Hypothetical Break-In
You have been called in to support an incident response for your organization. construct a hypothetical scenario where a system breach has been discovered. It can be modeled after a real world event if documentation of the break-in is cited as a reference.
Consider the following five questions and write an essy response to each one:
How do you go about finding information when you have been told that there has been a break-in?
- What servers were compromised?
- Was network equipment compromised?
- What user accounts were employed to gain access?
- What vulnerabilities were exploited?
- What can be done to prevent a recurrence of this security incident?
Hypothetical Break-in is in essy/technical report format (APA) and should include references.
- Write your report in the standard APA style.
- Your output should be at least four double-spaced pages, exclusive of the title page, abstract, table of contents, and references section.
- There should be a lead-in and summary/conclusion section to establish context and key takeaways, not just the question responses.
- Answers contain sufficient information to adequately answer the questions.
- No spelling errors.
- No grammar errors.