ISE 620 Courses of Action Table

pdf

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

IT-549-Q15

Subject

Information Systems

Date

Oct 30, 2023

Type

pdf

Pages

3

Uploaded by ElderLightning8081

Report
Courses of Action Table Template and Instructions This template is an aid to help you complete the Courses of Action Table elements in Milestone Two of your final project. The courses of action table template is similar to the activity you completed in Module Five. However, unlike the targeting step you focused on in the Module Five lab, your completed courses of action table must address the full flow of the potential attack in your provided scenario. Use the provided Final Project Scenario and the resources below to complete this table. Resources: 1. Intelligence-Driven Incident Response , Chapter 3 If you have not already, read the sections from “Kill Chain” to “Active Defense.” The Cyber Kill Chain helps a security profe ssional recognize the various stages of an attack and use that knowledge to initiate incident response procedures and practices that can stop attackers in their tracks. This kill chain model is the conceptual basis for the attack actions you will list in your courses of action table. 2. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains The Cyber Kill Chain methodology originated at Lockheed Martin; in this reading, experts at Lockheed expla in how to use the kill chain model to enhance an organization’s incident response capabilities. Pay particular attention to s ection 3.3, entitled “Course of Action.” 3. Gaining the Advantage: Applying the Cyber Kill Chain Methodology to Network Defense In this reading, experts at Lockheed explain the methodology and present some informal examples of countermeasures aligned with the attack steps they are meant to defeat. This PDF offers a rough, highly-simplified courses of action table that is similar to the one you are constructing here but based on a different use case. 4. Visual: Interaction Between Cyberattack and Incident Response Processes This resource provides additional guidance around the interaction between cyberattack and incident response processes. This is a logical framework that a security practitioner would use for walking through an attack. Table Template and Instructions: Use the table in this document a s the basis of the “Courses of Action” table for Part II of your final project. If you do not want to work within the template, you may create your own table or document in a separate word document but it must contain all the required elements after the listed steps. The resources above and the Instructions outlined in the ‘steps’ will guide you through the completion of this template. This guidance will walk you through the process of doing this work. Your completed table will be scored specific to the guidelines and rubric in Milestone II. Lastly, it should be noted that in practice, the countermeasure in this type of table is referenced as a procedure document that contains an objective, description, and steps to completion. For purposes of this activity, you will keep this information brief and limit ed to this table. . The first step has been provided for you as an example of how to ‘right - size’ the informati on you are adding to the table.Courses of Action: Unauthorized Activities Step 1: Objective: < Decide who, what, where, and how to conduct the cyberattack . Prior to completing your table, read the scenario. Summarize the attack objective you see in that scenario here as a way to situate yourself prior to completing the table. This requires that you read and fully synthesize the scenario, as the attack objective is not explicitly listed.> Step 2: Attack Methods and Features: To succeed, an attacker must complete all of the identified attack steps in the proper sequence before the defender applies countermeasures or some unknown variable changes the operating environment under attack. For this step, you will complete the Attack Phase and Attack Action columns below. Ensure your phase and actions are organized according to their order of execution. Step 3: Detection Location and Methods After completing Step 2, you will fill in the two columns below as indicated. Step 4: Response Method After completing Step 3, fill in the column below by identifying and describing the intent of the countermeasure (i.e. to identify, detect, disrupt, deny, etc.) for the corresponding attack action. Also identify important procedural steps necessary to implement the countermeasure. Step 5: Response Objective: After completing Step 4, identify the phase of the IR process in which this countermeasure is most likely to be implemented, choosing from the provided list. Attack Phase Identify the phase of the Kill Chain most closely aligned with the specific attack actions. (Targeting, Reconnaissance, Weaponization, Exploitation, Attack Action(s) Fill in the attack actions (the list of specific malicious tasks performed to complete the attack) and number them in the order in which they would be performed. Indicator(s) of Attack List an anomalous event or effect that can serve as a signal to a defender that the attack is underway. Detection Point Identify a likely target system or asset for the attack action you have identified in Step 2. Defensive Countermeasure(s) Describe your defensive course of action. (Note: In a professional setting, you may find it valuable to create a library of countermeasures using a standard template, and to simply reference the specific procedure document in the box below. Courses of action tables are intended to be living Defensive Phase Identify the phase of the incident response process most closely aligned with each countermeasure. (Preparation, Identification, Containment, Eradication,
Installation, Command and Control, Actions on Objective) Step Describe Malicious Task documents that change as attackers evolve their attacks and incident responders mature their defensive capabilities.) Recovery, Lessons Learned) Targeting 1 Identify insecure public-facing target system Spike(s) in network traffic from unusual IP address(es) Public-facing web server log(s) Perimeter firewall log(s) Catalog and suspicious IP address(es) for further analysis Conduct targeted research into IP Address registration and DNS data Preparation
Visual: Interaction Between Cyberattack and Incident Response Processes Logical Framework: The interaction between cyberattacks and incident response processes is depicted in the graphic below. A security practitioner could deduce the following from the graphic: 1. An attack is initiated by a malicious actor. 2. The attack progresses through its life cycle, up to the point where the attacker installs malicious software that allows for command-and-control communications to be established with a compromised target system. 3. Concurrently, t he organization’s security team detects an anomalous behavior associ ated with the attack. 4. The detection prompts the security team to initiate the organization’s incident response process . 5. The security team’s incident responders identify and characterize the attack . 6. Based on their understanding of the attack, the incident responders transition from the identification phase to the containment phase of the incident response process. In this case, they select and implement a countermeasure intended to disrupt the attacker’s command and control communications with the compromised target system. 7. The countermeasure succeeds, stopping the attacker from exerting control over the compromised target system; containment is achieved. 8. The attack is stopped before the malicious actor can perform the intended actions on the objective (i.e. the target system) that are necessary for them to successfully complete the attack. 9. The incident responders successfully stop the attack and continue working through the incident response process, gather lessons learned, and then use those lessons to better prepare for a similar incident in the future. The above graphic is an example of a useful visual aid for security practitioners tasked with modeling cyberattacks and preparing effective countermeasures. In a professional setting, it is not uncommon for security practitioners to use visual aids like the one above to simplify complicated concepts or problems, making it easier to perform security-related analysis. You may find this type of graphical model useful to construct your courses of action table. This graphic was constructed using Google Draw, a software tool available for free from Google. Microsoft Visio and Mindjet MindManager are other popular choices.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: Have you ever felt rain or snow falling down on you? Why do you think liquid water tends to move…
Q: Let X be the amount of time (in hours) the wait is to get a table at a restaurant. Suppose the cdf…
Q: What type of performance appraisal system was used? What are the advantages and disadvantages of…
Q: Does the pH of a solution increase or decrease when a strong acid like Hydrochloric acid (HCl) is…
Q: There are two steps in the usual industrial preparation of acrylic acid, the immediate precursor of…
Q: Simplify. Multiply and remove all perfect squares from inside the square roots. Assume x is…
Q: As the atoms get closer together they attract one another and the potential energy decreases, as…
Q: 26. A compulsive gambler is never satisfied. At each stage he wins £1 with probability p and loses…
Q: Where is calcium stored in the myofiber? Sarcomere Sarcoplasm ● Sarcolemma Sarcoplasmic reticulum
Q: A remote-controlled car is moving in a vacant parking lot. The velocity of the car as a function of…
Q: 1a) What is required for a reaction A B with AGO = +8.4 kJ/ mol to proceed in the net forward…
Q: How do citizens, both individually and collectively influence government policy? Use THREE examples…
Q: hat number is 35% of 20
Q: Hello,   I need help with PART A AND PART B, I was wondering if you can help me with PART A AND PART…
Q: Which of the following is a conjugate acid/base pair? A) H₂PO, PO 3- B) H₂PO, PO 3- C) HPO 2, PO 3…
Q: One type of engine used in space travel is an ion thruster. These engines produce a low force that…
Q: A very wide rectangular channel carries a discharge of 8 m³/s per metre width. The channel has a bed…
Q: El primer término de la secuencia es 0 y la diferencia común es-6. Escribe los primeros CINCO (5)…