Expert answer:Cybersecurity Incident Report

Solved by verified expert:Cybersecurity Incident Report
cybersecurity_incident_report.docx

Unformatted Attachment Preview

Cybersecurity Incident Report
First Name Last Name
University of Maryland University College
Executive Summary
Keep this summary to 1-page maximum! Write in past tense. Get right to the purpose of why
the CIR was written and cover the main points of the report. In a few sentences give your overall
conclusion.
Cybersecurity Incident Report
Give a very brief introduction to a major media and entertainment company for which
you are the cybersecurity incident manager. Describe the purpose of this cybersecurity incident
report (CIR) as a need to help the company leadership understand the technologies used in
wireless networks and mobile device management. This CIR will educate them about threats,
impacts, protections, and incident response strategies related to wireless, mobile, and bring your
own device (BYOD) policies.
Wireless and BYOD Security Plan
Rogue Access Points
Discuss the threat of unauthorized equipment or rogue access points on the company
wireless network and the methods to find other rogue access points. Describe how to detect
rogue access points and how they can actually connect to the network.
Authorized Access Points
Describe how to identify authorized access points within your network.
Cyber Kill Chain
Discuss how the Cyber Kill Chain framework and approach could be used to improve the
incident response times for networks. This framework/approach should be treated as your
foundation for all wireless and BYOD-related problems within the network.
Tracking Suspicious Employee Behavior
Discuss identity theft and MAC spoofing. Can they happen in the workplace? How
would you protect against both identity theft and MAC spoofing? Is it feasible to determine if
MAC spoofing and identity theft has taken place in the workplace? How? Include a whitelist of
approved devices for your company network. Examples may include authorized access points,
firewalls, and other similar devices.
Are there any legal issues, problems, or concerns with your actions of tracking a
suspected employee? What should be conducted before starting this investigation? Were your
actions authorized, was the notification valid, or are there any other concerns?
Continuous Improvement Plan
Wired Equivalent Privacy and Wi-Fi Protected Access Networks
Describe and discuss wired equivalent privacy and Wi-Fi protected access (WPA)
networks, to include WPA2. What are the pros and cons of each type of wireless network?
Since WPA2 uses encryption to provide secure communications, define the scheme for using
pre-shared keys for encryption. Is this FIPS 140-2 compliant, and if not, what is necessary to
attain this?
Comparative Analysis of Protocols
Include a list of other wireless protocols, such as Bluetooth, and provide a comparative
analysis of at least four protocols including the pros, cons, and suitability for your company.
Remote Configuration Management
Describe remote configuration management and discuss how it is used in maintaining the
security posture of your company’s network. Discuss a scenario of finding an undocumented
device on the network. You have determined that the owner of the device should be removed
from the network. Implement this and explain how you would remove the employee’s device.
How would you show proof that the device was removed?
Employee Misconduct
Describe and discuss ad hoc wireless networks and identify the threats and vulnerabilities
this type of network may present to your company. Can these networks contribute to the
company infrastructure? Address self-configuring dynamic networks on open access
architecture and the threats and vulnerabilities associated with them, as well as the possible
protections that should be implemented.
Discuss a scenario of discovering an employee that has recorded logins during unofficial
duty hours. The employee has set up access through an ad-hoc wireless network. From your
position as an incident manager, how would you detect an employee connecting to a selfconfiguring network or an ad hoc network? How would you validate that the user is working
outside of business hours?
How would you protect against this type of threat? Use notional information or actual
case data and discuss. How would signal hiding be a countermeasure for wireless networks?
What are the countermeasures for signal hiding? How is the service set identifier (SSID) used by
cybersecurity professionals on wireless networks? Are these always broadcast, and if not, why
not?
Conclusion
This CIR helped educate company leadership about threats, impacts, protections, and
incident response strategies related to wireless, mobile, and bring your own device (BYOD)
policies. From here discuss your conclusions and recommendations…

Purchase answer to see full
attachment

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP