Answered step by step
Verified Expert Solution
Question
1 Approved Answer
You are a security professional working in incident detection and response at the manufacturing company Design by Paradigm. An engineer at the company submitted a
You are a security professional working in incident detection and response at the manufacturing
company Design by Paradigm. An engineer at the company submitted a helpdesk ticket after the
application used to render engineering files began performing slowly. The operations team recognized
that the server storing the engineering files was experiencing high utilization and rebooted the server as
part of the standard operating procedure. Following the server reboot, additional helpdesk tickets were
submitted by engineers still experiencing latency issues. After the support technician verified that each
engineer was running the latest version of the software, the helpdesk tickets were escalated to your
team and assigned to you.
You began your investigation by reaching out to the applications engineering group, discovering that
updates were recently installed on the struggling engineering application server. The administrator who
installed the updates commonly receives vendor updates by email and admitted they did not verify the
sender before downloading the updates. The email containing the system update links appeared to
come from the expected vendor contact who regularly sends out update notices. Upon closer
examination, it was discovered that the update email was sent from a personal email address spoofing
the expected contacts vendor email address.
After the call, you log into your security information and event management SIEM tool and notice
unusually high GPU and CPU usage on the engineering application server, both during and after office
hours. You observe that remote network connections have been established between the server and an
unknown IP address.
Continue the investigation by logging into the virtual lab environment to view the SIEM tool dashboard.
You will use the tools given to investigate the suspicious activity on the server. The provided Incident
Reporting Template will document your findings regarding the scope of the incident and corrective
actions that could resolve the issue and prevent similar events from occurring in the future.
The intended audience of your incident report is the stakeholders at Design by Paradigm.
Using the Incident Reporting Template supporting document, provide the details of the impacted system by identifying the following:
hostname
IP address
operating system
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started