Principles of Cyber security – Global Homework Experts

Case Study Question 1-6

order now

Using Cisco Umbrella, the industry leader in threat detection, your team captures and analyzed billions of queries to identify the biggest cyber threats to businesses today.

You are required to work on the following questions to train and prepare your team to protect Cyber-attacks as part of Cisco Umbrella’s team.

One of the Cyber-attacks is anonymous logins to systems which are considered as one of the major threats. Explain to the team the importance of login and password policies.

In regards to Cyber-attacked, a major threat, the following facts and explanation were presented to my team in regards to the importance of Login and password policies:

Importance of Login

 Password Policies

State a protocol of how-to setup the passwords followings good Password standard.

The team were briefed on the essential factors in regards to the protocol on setting up the password and the good standard of the password.

Identify and explain the two (2) ways password can be hacked? 

My team were given a clear explanation and identification in regards to how password can be hacked

Identification of 2 ways password can be hacked

Explanation on the 2 ways password can be hacked                            

Describe to the team about the possible cyber-attacks in banking services with examples.

The team given a clear description on the possibilities of the cyber-attacked in banking service with relevant examples:

Deletion of critical data

Provide 1 paragraph of description with an example

Manipulation of critical data

Provide 1 paragraph of description with an example

Disruption of industry wide critical services

Provide 1 paragraph of description with an example

Fraudulent transactions leveraging central infrastructure

Provide 1 paragraph of description with an example

Theft of critical non-public information

Provide 1 paragraph of description with an example 

Deletion of critical data

Manipulation of critical data

Disruption of industry-wide critical services

Fraudulent transactions leveraging central infrastructure

Theft of critical non-public information

Draw a diagram with appropriate labels to illustrate how to implement a secured system for banking services.

Select an appropriate image from Internet which can explain implement a secured system for banking services

As a cyber-attack incident handling professional, you should advise your “Cisco Umbrella team” on forensic techniques and how to handle the situation when incidents happen. Your answer should provide example for incidents that may happen in real time and how forensic experts can handle the cyber-attack.

I have given all the relevant advice to my Cisco Umbrella team and they are:

6.1    Cisco Umbrella team” on forensic techniques

6.2    How to handle the situation when incidents happen

6.3    Using a real example how forensic experts can handle the cyber-attack