You work in the Business Security and Development branch of the Bank of SA. It is 17 April 2018 and news has just broken about Russian state-sponsored cyber attacks. Your manager (who does not have an IT background) knows that the Bank uses Cisco equipment but is having difficulties understanding the US-CERT alert that he has been given.
He tasks you to provide him with a brief about the situation and its likely impact for the Bank. He has also asked that you email an overview of the situation to your IT colleagues throughout the organisation so they are all aware of what is occurring and what the impact on their roles may be. And the Corporate Communication team has asked that you draft some web content that they can post for users who may be concerned about the security of the Bank’s systems and their personal assets. As this is needed as soon as possible, you turn to the official word from US-CERT and use Alert TA18-106A as your only source for information.
Source material
US Computer Emergency Readiness Team (2018) Alert (TA18-106A) Russian state-sponsored cyber actors targeting network infrastructure devices, dated April 16, 2018 accessed 19 April 2018 < https://www.us-cert.gov/ncas/alerts/TA18-106A>.
Translate the source material into the three different texts for the audiences listed below. You are NOT critiquing the source document, giving your opinion on its content or adding further information from research. Your aim is to keep the integrity of the original document but repackage it into the three different texts with its message intact, and with a focus on the needs of the reader.
1. A brief for your business manager (not an IT specialist)
2. An email for your IT colleagues
3. Web content for users
You must also reflect on the considerations and challenges that you faced in completing this task.
On April 19th, 2018 it came to the attention of the NCCIC, and the FBI of malicious activities carried out by a group of Russians. The attack is targeting the techniques, tactics, procedures, and network indicators. By so doing the individuals are able to obtain sensitive information and system files of devices that are interconnected. NCCIC has put in place mechanisms that organizations can use in order to detect and prevent the attacks from happening to an organization. These mechanisms include the system and network administrators inspecting instances of traffic flowing from unknown addresses and the modification and destruction of system files and logs [1]. This alert focuses on devices such as routers, intrusion detection systems, and switches. The Russian attackers are focusing on both government and private organizations. By the use of the compromised devices, the attackers are able to obtain intellectual property, maintain consistent access to the networks of the victims, and create a basis to perform future attacks.
The key purpose of the technical alert is to provide extensive information regarding the activities conducted by the Russian attackers and provide the information needed for the identification of malicious attacks on network devices. Also, it aims at providing information necessary for reducing susceptibility to this activities.
The attackers utilize various weaknesses in the network administration activities. The weak points are used to identify potential devices for an attack, extract system settings and configurations, collect login information and credentials, and obtain administrator privileges on the devices. They can also redirect the victim's network traffic through routers controlled by the attackers. In taking advantage of the points of weakness the attackers do not need to install malware on the target devices, they use the existing system setting on these devices to conduct the attacks [2]. Authentication of services, hardening of devices before installation, and keeping network devices up to date with updates from manufacturers are essential tips in ensuring that the attackers have no access points to an organization's systems [3]. Network devices are considered easy targets because after installation little is done to maintain them. Few network devices contain antivirus programs and other security tools that could protect them from the attackers. The default settings of many devices are usually not changed, and hence the attackers have a clue of where to start. This is due to the fact that the most devices from the same manufacturer have the same default settings.
The impact of the attackers is divided into stages which include the reconnaissance which focuses on the identification of internet services and ports that depict the intrusion vulnerabilities. The weaponization stage and the delivery stage which focuses on making the target device to send system files and configurations to the attackers [4]. The exploitation stage focuses on the imposter aspect of the attackers as legitimate users to exploit the identified network devices. Here the attackers have obtained the necessary login credentials and can authorize and authenticate device functions. The installation stage allows the attackers to download and overwrite files in the network devices especially those by Cisco. The final stage is the impact and control stage where the attackers practically log in to a network device and establish connections to previously uploaded operating system images [5] that contain a backdoor. As a result, the attackers are able to execute commands with administrator privileges.
Based on the Technical attack which is focusing on the attack on infrastructure relating to network devices. This is to bring to your attention the specific system areas that are affected. These systems include the enabled devices for generic routing encapsulation, enabled devices for Cisco smart install, and the network devices enable to use the simple network management protocol. As a result of this developments, system administrators are encouraged to inspect network traffic flowing to and from addresses that are unknown. This is with key consideration on protocol 47. You should also be on the lookout for the creation of the GRE tunnel, log file destruction, and modification [6]. The individuals perpetrating this attacks take into consideration protocols with vulnerabilities which include weak protocols and service ports. Through the exploitation of this weaknesses, they are able to obtain sensitive device information, identify and access exposed devices, copy access credential, alter device configuration, operating systems, and firmware. Therefore in order to stay safe from this attacks network traffic should be monitored with highest essence possible, network logs should be reviewed often for SMI and TFTP devices with consideration on port 4786 of all devices on a network, evaluate and analyze device logs for evidence of UDP SNMP directed traffic on port 161 and 162 on hosts to network devices [7]. Determination of the presence and use of SMI and SIET is essential
Taking into consideration information regarding the attacks directed to network devices. The organization has deemed it necessary to inform you that there is no course for alarm as it is doing everything possible to ensure that all security measures are in place. Your assets and information are safe, and there is no course for alarm. The target of the attackers is to take advantage of areas that they consider to be weak to obtain information relating to user login credentials, modification of operating system settings; they also extract system settings. They also limit traffic that flows through the routers [8]. The Russian attackers take advantage of vulnerabilities relating to unencrypted data and services that have not been authenticated, devices that are not up to date on security updates from the developers and manufacturers, and devices that have not been hardened sufficiently before they are installed.
The organization has a number of actions that it can take to ensure that the Russian attackers do not find a leeway to attack it. This steps may include the following. The flow of unencrypted data into and out of the organization will be limited [9]. Activities in relation to management should be done through private virtual networks where both sides are encrypted that is the sending and the receiving end. Access to the management interface will be limited, and no network device will be allowed to interact with it. This can be achieved by blocking access sourced from the internet to the management interface and restricting it to the trusted internal host [10]. Password policies are an essential aspect of maintaining high levels of security. Therefore, default password policies should be changed, and a strong password policy should come into play. Same passwords should not be used to access different devices. The passwords should only be applicable to a particular device alone. It is strongly recommended to employ the use of two-factor authentication [11].
Handling this task was quite challenging. In handling this task, various issues presented a challenge which I had to overcome to bring into perspective the message to fit the intended audience. In completing this assignment, I had to take into consideration the perspective of each and every audience. I had to understand how each and every individual viewed the technical alert. For instance, when preparing the brief for the business manager, I had to take into consideration aspects of management. Managers are concerned with the what? And how?. Therefore, I had to extract from the source description of what the threat was all about. I had to bring into perspective how the attack came into perspective. And since management are involved with systematic and strategic issues, I had to bring in a systematic perspective on the issue.
When preparing the email to IT colleagues, I had to take into consideration the information that IT professionals are concerned with. This information involved the methods used to access network devices and the proposed solutions and what the network administrators and all other IT colleagues needed to do to ensure that the security policies are of the highest degree possible to ensure that the attackers do not exploit vulnerabilities in network devices. Here I had to bring into perspective a technical and implementation perspective.
Preparing web content for the users was the most challenging aspect of them all. Users are always very pessimistic when issues relating to their assets are brought into perspective. Therefore I had to try to extract content that relates to the user from the source. The user is greatly concerned with how his information and assets can be protected from the attackers and therefore I had to act as an agent for creating confidence in the minds and perspectives of the users. I had to transform a pessimistic perspective to an optimistic perspective. Consolidating this two perspectives was quite a challenge.
[1] EC-Council, Ethical Hacking and Countermeasures: Secure Network Operating Systems and Infrastructures (CEH), Book 4, Cengage Learning, 2016.
[2] A. Behl, Securing Cisco IP Telephony Networks: Securing Cisco IP Teleph Network, Cisco Press, 2012.
[3] Cisco Networking Academy, Introduction to Networks Companion Guide, Cisco Press, 2013.
[4] N. Meghanathan, S. Boumerdassi, N. Chaki and D. Nagamalai, Recent Trends in Networks and Communications: International Conferences, NeCoM 2010, WiMoN 2010, WeST 2010,Chennai, India, July 23-25, 2010. Proceedings, Springer Science & Business Media, 2010.
[5] E. Gilman and D. Barth, Zero Trust Networks: Building Secure Systems in Untrusted Networks, "O'Reilly Media, Inc.", 2017.
[6] E. Seagren, Secure Your Network for Free, Elsevier, 2011.
[7] I. Dubrawsky, How to Cheat at Securing Your Network, Syngress, 2011.
[8] M. Gregg, The Network Security Test Lab: A Step-by-Step Guide, John Wiley & Sons, 2015.
[9] C. Bowman, A. Gesher, J. Grant, D. Slate and E. Lerner, The Architecture of Privacy: On Engineering Technologies that Can Deliver Trustworthy Safeguards, "O'Reilly Media, Inc.", 2015.
[10] J. Vacca, Computer and Information Security Handbook, Newnes, 2012.
[11] Advances in Information Technology Research and Application: 2013 Edition: ScholarlyBrief, ScholarlyEditions, 2013.
To export a reference to this article please select a referencing stye below:
My Assignment Help. (2021). Business Communication. Retrieved from https://myassignmenthelp.com/free-samples/bus101-business-communication/brief-to-business-manager.html.
"Business Communication." My Assignment Help, 2021, https://myassignmenthelp.com/free-samples/bus101-business-communication/brief-to-business-manager.html.
My Assignment Help (2021) Business Communication [Online]. Available from: https://myassignmenthelp.com/free-samples/bus101-business-communication/brief-to-business-manager.html
[Accessed 20 April 2021].
My Assignment Help. 'Business Communication' (My Assignment Help, 2021) <https://myassignmenthelp.com/free-samples/bus101-business-communication/brief-to-business-manager.html> accessed 20 April 2021.
My Assignment Help. Business Communication [Internet]. My Assignment Help. 2021 [cited 20 April 2021]. Available from: https://myassignmenthelp.com/free-samples/bus101-business-communication/brief-to-business-manager.html.
If you are searching for the best writing services that also offer proofreading services, then MyAssignmnethelp.com is the answer. Let us help you boost your career by giving you the best solution for your paper.
We have got the best editors in the team who are experienced in their field. They also use advanced plagiarism checker tools for students, providing an authentic solution on every order. As you may realize, even the most celebrated scholars need assistance when it comes to proofreading. So instead of searching “who can edit my paper,” put your faith on MyAssignmenthelp.com.
Answer: Managing the human resource refers to the function that are performed by managers to maintain the performance of organisational employees. The human resource department plays a significant role; it is used for managing and allocating resources, providing the direction to the employees so that vision and goals are achieved. They aim to develop a positive environment at the workplace so that employees remain motivated and contributed to ...
Read MoreAnswer: An educator in an early childhood education and care facility is obliged to educate and ensure the safety of the children. These professionals need to supervise and assist children by providing them with high-quality guidance. Serving the welfare of an individual kid, educators are allowed to be in direct contact with the relevant families with children in the center Overarching Responsibilities Educators’ overarching responsib...
Read MoreAnswer: The “fence” is an American drama by August Wilson featuring Troy Maxon as the protagonist. Troy was once a base ball player but did not get to play the Major League Baseball reason been he was a black American. He later works as a garbage collector in Pittsburg where he becomes the first black man to be a driver. Troy can be seen as an arrogant and proud man from the way he treats his friend Rono and his family; Rose, Cory,...
Read MoreAnswer: The world is full of heavy users of social media in recent times. Online or digital media websites namely The Age, Herald Sun and Independent have billions of people who use them on regular basis and are thus a rapid growing domain of information sharing (Nielsen and Schrøder 2014). Currently, digital media has comprised stories, information, opinions and narratives regarding elections as well as social justice moveme...
Read MoreAnswer: Gender involves the state of being male or female that often defines one's sexual identity. Women roles in the novel. 'Dracula" comprise of key complicated themes. The most prominent one receiving various critics over the years is the core and derogatory portrayal of women. Various critics and immense feminist movement and women traditional roles are depicted. Various stereotypical issues regarding gender roles have been largely discu...
Read MoreJust share requirement and get customized Solution.
Orders
Overall Rating
Experts
Our writers make sure that all orders are submitted, prior to the deadline.
Using reliable plagiarism detection software, Turnitin.com.We only provide customized 100 percent original papers.
Feel free to contact our assignment writing services any time via phone, email or live chat. If you are unable to calculate word count online, ask our customer executives.
Our writers can provide you professional writing assistance on any subject at any level.
Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.
Get all your documents checked for plagiarism or duplicacy with us.
Get different kinds of essays typed in minutes with clicks.
Calculate your semester grades and cumulative GPa with our GPA Calculator.
Balance any chemical equation in minutes just by entering the formula.
Calculate the number of words and number of pages of all your academic documents.
Our Mission Client Satisfaction
It was perfect I don\'t have to get it redone really on point and very happy with it thanks so much. You guys are a lifesaver
Australia
Good work from them!! Great service!! They didn’t make me wait on my work I got it on time!!
Australia
a great work. to be honest i was\'t sure if the expert would get everything right, but it turned really well.
Australia
The work has been done properly, exactly as required. I\'m very happy with it. Thanks to the expert for such a masterpiece.
Australia