emerging threats and counter measures exercise problems
exercise problem:
A disgruntled former hospital employee with exceptional computer skills hacks into the hospital network from their home computer and plants a very aggressive computer virus into a Computer-Aided Facility
Management (CAFM) system. The computer virus activates at 1:00 a.m., shutting down the Hospital
Ventilation Air Conditioning (HVAC) system, security system, building automation, and patient medical
monitoring system. Please explain how the hospital’s cyber security team (CST) went about resolving the
problem.
case projects problem:
Let’s look at a real-world scenario and how the Department of Homeland Security (DHS) plays into it. In the scenario, the United States will be hit by a large-scale, coordinated cyber attack organized by China. These
attacks debilitate the functioning of government agencies, parts of the critical infrastructure, and commercial
ventures. The IT infrastructure of several agencies are paralyzed, the electric grid in most of the country is
shut down, telephone traffic is seriously limited and satellite communications are down (limiting the
Department of Defense’s [DOD’s] ability to communicate with commands overseas). International commerce
and financial institutions are also severely hit. Please explain how DHS should handle this situation.
Exercise Problem:
A diversified Fortune 500 corporation that provides products and services to domestic and foreign
governments and commercial customers suspected that a deceptive intruder was in their network; however,
they knew neither the extent of the compromise, nor what (if any) data had been breached. The persistent
deceptive intruders used tools and techniques that left trace evidence on each computer system they
compromised. These host-based indicators of compromise are present every time the intruders attack a
network. The corporation (client) called a team of advanced persistent threat (APT) experts to validate their
concerns, scope the intrusion, and provide a remediation strategy. APTs are used to identify, scope, and
remediate the APT in the government and defense industrial base. The APT consists of skilled and
sophisticated deceptive hackers who deploy a complex arsenal of deception malware against specific targets in
the Defense Industrial Base (DIB), financial, manufacturing, and research industries. Please explain how the
APT went about resolving the problem.
Case Project Problem:
Yahoo! is focused on delivering fast and reliable commerce, communications, and social networking services to
millions of users around the world. With one of the world’s largest network and cloud infrastructures, Yahoo!
faces unique challenges as it fulfills its vision to be the center of people’s online lives by delivering personally
relevant, meaningful Internet experiences. Yahoo!’s traffic volume and application complexity has grown
rapidly over the past decade, driving the company to build out a massive network and application
infrastructure to support more and more load. The company continues to invest in high-capacity servers, load
balancers, routers, and switches, plus massive firewalls. Previously, however, Yahoo!’s security team had no
way to stress this enormous critical infrastructure and measure its resiliency to ensure performance, stability,
and cyber security. Yahoo! needed a solution to validate the performance, functionality, and capacity of its
systems under a wide mix of real-world traffic, including video, instant messaging, and web applications, as
well as live cyber security attacks and load from millions of users. Please identify how Yahoo!’s security team
stressed their enormous critical infrastructure and measured its resiliency to ensure performance, stability, and
cyber security.
Please provide 250 words for each question and references.