assignment, you will be guided to read articles, and given a writing prompt. Read the articles and respond to the prompt before you move to the next article and prompt. As always, follow the writing guidelines and have some fun with this. There are no right or wrong answers, just an opportunity to think through a situation and evaluate how well you think it was handled.
Steps to Complete:
Reading
First, we need to understand what logging and Logj are.
Logging basics are explained in this articleLinks to an external site..
To understand more about Logj watch this videoLinks to an external site., paying particular attention to the : mark and onward.
If you wish to dive deeper, this articleLinks to an external site. goes into greater depth discussing the need for logging and comparing frameworks for use with Java applications. Heads up the article discusses both Logj and For this assignment, we only care about Logj
Writing
In paragraphs, talk to me about logging
From your perspective, why is logging important? As a CISO, what would you want logging enabled on in your company? What do you think you would use logging for?
Reading
Second, we need to understand what remote code execution RCE attacks are. Read this articleLinks to an external site. to understand more about what these attacks are, the different ways they can be exploited to impact you, and suggestions for detecting and mitigating them.
Writing
What are RCEs? Why do they seem to be considered so severe? How much impact can you imagine an RCE could have on a business?
Reading
Now that we have contextual awareness, we need to understand, at a high level, what the Logj vulnerability is Read this articleLinks to an external site. Links to an external siteto get an understanding. Be aware this is a lowlevel article that explains the exploit using memes and metaphors to support understanding.
If you'd like to dive deeper into the vulnerability and understand how it can be executed and exploited, read this articleLinks to an external site..Links to an external
Writing
In paragraphs, let's dive deeper into why Logj specifically, was such a critical vulnerability. Tell me about how severe this vulnerability is in your mind. As a CISO, think about the technical environment you are responsible for. With what you would be logging tell me about the types of data, systems, or products that you'd be most concerned about should the vulnerability be exploited in your environment.
Reading
Okay, we understand the context of logging and RCEs. We understand the Logj vulnerability. Now let's dig into why this vulnerability has been called 'the biggest vulnerability in computing historyLinks to an external site.
Read the first three articles in this series which introduce the concept of Software Supply Chain. Article Links to an external site. Article Links to an external site., Article Links to an external site..
Writing
As a CISO of a tech company which produces software using Java and Logj we can assume the products you build also use opensource software, libraries, and other components. We can also assume that components you use to run your business laptops servers, containers, printers, security systems, IoT controllers for your HVAC system, etc. are also built using opensource software, libraries, and other components.
Imagine that today is December and the Logj zeroday vulnerability was just disclosed to the world. In paragraphs, tell me what goes through your mind. What's your reaction to the news? Think about your corporate
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started