Unit 3 Lab - Hypothetical Break-In, You have been called in to support

Question # 00850075 Posted By: wildcraft Updated on: 01/30/2024 04:03 AM Due on: 01/30/2024
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image

Unit 3 Lab

Hypothetical Break-In

You have been called in to support an incident response for your organization. construct a hypothetical scenario where a system breach has been discovered. It can be modeled after a real world event if documentation of the break-in is cited as a reference.

Consider the following five questions and write an essy response to each one:

How do you go about finding information when you have been told that there has been a break-in?

  1. What servers were compromised?
  2. Was network equipment compromised?
  3. What user accounts were employed to gain access?
  4. What vulnerabilities were exploited?
  5. What can be done to prevent a recurrence of this security incident?

 

Hypothetical Break-in is in essy/technical report format (APA) and should include references. 

  • Write your report in the standard APA style.
  • Your output should be at least four double-spaced pages, exclusive of the title page, abstract, table of contents, and references section.
  • There should be a lead-in and summary/conclusion section to establish context and key takeaways, not just the question responses.
  • Answers contain sufficient information to adequately answer the questions.
  • No spelling errors.
  • No grammar errors.
Dot Image
Tutorials for this Question
  1. Tutorial # 00845547 Posted By: wildcraft Posted on: 01/30/2024 04:04 AM
    Puchased By: 2
    Tutorial Preview
    The solution of Unit 3 Lab - Hypothetical Break-In, You have been called in to support...
    Attachments
    Unit_3_Lab_-_Hypothetical_Break-In,_You_have_been_called_in_to_support.ZIP (18.96 KB)

Great! We have found the solution of this question!

Whatsapp Lisa