Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Preparation Being able to think like an attacker is helpful for anticipating and defending against cybersecurity threats. Take a black-hat approach to this task. Consider

Preparation

Being able to think like an attacker is helpful for anticipating and defending against cybersecurity threats. Take a "black-hat" approach to this task. Consider how you might utilize social engineering to break into the Data Center, which is located on the eleventh floor of the College building.

How could you "game" physical security controls?

How could you beat a badge and camera system?

Scenario

The College SOC found some discussion on clandestine IRC channels regarding a forthcoming physical security attack in respect to physical vulnerabilities in the security system. The tenth story was really reached by two uninvited individuals at 12:30 PM the next day. Just outside the Data Center door, they were apprehended by campus security personnel.

Deliverable

It is your responsibility as the SOC analyst to consider this form of attack and react. You have been instructed to creat an incident response report by the SOC manager. In your response, explain how a person with malicious intent could get to the tenth floor undetected. Creat a brief story using your imagination to explain your "research" into how these two individuals managed to bypass the security system. Your completed report must adhere to the guidelines outlined in the rubric below in order to obtain full credit.

Keep in mind that the audience for your report has technical expertise in cybersecurity and uses plain English when writing it.

Format the report so that it looks professional.

The report must include these points

Incident Response Report Case Investigation Resolution Remediation

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Auditing A Business Risk Approach

Authors: Karla Johnstone, Audrey Gramling, Larry Rittenberg

8th edition

538476230, 978-0538476232

More Books

Students also viewed these Computer Network questions