CYB 670 Analyze the Security Baseline of the Global Economic Summit
Your team’s analysis of the policy matrix will allow team members to create an overview of the methods used to provide a Security Baseline Report of the organization and the need for evolving summit communications.
Your team’s baseline analysis should also include an Assessment of network forensics information such as traffic analysis and intrusion analysis, as well as the type of information needed for any future forensics investigations. The team’s Assessment of information needs for network forensics could include what is needed to support security software and hardware across multiple platforms, multiple applications, and multiple architectures to communicate with the other nations. All teams will do this by using security baseline tools to build an audit file and then scan their systems. The systems should be hardened based on the policies, procedures, and standards to ensure desired levels of enterprise-wide information assurance requirements developed by the Global Economic Summit.
In the Security Baseline Report, which also includes the Attribution Report, Network Security Checklist, and the System Security Risk and Vulnerabilities Report, your team will use scanning and auditing functions to determine the baseline security posture of your nation team system and those of the other nation teams.
As you perform your baseline, address the following tasks:
Define the components you are searching for in this baseline determination and what you would do in light of possible disasters.
Include the systems-level diagram of how your nation team is configured, which can be obtained from your lab documentation.
How would you recover information assets, and how would you ensure integrity of data if such a situation were to take place?
What are the steps to producing the scan and audit report? What are the communication ports to be used or closed during operation during the Global Economic Summit?
How will you maintain a baseline of registers and images of data? How would you ensure integrity of these components over time?
What are different ways to implement security controls to a system after the security posture has been defined, in order to meet the policy requirements?
What are the missing security configurations or security updates, if any? Report on how these should be addressed to fortify the security posture of the nation system.
In your scanning, can you determine if there are missing security updates on target computers based on your access? If so, what were they, and what tool did you use for this scan? Is there security from/to the IP network to/from the PSTN caller? You will be given decryption information, and then you will determine what are the data types in transit. Identify if these are image files, or document files, and anything else.
Your team will provide all artifacts from the baseline scanning exercise and refer to them in the security baseline analysis report.
Additionally, you should assess (compare) security issues during the scans and provide issues created by social engineering. You should cover the following testing while implementing network infrastructure contingency and recovery plans in your comparison:
damage assessments
types of vulnerabilities and associated attacks
distributed computing model
information assurance (IA) principles
digital certificates
digital signatures (significance of public-key infrastructure)
These will be provided in the Security Baseline Report. Remember to discuss your findings with your team members while you take part in the lab.
Complete This Lab
Resources
Accessing the Virtual Lab Environment: Navigating UMGC Virtual Labs and Lab Setup
Self-Help Guide (Workspace): Getting Started and Troubleshooting
Link to the Virtual Lab Environment: https://vdi.umgc.edu/
Lab Instructions
Security Baseline Lab Exercise
Getting Help
To obtain lab Helpance, fill out the support request form.
Make sure you fill out the fields on the form as shown below:
Case Type: UMGC Virtual Labs Support
Customer Type: Student (Note: faculty should choose Staff/Faculty.)
SubType: ELM Cyber (CBR/CST/DFC/CYB)
SubType Detail: Pick the category that best fits the issue you are experiencing.
Email: Type the email that you currently use for classroom communications.
In the form’s description box, provide information about the issue. Add screenshots or supporting documents, and include details such as steps you took and system responses.
Take screenshots of your completed exercises. Then, compile your screenshots into a single document to include in your Security Baseline Report.
—
To complete the Security Baseline Lab Exercise for the Global Economic Summit, the team should perform the following tasks:
Define the components they are searching for in the baseline determination and plan for possible disasters.
Include a systems-level diagram of how the nation team’s system is configured, obtained from lab documentation.
Plan for how to recover information assets and ensure the integrity of data in case of a disaster.
Outline the steps for producing the scan and audit report, including the communication ports to be used or closed during operation during the summit.
Discuss plans for maintaining a baseline of registers and images of data, and ensuring the integrity of these components over time.
Identify different ways to implement security controls to the system after the security posture has been defined, in order to meet policy requirements.
Report on any missing security configurations or updates and plan for how to address them to fortify the system’s security posture.
Use scanning tools to determine if there are any missing security updates on target computers and identify the data types in transit.
Provide all artifacts from the baseline scanning exercise and refer to them in the security baseline analysis report.
Compare security issues during the scans and provide issues created by social engineering.
Assess and discuss the following in the report: damage assessments, types of vulnerabilities and associated attacks, distributed computing model, information assurance (IA) principles, digital certificates, and digital signatures (significance of public-key infrastructure)
Discuss findings with team members and seek Helpance as needed by filling out the support request form with “UMGC Virtual Labs Support” as the Case Type.