Please use APA style formatting.
Question 1
Effective intrusion response is vital to preventing additional compromise to an organization’s network. Please use the table you prepared for question 1 of Homework 1. Assume that you are the incident response coordinator of the Equifax. What would be your intrusion responses, if you noticed the action of hackers at each step of cyber kill chain? Provide intrusion response actions to the table below.
Cyber Kill Chain Step Intrusion Response Steps
When you noticed hacker reconnaissance actions
When you noticed hacker weaponization actions
When you noticed hacker delivery actions
When you noticed hacker exploitation actions
When you noticed hacker installation actions
When you noticed hacker command & control actions
When you noticed hacker actions on objectives actions

——-

Please format your paper in APA style.
Question No. 1
Effective intrusion response is critical for preventing further network compromise. Please use the table you created for Homework 1 question 1. Assume you are the Equifax incident response coordinator. What would your intrusion response be if you observed hacker activity at each stage of the cyber death chain? Fill up the blanks in the table below with intrusion response actions.
Intrusion Response Steps in the Cyber Kill Chain
When you saw hacker reconnaissance activities
When you first became aware of hacker weaponization activities,
When you first became aware of hacker delivery actions,
When you become aware of hacker exploitation activities,
When you observed hacker installation activities,
When you become aware of hacker command and control activity
When you noticed hacker actions on objectives actions

Published by
Essays
View all posts