Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

You are a security professional working in incident detection and response at the manufacturing company Design by Paradigm. An engineer at the company submitted a

You are a security professional working in incident detection and response at the manufacturing
company Design by Paradigm. An engineer at the company submitted a helpdesk ticket after the
application used to render engineering files began performing slowly. The operations team recognized
that the server storing the engineering files was experiencing high utilization and rebooted the server as
part of the standard operating procedure. Following the server reboot, additional helpdesk tickets were
submitted by engineers still experiencing latency issues. After the support technician verified that each
engineer was running the latest version of the software, the helpdesk tickets were escalated to your
team and assigned to you.
You began your investigation by reaching out to the applications engineering group, discovering that
updates were recently installed on the struggling engineering application server. The administrator who
installed the updates commonly receives vendor updates by email and admitted they did not verify the
sender before downloading the updates. The email containing the system update links appeared to
come from the expected vendor contact who regularly sends out update notices. Upon closer
examination, it was discovered that the update email was sent from a personal email address spoofing
the expected contacts vendor email address.
After the call, you log into your security information and event management (SIEM) tool and notice
unusually high GPU and CPU usage on the engineering application server, both during and after office
hours. You observe that remote network connections have been established between the server and an
unknown IP address.
Continue the investigation by logging into the virtual lab environment to view the SIEM tool dashboard.
You will use the tools given to investigate the suspicious activity on the server. The provided Incident
Reporting Template will document your findings regarding the scope of the incident and corrective
actions that could resolve the issue and prevent similar events from occurring in the future.
The intended audience of your incident report is the stakeholders at Design by Paradigm.
Using the Incident Reporting Template supporting document, provide the details of the impacted system by identifying the following:
hostname
IP address
operating system

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Implementing Ai And Machine Learning For Business Optimization

Authors: Robert K Wiley

1st Edition

B0CPQJW72N, 979-8870675855

More Books

Students also viewed these Databases questions

Question

T F Normally, the usual repayment period for a long-term loan is

Answered: 1 week ago

Question

Compare the different types of employee separation actions.

Answered: 1 week ago

Question

Assess alternative dispute resolution methods.

Answered: 1 week ago

Question

Distinguish between intrinsic and extrinsic rewards.

Answered: 1 week ago