100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary Wk 5 - Apply: Summative Assessment: Backup PoliciesUniversity of Phoenix CYB/110A Trojan i $7.99
Add to cart

Summary

Summary Wk 5 - Apply: Summative Assessment: Backup PoliciesUniversity of Phoenix CYB/110A Trojan i

 4 views  0 purchase
  • Institution
  • Wgu

Wk 5 - Apply: Summative Assessment: Backup PoliciesUniversity of Phoenix CYB/110A Trojan is malware that disguises itself as a legitimate application. A Trojan horse payload is typically a backdoor that allows attackers to gain access to the infected computer. Trojans also give cybercriminals acces...

[Show more]

Preview 2 out of 13  pages

  • December 1, 2024
  • 13
  • 2024/2025
  • Summary
  • such as ip addresses
  • passwords
  • drive by
All documents for this subject (445)
avatar-seller
newage
Wk 5 - Apply: Summative Assessment: Backup Policies

University of Phoenix

CYB/110

A Trojan is malware that disguises itself as a legitimate application. A Trojan horse payload is
typically a backdoor that allows attackers to gain access to the infected computer. Trojans also
give cybercriminals access to sensitive, confidential information of a user, such as IP addresses,
passwords, and banking details. Oftentimes, Trojans are delivered via email attachments, drive-
by downloads, and/or posing as a legitimate application with hidden, malicious code embedded.
Once executed, Trojans deliver their payload and find ways to spread.


Preparation

 Decide who should be members of the Cybersecurity Incident Response Team (CSIRT).
o Vulnerability Manager, Threat Manager, Risk Manager.
o CSIRT core members should be comprised of cybersecurity personnel.
o Assign roles and responsibilities to every member.
 Determine Extended CSIRT Team members and Define Roles.
o Executive Lead, Professional Services Lead, Response Support (Legal, Public
Relations, Compliance, etc.).
 Define escalation paths.
o Incidents may start as lower impact/severity ratings and then increase as more
information is gathered. Establishing an escalation path is critical.
 Evaluate and secure critical system backups.
o Backups should be created, maintained, and secured before any incidents occur.
o During the initial stages of any incident, verify that backups are secure and not
impacted by the incident.

Detection
 Define Threat Indicators
o Unknown or unexpected services and applications configured to launch
automatically upon system boot.

, o Unknown or unexpected outgoing internet traffic.
o Anti-virus programs malfunctioning or becoming disabled for unknown reasons.
o Degraded processing capability (increased CPU utilization).
 Isolate infected systems ASAP.
o DO NOT power off machines, as forensic artifacts could be lost.
o Preserve the system(s) for further forensic investigation, reviewing system logs
and performing deep scans for malware.
 These steps should be performed to guide the investigation.
 Investigate malware to see if it is running with a user accounts credentials.
o If so, disable the user account(s) until the investigation is complete.
 Analyze the malware to determine how to contain the outbreak.
o If available, use a sandboxed malware analysis system to perform analysis.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller newage. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

53022 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.99
  • (0)
Add to cart
Added