Syslogic Technologies Ltd is a consultancy firm that has contracts with Defence Agencies in Africa. It has several regional company offices in different countries. Employees, when in the office, utilize desktop computers that have Windows 10, Microsoft Office, anti-malware/virus software, and a special Integrated Communications Software application developed by another contractor. All of the software updates and patches are managed by the IT department of Syslogic Technologies Ltd. Group policies are used to lock down the desktop computers, including the use of Applocker to restrict the installation of any third-party applications. There are three hundred employees who work from their home offices due to the Covid 19 pandemic. Employees who work from home use their own computers, laptops, and personal smartphones. They authenticate to a cloud-based domain service, which is synchronized with the corporate internal domain service. The computers are updated and patched through the cloud-based domain service. Applocker is not used to restrict the installation of third-party applications. The database that hosts the information collected from the Integrated Communications Software application is hosted on a cloud-based file server, and their email server is hosted on Office 365. Other files created by employees get saved to a cloud-based file server, and the company uses work folders to synchronize offline copies back to their devices. A competitor learns that employees use their own personal smartphones to communicate with other employees of Syslogic Technologies Ltd. a) Discuss the Cyber Kill Chain Methodology that could be used in compromising Syslogic Technologies Ltd. Justify your answer. b) Develop a defence plan for Syslogic Technologies Ltd c) You have been assigned as a penetration tester at Syslogic Technologies Ltd, prepare your detailed Penetration Testing Plan that you would use.
Syslogic Technologies Ltd is a consultancy firm that has contracts with Defence Agencies in Africa. It has several regional company offices in different countries. Employees, when in the office, utilize desktop computers that have Windows 10, Microsoft Office, anti-malware/virus software, and a special Integrated Communications Software application developed by another contractor. All of the software updates and patches are managed by the IT department of Syslogic Technologies Ltd. Group policies are used to lock down the desktop computers, including the use of Applocker to restrict the installation of any third-party applications. There are three hundred employees who work from their home offices due to the Covid 19 pandemic. Employees who work from home use their own computers, laptops, and personal smartphones. They authenticate to a cloud-based domain service, which is synchronized with the corporate internal domain service. The computers are updated and patched through the cloud-based domain service. Applocker is not used to restrict the installation of third-party applications. The
a) Discuss the Cyber Kill Chain Methodology that could be used in compromising Syslogic Technologies Ltd. Justify your answer.
b) Develop a defence plan for Syslogic Technologies Ltd
c) You have been assigned as a penetration tester at Syslogic Technologies Ltd, prepare your detailed Penetration Testing Plan that you would use.
Trending now
This is a popular solution!
Step by step
Solved in 3 steps with 3 images