M6A1 Case Study: Detection and Response

This activity will address module outcomes 1, 2, 3, and 4. Upon completion of this activity, you will be able to:

  • Identify why it is important to have a pre-established incident response plan. (CO 1, 2)
  • Analyze the importance of information sharing throughout the attack cycle. (CO 1, 4, 6)
  • Analyze how some breaches are detected. (CO 1, 2, 5)
  • Evaluate various response efforts (CO 1, 3)

Earlier in the module, we reviewed attack detection and response regulations, recommendations, policies, and plans. We also looked at the benefits of information sharing. When thinking about detection and response, it is important to also recognize that many breaches go undetected for long periods of time. Also, response efforts are not only limited to the internal parts of the organization. Response efforts may include communication to the public or steps that involve diplomatic or legal approaches, for example. For this assignment, we will look at a few case studies and examine how and when some breaches are discovered as well as various responses to attacks.

Please select one of the following attacks to review. You may also use outside reference material. Cite all reference material used.

Target:

Yahoo:

Stuxnet:

Card Systems Solutions, Inc:

Select one of the documents above and discuss the following:

  • What breach did you select?
  • What is the background of the attack?
  • Was the breach detected right away?
  • How much time (approximately) went by before the breach was discovered and reported?
  • Did the victim organization determine the extent of the breach? If so, explain.
  • What was the response? (Think about the various types of response and comment – Political/Diplomatic/Legal, Technical, Corporate).

Finally, when considering response and recovery, it can be important to understand how to address security flaws. Cryptography is important but can be difficult to implement. There are also ways to bypass authentication. Select two flaws from the article below and discuss how to avoid them. Do you have any recommendations regarding the attack you selected?

The paper should be 2 to 4 pages long. Use the American Psychological Association (APA) style (most current edition) for writing your assignment. You must use appropriate sources (properly cited) to support your position. Simply answering the questions that are part of the case is not enough. Provide thoughtful, well-supported analysis. You should also draw on other references if necessary to support your work.

Do you need urgent help with this or a similar assignment? We got you. Simply place your order and leave the rest to our experts.

Order Now

Quality Guaranteed!

Written From Scratch.

We Keep Time!

Scroll to Top