Answered step by step
Verified Expert Solution
Question
1 Approved Answer
You are given the following extract from a cybersecurity incident report: The attack occurred within a highly secure agency by an insider identified as Noah
You are given the following extract from a cybersecurity incident report:
The attack occurred within a highly secure agency by an insider identified as Noah The insider was the lowranked personnel of the agency. To access this information, he did not break any system and used his own credentials to access the most sensitive and classified information that was of national security importance. The information included the location of the agencys undercover personnel as well as their reports. The insider did not need to access this information for his everyday job and duties. Furthermore, this information was copied to a CDROM, labelled as My memories and carried out in his personal effects out of the secure facility. The information was then made available online access to the public.
You are invited to a technical meeting as a security engineer and requested to comment on the following questions:
Why were the perimeter defences eg Firewall ineffective in protecting against this attack? mark
What is the threat model of this attack? mark
An IT intern who has great software engineering skills states that I have come up with a security mechanism that will secure the company against all future cybersecurity threats, including all future insider attacks As a security specialist, do you agree with the statement made by the IT intern? Support your answer with a concise argument. mark
What type of Intrusion Detection System IDS could have been useful to detect this attack? mark
Based on this information, you identify this attack as an Access Control failure. Answer the following questions:
Who is the Access Control systems Subject in this scenario? mark
What is the Access Control systems Object in this scenario? mark
What are the Operations executed to access and leak the information by Noah? Recall access operations recognized by an access control system mark
What is Reference Monitor in an Access Control system? List the key requirements for it mark
As a result of this incident, Confidentiality Policies were compromised or Integrity Policies mark
Which of the security principles taught in this unit are relevant to this incident? Pick the two most important principles based on the context and include a concise argument why they are relevant to this incident and are your top priorities mark
Reminder: We covered Least PrivilegeSeparation of PrivilegesLeast Common MechanismPsychological AcceptabilityFailSafe DefaultsOpen Design PrincipleDefenseindepth and Weakest link
Has the Access Control system failed in the Authentication or Authorization process? Support your choice with a concise argument. mark
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started