Question

In: Computer Science

Two scenarios are provided for the candidates. The candidates can provide appropriate solutions for any one...

Two scenarios are provided for the candidates. The candidates can provide appropriate solutions for any one or both the scenarios considering all the points.

Scenario 1:

An environment is attacked by zero-day attack with users identifying a notepad with attacker details and instructions to regain access, 60% of estate/users are impacted. Every endpoint had AV & EDR tools, but the machines were infected. Environment had required security controls for network, firewall, log monitoring, nothing was detected in SIEM. Backup strategy used is snapshot back-up on the same network in the same domain.

Using threat hunting techniques can we establish how hacker could have infiltrate and,

  1. How to find what are the IOC’s.
  2. How do you identify if any data exfiltration has happened?
  3. Approach to restrict further propagation of malicious code in estate & immediate corrective actions.
  4. What will be the incident response and recovery strategy ?

Scenario 2:

When looking at any security team, one thing you might notice is that there is a tool for everything. And we do mean everything: ticketing, threat intelligence, security investigations, malware analysis, detection, incident response, advanced persistent threats, security monitoring the list goes on.

Every organization wants the best of the best to build their defenses. This can often leave their security teams and security operations centers with a tool stack of uncooperative solutions that don’t communicate with one another, with their full value remaining untapped, and they can interrupt or even cancel each other out. The team becomes paralyzed by the sheer number of alerts generated by these solutions, losing time that could be spent on contextualized investigation and response.

We often cite alert fatigue as a common challenge in SOCs, and with good reason. Nobody likes alerts, because whether it’s a fire alarm, car alarm, or alarm for any other kind of emergency, it signals to us that a real threat is present. But after hearing alerts time and time again, all we hear is the boy who cried wolf. We downplay these alerts because we’ve spent so much of our precious time combing through them, only to reveal themselves as fake. In SOC terms, this leads to real threats being missed, often to devastating consequences.

There is a solution. That solution is connecting the tools that security teams run, to communicate with each other and do away with the tedious, time-consuming tasks that have a high potential for human error. Streamlining the process with which tools are used helps to keep security professionals from losing any of their precious time.

  1. What is security orchestration?
  2. What can we use security orchestration for?
  3. What are the benefits of security orchestration?
  4. What are the key elements that are needed for SOAR to perform as desired?
  5. What is Automated response and how does it work, can you give an example?

Solutions

Expert Solution

Scenario-1:-

Q1. Using threat hunting techniques can we establish how a hacker could have infiltrated

(a) Using hunting techniques like CB response, we can set up some endpoint triggers such that when an attacker tried to attack a particular endpoint, we might prevent it before it happens.

(b) When doing this we may have to think in terms of the attacker's point of view and plan the endpoint triggers so that identifying the threats will be easier.

Q2. How to find what is the IOC’s

There are two ways on how we find what are IOCs:

a. One way is to find any configuration changes in the registry. We can find altered keys and values that disable firewalls and antivirus, when we find these changes then there is an IOC.

b. Another way is to find suspicious activities by malware within the filesystem of the infected environment. Some activities like suspicious reading, writing, deletions indicate there are IOCs.

Q3. How do you identify if any data exfiltration has happened?

We can find data exfiltrations by identifying swells in the database read volume. We have to check massive database activity where there are database dumps that resulted in large traffic transactions. This will prove that some attackers have gained illegal access.

Q4. Approach to restrict further propagation of malicious code in estate & immediate corrective actions.

(a) Apply white-box testing to review code for the presence of malicious code before releasing of the software.

(b) Use the Veracode tool for identifying malicious codes in the system.

(c) You can also use application analysis tools to identify malicious code and restrict them before even they affect the environment.

Q5.  What will be the incident response and recovery strategy?

(a) Incident response action will be detection and reporting. Monitor security events in order to detect, alert, and report on potential security incidents.

(b) Setting up an effective recovery process is important and also setting up some snapshot-based backup tools to recover the backed up data is an important recovery strategy.


Related Solutions

Provide detailed scenarios (these can be case studies, articles, or any published accounting scenario within the...
Provide detailed scenarios (these can be case studies, articles, or any published accounting scenario within the last 5 years) in which GAAP and IFRS would handle the situation differently. Provides at least two scenarios published within the last 5 years and a concise, detailed summary of how each of the situations would have been handled under the GAAP principles and how the same scenario would have been handled under the IFRS principles
*PLEASE PROVIDE ALL SOLUTIONS USING MICROSOFT EXCEL WITH ANY RELEVANT FORMULAS, thank you!* I have provided...
*PLEASE PROVIDE ALL SOLUTIONS USING MICROSOFT EXCEL WITH ANY RELEVANT FORMULAS, thank you!* I have provided the answers to the questions for reference, I just need to know how to get to them. Samantha is going to retire in 20 years. In order to live comfortably, she thinks she will need to withdraw $10,000 every month during retirement. These monthly withdrawals will be made at the end of each month during retirement. Samantha believes she will live for 35 years...
Select that appropriate terms from the list provided to the following scenarios the best represent each...
Select that appropriate terms from the list provided to the following scenarios the best represent each term. Hint – Each term can only be used once. 1. Lela Yeoman has been asked to lead her audit team in the audit of the Toronto Raptors basketball team. She performed a review of their risks and found that the team’s risks tend to be driven by the nature of certain significant accounts or business activities that the Raptors pursue. Analytical procedures, Computer...
Choose one of the scenarios below and respond in an appropriate way to the prejudiced comment....
Choose one of the scenarios below and respond in an appropriate way to the prejudiced comment. Also, explain why you have chosen to respond as you have. Scenario 1 Background: Two women were hanging out after school and went to get coffee. They were discussing various topics, and the discussion turned to a sibling who is gay. Speaker: The student’s sister (college-aged) Responder: A female college student Comment: "I don’t know if I can hang out with Kate in public...
is there any scenarios when can a low R2 value be acceptable?
is there any scenarios when can a low R2 value be acceptable?
Explain any two scenarios of existence of pseudo-Arts in Ghana
Explain any two scenarios of existence of pseudo-Arts in Ghana
For which of the following scenarios would it be appropriate to use a one-sample z-test? A....
For which of the following scenarios would it be appropriate to use a one-sample z-test? A. Comparing the average weight of newborns in Hospital A to the average weight of newborns in Hospital B B. Comparing the political affiliation of ASU students against the political affiliation of all college students C. Comparing the number of packs of cigarettes smoked per day by residents of urban areas with the number of cigarettes smoked per day by all persons in the USA...
Are there any scenarios that you can think of that makes more sense to get the...
Are there any scenarios that you can think of that makes more sense to get the money in the future versus today? What about lottery winnings? Would you prefer the winnings now or payouts over a period of time?
Provide two classification scenarios where you can use classification tree models but not logistic regression models....
Provide two classification scenarios where you can use classification tree models but not logistic regression models. For each problem, identify a target variable and four possible predictor variables.
C++ homework URGENT Select ONE of the following scenarios and write an appropriate function to produce...
C++ homework URGENT Select ONE of the following scenarios and write an appropriate function to produce the required result. Please write down which scenarios you have selected (a, b or c). a) Write a function that will accept a sentence and a letter and the function return will be the number of times the sent letter appears in the sent sentence. Example; if the sentence is "hello world" and the letter is “o” the return value should be 2. b)...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT