Syslogic Technologies Ltd is a consultancy firm that has contracts with Defence Agencies in Africa. It has several regional company offices in different countries. Employees, when in the office, utilize desktop computers that have Windows 10, Microsoft Office, anti-malware/virus software, and a special Integrated Communications Software  application developed by another contractor. All of the software updates and patches are managed by the IT department of Syslogic Technologies Ltd. Group policies are used to lock down the desktop computers, including the use of Applocker to restrict the installation of any third-party applications. There are three hundred employees who work from their home offices due to the Covid 19 pandemic. Employees who work from home use their own computers, laptops, and personal smartphones. They authenticate to a cloud-based domain service, which is synchronized with the corporate internal domain service. The computers are updated and patched through the cloud-based domain service. Applocker is not used to restrict the installation of third-party applications. The database that hosts the information collected from the Integrated Communications Software application is hosted on a cloud-based file server, and their email server is hosted on Office 365. Other files created by employees get saved to a cloud-based file server, and the company uses work folders to synchronize offline copies back to their devices. A competitor learns that employees use their own personal smartphones to communicate with other employees of Syslogic Technologies Ltd.   a) Discuss the Cyber Kill Chain Methodology that could be used in compromising Syslogic Technologies Ltd. Justify your answer.  b) Develop a defence plan for Syslogic Technologies Ltd    c) You have been assigned as a penetration tester at Syslogic Technologies Ltd, prepare your detailed Penetration Testing Plan that you would use.

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

Syslogic Technologies Ltd is a consultancy firm that has contracts with Defence Agencies in Africa. It has several regional company offices in different countries. Employees, when in the office, utilize desktop computers that have Windows 10, Microsoft Office, anti-malware/virus software, and a special Integrated Communications Software  application developed by another contractor. All of the software updates and patches are managed by the IT department of Syslogic Technologies Ltd. Group policies are used to lock down the desktop computers, including the use of Applocker to restrict the installation of any third-party applications. There are three hundred employees who work from their home offices due to the Covid 19 pandemic. Employees who work from home use their own computers, laptops, and personal smartphones. They authenticate to a cloud-based domain service, which is synchronized with the corporate internal domain service. The computers are updated and patched through the cloud-based domain service. Applocker is not used to restrict the installation of third-party applications. The database that hosts the information collected from the Integrated Communications Software application is hosted on a cloud-based file server, and their email server is hosted on Office 365. Other files created by employees get saved to a cloud-based file server, and the company uses work folders to synchronize offline copies back to their devices. A competitor learns that employees use their own personal smartphones to communicate with other employees of Syslogic Technologies Ltd.

 

a) Discuss the Cyber Kill Chain Methodology that could be used in compromising Syslogic Technologies Ltd. Justify your answer. 

b) Develop a defence plan for Syslogic Technologies Ltd 

 

c) You have been assigned as a penetration tester at Syslogic Technologies Ltd, prepare your detailed Penetration Testing Plan that you would use.

Expert Solution
trending now

Trending now

This is a popular solution!

steps

Step by step

Solved in 3 steps with 3 images

Blurred answer
Knowledge Booster
Security Techniques and tools
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education