NAME:

TODAY’S DATE:

Please use APA type formatting.
Question Assignment 1
Download Government Accountability Office’s report from this URL: https://www.gao.gov/belongings/700/694158.pdf

If the hyperlink is not obtainable, then do an online search through the use of the time period “GAO Actions Taken by Equifax and Federal Businesses in Response to the 2017 Breach”.

Please learn the pages 10-17 of the doc. (Begin studying from this part: “Attackers Exploited Vulnerabilities That Equifax Subsequently Reported Taking Actions to Deal with” till this part: “Equifax Reported Taking Steps to Determine Affected Particular person”)

1) Categorize the actions of the hackers through the use of the cyber kill chain methodology by filling out the desk under. Be aware that should you can’t discover any particular motion for a step throughout the GAO doc, you should utilize exterior assets or use your judgment on which strategies the hackers may need used.

Cyber Kill Chain Step

Actions of Hackers

Reconnaissance

Weaponization

Supply

Exploitation

Set up

Command & Management

Actions on Goals

Question Assignment 2
For the Equifax 2017 case, please present two elements of the assault floor by offering justifications. Please describe the assault vector that results in the compromise of hundreds of thousands of SSNs.

Question Assignment three
As a senior safety engineer, what defense-in-depth actions can be essentially the most appropriate for minimizing the Equifax’s publicity to this assault? Clarify every motion and supply the rationale to help utilizing every particular motion.

———–

NAME:

DATE FOR TODAY:

Please format your paper in APA type.

Question Assignment No. 1

Download the report from the Government Accountability Workplace at this hyperlink: https://www.gao.gov/belongings/700/694158.pdf

If the hyperlink not works, conduct an online seek for “GAO Actions Taken by Equifax and Federal Businesses in Response to the 2017 Breach.”

Please learn the doc’s pages 10-17. (Learn from “Attackers Exploited Vulnerabilities That Equifax Subsequently Reported Taking Actions to Deal with” to “Equifax Reported Taking Steps to Determine Affected Particular person”)

1) Fill out the desk under to categorize the hackers’ actions utilizing the cyber demise chain methodology. It is very important notice that should you can’t find a exact motion for a step within the GAO paper, you possibly can seek the advice of exterior assets.

Published by
Medical
View all posts