Information Security Incident RESEARCH SCENARIO

RESEARCH SCENARIO

ABC Services Ltd (‘ABC’) is a global financial services provider. To comply with local regulatory frameworks, they operate offices around the world, most of which have a legal requirement to store their Know Your Customer (‘KYC’) information in on-site servers.

One of these servers, located in Lebanon, was recently infected with a variation of malware called ransomware, which has prevented ABC from accessing their local KYC data by encrypting it with a secret key. The threat actor behind the attack left behind a file on the server that demands a ransom for the return/decryption of this data.

Once they became aware of this incident, they instructed their local IT team to bring the server offline to mitigate the risk of the malware spreading across their network. They also activated their business continuity plans to minimize disruption to their core business, which involved recreating the servers from backups taken over a month ago.

ABC approached YOU  to help them answer several questions, specifically:

 What type of ransomware was used?

 How is the ransomware typically delivered? 

 What is the likely profile of the original developers of the ransomware?

 What is the likely profile of a threat actor using this ransomware?

 Are there any known methods of decrypting the data encrypted by the ransomware?

 What is the likelihood that the ransomware has exfiltrated data?

 What additional information would you require to investigate whether the threat actor has exfiltrated KYC data?

They have provided you with a sample of the ransomware and asked you to carry out a preliminary investigation. The sample they provided contains the following key information: 

 Info.exe  (the ‘executable’) – this is the file name of the ransomware that was used to encrypt ABC’s data.

[email protected] and [email protected] – these email addresses are provided in the ransom note left as a text file on the client’s systems, as a means of contacting the threat actor. 

 .no_more_ransom – this file name suffix is present on files encrypted by the ransomware that affected your systems and data. 

Your Task

Please research and prepare a written summary of findings to answer ABC’s questions in an MS Word report.  While you will certainly have to make assumptions about the situation, we will expect you to be able to explain and answer above questions at a high level about some of the key technical concepts involved in your findings.

Examples of topics you may consider including in the report are:

 RDP, asymmetric encryption, brute forcing, and phishing. Please be sure to capture the key findings from your research into the malware as well as the potential implications of this incident for ABC. 

  

Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.

Please write a 350 words essay

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard, typically covertly, so that the person using the keyboard is unaware that their actions are being monitored. Explain a situation where using a keyloggers may be used in either a legitimate (legal) way or used as a tool for criminals.

What do I Know About Where I Live?

 For this discussion, you are to use the following website: https://www.census.gov/acs/www/data/data-tables-and-tools/data-profiles/2017/ (Links to an external site.)

  • On the landing page, type in the name of your state, and then the name of your city or place.
  • Click on “Get Data Profile”.
  • On the new page, you will see links to 4 sets of information on your area:  
    • Social
    • Education
    • Housing
    • Demographic
  • Choose any two variables you think might be related and find them by  using the links to the related set.  In the tables, locate the  variables you chose to work with. For example, you could use the number  of rooms (in a house) under Housing and household incomes and benefits  under Economy.
  • Find the values for each of your two variables for several years.  For example, you might use the number of rooms and household income for  the years 2012- 2017.
  • Use Excel to make a scatterplot and to find the correlation  coefficient. You should then have 6 points on the scatterplot, one for  each year.

Share your scatterplot and correlation coefficient in your post and use them to address the following in your discussion post:

  • Why did you think a relationship exists between the two variables you chose? 
  • Based on the Excel scatterplot and output 
    • State what type of relationship exists:  Negative, positive, or none. 
    • Describe the relationship in words including what happens to one as  the other changes. For example, as the number of rooms in a house  increases, does the family income increase as well?
  • Does the statistical information you obtained support or refute your alternative hypothesis that a relationship exists? 
    • How?
    • If you did not find a relationship, why do you think that is?
  • What is the value to knowing there is a correlation between the  variables? For example, what businesses might flourish in a wealthy  area?   
  • Would another variable better explain the relationship?  
  • How might the city use such information to make improvements?  For  example, if you found a relationship between crime and poverty would it  make sense to make addressing poverty a priority?
  • Can you conclude that one variable is causing the other? Why or why not?

QUANTITATIVE Journal Article Review

You will review both quantitative and qualitative research.  The topic is up to you as long as you choose a peer-reviewed, academic research piece.  I suggest choosing a topic that is at least in the same family as your expected dissertation topic so that you can start viewing what is out there.  There are no hard word counts or page requirements as long as you cover the basic guidelines.  You must submit original work, however,  and a paper that returns as a large percentage of copy/paste to other sources will not be accepted.  (Safe Assign will be used to track/monitor your submission for plagiarism. Submissions with a Safe Assign match of more than 25% will not be accepted.) 

Please use APA formatting and include the following information:

  • Introduction/Background:  Provide context for the research article.  What led the author(s) to write the piece? What key concepts were explored? Were there weaknesses in prior research that led the author to the current hypothesis or research question?
  • Methodology:  Describe how the data was gathered and analyzed.  What research questions or hypotheses were the researcher trying to explore? What statistical analysis was used?
  • Study Findings and Results:  What were the major findings from the study? Were there any limitations?
  • Conclusions:  Evaluate the article in terms of significance, research methods, readability and the implications of the results.  Does the piece lead into further study? Are there different methods you would have chosen based on what you read? What are the strengths and weaknesses of the article in terms of statistical analysis and application? (This is where a large part of the rubric is covered.) 
  • References  QUANTITATIVE Journal Article Review – SUBMIT HERE

Answer the following questions

 

  1. Demonstrate understanding of VBA’s functionality, applications, and differentiation from Visual Basic.
  2. Apply VBA to the development of automation macros, providing standardized, scalable, cost-effective, and error-free business solutions.
  3. Critique VBA’s use in automation for Web browsers to leverage the Internet to produce effective business solutions.
  4. Construct VBA automation solutions to maximize the functionality of Microsoft Office Applications to control functionality within the Office suite and automate repetitive jobs.
  5. Summarize how businesses can solve issues while remaining innovative, competitive and become more profitable by eliminating waste and performing a more complex and accurate analysis of data using VBA’s automation solutions.

Linux Implementation Proposal: Client Response Memo

 

Faster Computing was impressed with your presentation. The company is  interested in moving forward with the project, but the senior  management team has responded to the presentation with the following  questions and concerns:

  • How will security be implemented in the Linux systems—both workstations and servers?
     
  • End users have expressed some concern about completing their  day-to-day tasks on Linux. How would activities such as web browsing  work? How would they work with their previous Microsoft Office files?
     
  • The current Windows administrators are unsure about administering  Linux systems. How are common tasks, such as process monitoring and  management, handled in Linux? How does logging work? Do we have event  logs like we do in Windows?
     
  • Some folks in IT raised questions about the Linux flavor that was  recommended. They would like to see comparisons between your  recommendation and a couple of other popular options. What makes your  recommendation the best option?
     
  • How does software installation work on Linux? Can we use existing Windows software?
     
  • How can Linux work together with the systems that will continue to  run Windows? How will we share files between the different system types?
     

The deliverable for this phase of the project is a memo. There is no  minimum or maximum page requirement, but all of the questions must be  fully answered with sufficient detail. The recommended format is to  respond to the questions in a bulleted format. Provide sufficient detail  to fully address the questions. You must cite at least two quality  sources.

Template

  

Go2Linux, Inc.

 

Provide a brief summary of your recommendation

of a specific version of Linux. Explain how your choice meets the business need of Faster 

Computing, Inc.

The bold text questions below represent the specifics you need to focus on. For 

each question, refer to your Implementation Proposal (Assignment #1) for consistency. In this 

assignment you will provide technical details for Information Technology personnel.

Any example Linux commands should be properly displayed (e.g., in lower case) 

and any acronyms explained on first use (e.g., Secure Shell (SSH)).

·

How will you implement security in the Linux systems?

o

Start by outlining how you plan to migrate the existing Windows 

Servers to Linux. Ho

w will users authenticate? What technologies will be used? What 

kind of access controls will be used?

o

Will you recommend simple authentication mechanisms or employ 

multiple factors? For passwords, what policy(ies) will you recommend?

needed>

o

How will you handle data-at-rest and data-in-transit?

needed>

o

How will you enforce software installations and control which 

applications may run on the network?

·

End users have expressed some concern about completing their day-to-day tasks on 

Linux. How would activities such as email/web browsing work? How would they work 

with their previous Microsoft Office files?

o

There are several ways to address the use of existing applications. 

Conduct research to determine the available options.

o

For web browsing, you should provide at least 2 alternatives and 

consider the impact to initial configuration (bookmarks, extensions, plugins)

needed>

o

For Microsoft Office, provide a full discussion on how users will 

continue to open/edit/save office docs in the Linux environment. You should provide at 

least 2 alternatives.

·

The current Windows administrators are unsure about administering Linux systems. How

are common tasks, such as process monitoring and management, handled in Linux? 

How does logging work? Do we have event logs like we do in Windows?

o

Discuss your logging and monitoring approach in this section. You 

should include the location of specific Linux log files.

o

Discuss how admins can manage processes. It may be helpful to 

compare/contrast in familiar terms (e.g., the Windows Event Viewer). Discuss how to 

stop processes, including the corresponding commands.

·

Some folks in IT raised questions about the Linux flavor that was recommended. They 

would like to see comparisons between your recommendation and a couple of other 

popular options. What makes your recommendation the best option?

o

o

The key differentiator is …

·

How does software installation work on Linux? Can we use existing Windows software?

o

Discuss a Linux package management specific to your distro. How will

you automate updates?

o

Discuss how specific Windows applications can be installed and used,

if at all.

·

How can Linux work together with the systems that will continue to run Windows? How 

will we share files between the different system types?

o

Discuss how file and printer sharing will work. Will the users need to 

do anything “different”? What underlying technology will need to be implemented?

as needed>

Warm regards,

Go2Linux

Linux Deployment Manager

References

to be used. Ensure you utilize in-text citations in the body of your paper as appropriate.>

[1] Red Hat Enterprise, “Encryption,” Chapter 3, Section 3.1.3. Red Hat, Inc., 2019. [Online]. 

Available: https://access.redhat.com/documentation/en-s/red_hat_enterprise_linux/6/htm

l/security_guide/chap-security_guide-encryption#sect-Security_GuideLUKS_Disk_ 

Encryption. [Accessed December 1, 2019]. 

[2] TestOut Labsim, “TestOut Linux Pro,” Chapter 15, Section 15.8.3. TestOut, 2019 [Online]. 

Available: https://cdn.testout.com/client-v5-1-10-568/startlabsim.html. [Accessed 

December 6, 2019].

… and so on …

Analyzing and visualization data – Research paper

Research Paper topic :  Exploratory Data Analysis and Visualization for Restaurants E-Commerce Data (Using Tableau tool)

Instructions :  The research paper dives into the analysis and visualization of big data sets focusing on the Restaurants E-commerce Domain. Tableau will be the choice as it stands to be one of the efficient data visualization tools as compared to others specifically in the restaurants E-commerce Domain. The paper will help answer some of the frequently asked industry questions to solve business problems.  The paper will describe how Tableau will support platforms used for Big data such a NoSQL. 

–> At least 1500 words

–> APA must and should

–> At least 6 references (4 of them must be scholarly peer reviewed articles)

–> All references must be current since 2015

–> Paper must be clearly explained and visualized how tableau is used to visualize the data with examples and the restaurant’s are impacted due to covid.

Simple Excel projects

Please contact me if you are good in word, powerpoint and excel. These are simple projects that has an instruction file and a pre- made file. All you have to do is follow the steps and edit  the pre-made file. I have total 11 projects. I am attaching a sample file. 

computing

 
File submission: Final project – Project-based learning 

 
Objective of the activity  Through this project the student will demonstrate the mastery of skills in the use of productivity applications MS Word 2016, MS Power Point 2016 and MS Excel 2016. 

 

Instructions

Access the following link. final project.docxPreview the document

 
Deliverable  The activity is individual. The work must be delivered on time, without spelling or grammatical errors. The works will be submitted to the tool to detect similarity of content (now Urkund). 

 
Activity value   82 points 

 
Basic review resources  Microsoft. (2018). Word for Windows Training. Retrieved from https://support.office.com/es-es/article/word-for-windows-training-7bcd85e6-2c3d-4c3c-a2a5-5ed8847eae73 (Links to an external site.) Shelly Cashman Series (2017). Microsoft Office 365. Office 2016 Advanced. Boston: Cengage Learning. Pages WD433 –WD676 (Links to an external site.) Shelly Cashman Series (2017). Microsoft Office 365. Office 2016 Advanced. Boston: Cengage Learning. Pages PPT409 – PPT647 Shelly Cashman Series (2017). Microsoft Office 365. Office 2016 Advanced. Boston: Cengage Learning. Pages EX433 – EX684 Tutorials for modules III – VIII Supplemental review resources  Microsoft. (2019). Tips for creating and presenting an effective presentation. Retrieved from https://support.office.com/es-es/article/sugencias-para-crear-y-realizar-una-presentaci%C3%B3n-eficaz-f43156b0-20d2-4c51-8345-0c337cefb88b (Links to an external site.) Universia Colombia. Retrieved from https://noticias.universia.net.co/en-portada/noticia/2015/03/13/1121434/9-consejos-buena-presentacion-power-point.html