Analyze the infamous worldwide Wanna Cry ransomware attack from an incident response perspective

CSI3351Group Assignment to Establish Security Monitoring and Respond to Cybersecurity IncidentsContentsDetails…………………………..…………………………..…………………………..…………………………..…………………1Background…………………………..…………………………..…………………………..…………………………..………….1Task…………………………..…………………………..…………………………..…………………………..…………………….

Describe, explain, and visualize the attack using the MITRE framework and the Lockheed Martin Cyber Kill Chain

CSI3351Group Assignment to Establish Security Monitoring and Respond to Cybersecurity IncidentsContentsDetails…………………………..…………………………..…………………………..…………………………..…………………1Background…………………………..…………………………..…………………………..…………………………..………….1Task…………………………..…………………………..…………………………..…………………………..…………………….

Which SOC/SIEM tools could be used for , preventing, detecting, mitigating ransomware attacks and why?

CSI3351Group Assignment to Establish Security Monitoring and Respond to Cybersecurity IncidentsContentsDetails…………………………..…………………………..…………………………..…………………………..…………………1Background…………………………..…………………………..…………………………..…………………………..………….1Task…………………………..…………………………..…………………………..…………………………..…………………….

CSI3351: Establish Security Monitoring and Respond to Cybersecurity Incidents

CSI3351Group Assignment to Establish Security Monitoring and Respond to Cybersecurity IncidentsContentsDetails…………………………..…………………………..…………………………..…………………………..…………………1Background…………………………..…………………………..…………………………..…………………………..………….1Task…………………………..…………………………..…………………………..…………………………..…………………….

Connecting to a WAN offers many advantages and pitfalls

  1. Discuss this statement: “Connecting to a WAN offers many advantages and pitfalls”.

Exactly how does connecting to WAN offer pitfalls and to whom?

Given, Connecting to WAN offers advantage and pitfalls and discuss how connecting to WAN offer pitfalls and