100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Brunel - Computer Science - CS3609 Cybersecurity Exam Practice Questions with Solutions £15.69   Add to cart

Exam (elaborations)

Brunel - Computer Science - CS3609 Cybersecurity Exam Practice Questions with Solutions

 136 views  5 purchases

CS3609 Cybersecurity Exam Practice Questions with Solutions which I used to practice my essay writing and answers structure to achieve a first class honour in this module at Brunel University.

Preview 2 out of 7  pages

  • February 28, 2022
  • 7
  • 2020/2021
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (11)
avatar-seller
cslbrunel
Mitre Attack
Framework




An attack scenario can be described due to the findings of the Red Team exercise. Firstly, adversaries
would begin the attack with Reconnaissance tactics. The technique of ‘Active Scanning’, specifically
the subtechnique ‘Vulnerability Scanning’ (MITRE ATT&CK, T1595.002) would be executed. This is
accomplished by using an application or software tool, which gathers information including
identifying systems, services, and the version type (Andrew, 2020). This attack scenario would be
performed outside the network and would use a non-intrusive scan. This would then identify that
Brunel Tech is running an outdated version of the Apache Tomcat server. This version of the
software has a bug and therefore attackers will exploit this vulnerability (CVE Mitre 2019-0232). The
attackers would not have been able to continue with their attack if Brunel Tech kept their software
up to date. However, due to the identification of the vulnerability, the adversary will now commence
the attack. Additionally, mitigations at this stage may be difficult, being a start-up company, Brunel
Tech is unlikely to have cyber security experts working to monitor suspicious network traffic.

Since the adversaries have discovered a vulnerability with the server, their next step is to begin the
Initial Access tactic. The ‘Exploit Public-Facing Application’ technique will be used to take advantage
and establish access into the network (MITRE ATT&CK, T1190). Brunel Tech could consider investing
in vulnerability scanners themselves in order to patch up any weaknesses identified.



The next step is for the Execution tactic to begin. The Common Gateway Interface (CGI) is the
interface to execute programs and applications on the web server. The vulnerability discovered is
that ‘enableCmdLineArguments’ is enabled, which allows for the adversaries to execute scripts and
commands to the server. This is referred to as the ‘Command and Scripting Interpreter’ technique.
(MITRE ATT&CK, T1059). The attacker will deploy unauthorised scripts and commands associated
with account creation using PowerShell.

Therefore, the attacker will have now moved onto using a Persistence tactic to use the technique
‘Create Account’ to maintain access to Brunel Tech’s systems (MITRE ATT&CK, T1136.001).
Mitigations include a multi-factor authentication; Brunel tech should use a 2 Factor Authentication
(2FA). This is when a system would request for an additional token once a user logs on, which would
have been effective to avoid this attack scenario. For example, inserting a physical smart card to
access a machine or browse files which only Brunel Tech employees would have.

, The adversaries are now in the final phases and will use the Command and Control tactic, and scripts
can be used to download and launch Remote Access Software. The attacker will now be able to roam
the infested machines using the Remote Access software ‘LogMein’ (MITRE ATT&CK, T1219). The
attacker having gained access will now pose a threat to several of Brunel Tech’s assets, including
customer and employee data and will now be stolen, violating their privacy, as the attackers
commits data theft.

Brunel Tech is likely to have information such as payroll slips with banking details and National
Insurance numbers. Additionally, names, contact information and other sensitive data will be
extracted and the attacker will now have the ability to share the data, as well as commit identify
theft. This will be complete through the Exfiltration tactic, with the technique ‘Transfer Data to
Cloud Account’ (MITRE ATT&CK, T1537). This consists of transferring all the accessible data on the
infested machine, to a cloud account the attacker has access to for example Mega.nz.

Overall, the threat agent in this scenario being a Black-Hat Hacker reveals the potential threats,
which have been identified within this attack scenario, including but not limited to data theft and
data loss to the assets, this being customer and employee data. The impact of this can be
detrimental to the company, with the impact including fines from the UK government due to the
lack of security and being responsible for the breach in the General Data Protection Regulation.




Intrusion Detection Systems (IDS) is a device or piece of software that monitors networks for
malicious activity, policy violations or unwanted intrusions. Anomaly based IDS uses statistical
techniques to discover unusual behaviour. The objective is to find patterns in network traffic that do
not conform to the expected normal behaviour.

One apporach of anomaly-based IDS includes the statistical approach. This approach looks for
correlations and deviations from the normal data and uses statistical tests to identify what the
correlations are for the data and flag up any signficant changes from the norm. One example
includes the t-test which is one of the simplist statistical tests used to determine the difference
between the means of two groups. Prior to executing these tests, there must be a large amount of
data available and the data must be normal which can be done through the application of the
kolmogorov-smirnov test for normalist which ensures the data is normal. If the data is not normal,
parametric stastic techniques cannot be used and therefore a non-parametric test such as chi
squared test can be used through ranking the data.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller cslbrunel. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £15.69. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£15.69  5x  sold
  • (0)
  Add to cart