100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Brunel - Computer Science - CS3609 Cybersecurity (Pass) £20.47   Add to cart

Other

Brunel - Computer Science - CS3609 Cybersecurity (Pass)

1 review
 448 views  10 purchases

An assignment or coursework done for Brunel University for Cybersecurity module CS3609- Pass or fail. (2021)

Preview 2 out of 8  pages

  • February 28, 2022
  • 8
  • 2020/2021
  • Other
  • Unknown
All documents for this subject (11)

1  review

review-writer-avatar

By: reubendmello • 1 year ago

avatar-seller
cslbrunel
CS3609 CYBERSECURITY COURSEWORK
Task 1: Network Diagram


The following is a network diagram, referencing the Brunel Tech Start-up Scenario.

BRUNEL TECH START-UP SCENARIO:
A tech start-up company has just moved into a new office space and is setting up office equipment. Each desk
in the office space will have a PC connected to a local area network. A meeting space in the office will have a
projector, a gaming PC for graphics requirements and voice over IP (VoIP) devices for conference calls. The
company has set up a Windows server in its machine room to host its website and internal document storage,
CS3609 Cybersecurity Task 1 – Threshold Coursework for 2020/21 Updated October 2020 2 of 4 Department of
Computer Science which includes customer and employee contact details. Brunel Tech is also using Amazon
Web Services (S3 in particular) to back-up all internal documents to the cloud. Brunel Tech’s employees will also
be able to access documents from home computers and mobile devices, typically using a Wi-Fi network –
including the office WiFi network. In addition, a Linux-based controller (on the wall) connects to a Linux server
in the machine room and stores CCTV still images, captured from cameras in the office space, in an SQL
database.

, Task 2: Threat reporting and Attack Vector Mapping


An attack scenario can be described due to the findings of the Red Team exercise. Firstly, adversaries would
begin the attack with Reconnaissance tactics. The technique of Active Scanning, specifically the sub-technique
Vulnerability Scanning (MITRE ATT&CK, T1595.002) would be executed. This is using an application or software
tool, which gathers information including identifying systems, services, and the version type (Andrew, 2020).
This attack scenario would be performed outside the network and would use a non-intrusive scan, and with
these scans identifying that the target, Brunel Tech, is running an outdated version of Apache Tomcat server
(CVE Mitre 2019-0232). The attackers would not have been able to continue passed this stage if Brunel Tech
kept their software up to date. With the identification of the vulnerability the adversary will now commence
the attack. Additionally, mitigations at this stage may be difficult and being a start-up company, Brunel Tech is
unlikely to have cyber security experts and controls in place working to monitor suspicious network traffic
which would indicate scanning.

Since the adversaries have discovered a vulnerability with the server, their next step is now to begin the Initial
Access tactic. The Exploit Public-Facing Application technique will be used to take advantage and establish
access into the network. (MITRE ATT&CK, T1190) Brunel Tech could consider investing in vulnerabilities
scanners themselves in order to patch up any weaknesses identified.

The next step is for the Execution tactic to begin. The Common Gateway Interface (CGI) is the interface to
execute programs and applications on the web server. The vulnerability discovered being that
enableCmdLineArguments is enabled, which allows for the adversaries to execute scripts and commands to
the server which is referred to as the Command and Scripting Interpreter technique. (MITRE ATT&CK, T1059)
The attacker will use PowerShell commands and scripts to deploy unauthorised scripts and commands,
associated with account creation.

Therefore, the attacker will have now moved onto using a Persistence tactic to use the technique Create
Account to maintain access to Brunel Tech’s systems and network. (MITRE ATT&CK, T1136.001) Mitigations
include a multi-factor authentication, for Brunel tech using a 2 Factor Authentication (2FA) which consists of a
request for an additional token once a user logs onto a system would have been effective to avoid this attack
scenario, for example a inserting a physical smart card to access a machine or browse files which only Brunel
Tech employees would have.

The adversaries are now in the final phases and can simply use the Command and Control tactic, scripts can be
used to download and launch Remote Access Software. With the company having infested machines, the
attacker having created accounts, can now access, and roam the machines using the Remote Access software
LogMein. (MITRE ATT&CK, T1219) The attacker having gained access will now pose a threat to several of
Brunel Tech’s assets. Brunel Tech’s asset of customer and employee data will now be stolen, violating their
privacy, as the attackers commit data theft.

Brunel Tech is likely to have information such as payroll slips with banking details and National Insurance
numbers. Additionally, names, contact information and other sensitive data will be extracted and the attacker
will now have the ability to share the data as well as commit identify theft. This will be complete through the
Exfiltration tactic, with the technique to Transfer Data to Cloud Account (MITRE ATT&CK, T1537). This consists
of transferring all the accessible data on the infested machine, to a cloud account they have access to.

Overall, the threat agent in this scenario being a Black-Hat Hacker reveals the potential threats, which have
been identified within this attack scenario, including but not limited to data theft and data loss to the asset’s
customer and employee data. The impact of this can be detrimental to the company, with the impact including
fines from the UK government due to the lack of security and being responsible for the breach in the General
Data Protection Regulation.



1

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller cslbrunel. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £20.47. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

71184 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£20.47  10x  sold
  • (1)
  Add to cart