Computer Information System

Task:
Step 1: Create a Network Architecture Overview
You travel to the various bank locations and gain access to their networks. However, you must first understand the network architecture of these banks.
Provide a network architecture overview along with diagrams. Your overview can be fictitious or based on an actual organization. The goal is to provide an understanding of the network architecture.
Step 2: Identify Network Attacks
you will identify possible cyberattacks such as spoofing/cache poisoning, session hijacking, and man-in-the-middle attacks.Provide techniques for monitoring these attacks using knowledge acquired in the previous step.
Step 3: Identify False Negatives and False Positives
identify the risks to network traffic analysis and remediation. Review the resources on false positives and false negativesDescribe your analysis about testing for false negatives and false positives using tools such as IDSs and firewalls, and include this as recommendations for the banks in your public service Joint Network Defense Bulletin.Research possible ways to reduce these events and include this information as recommendations in the Malicious Network Activity Report. (Snort & Wireshark)Step 5: Determine Sensitivity of Your Analysis
In the previous step, you completed network analysis. In this step, you will determine which information to include in which document.Information appropriate for internal consumption may not be appropriate for public consumption. The Joint Network Defense Bulletin may alert criminals of the network defense strategy. Therefore, be careful about what you include in this bulletin.Once you have assessed the sensitivity of the information, include appropriate information in your Malicious Network Activity Report.Then, include appropriate information in the Joint Network Defense Bulletin in a way that educates the financial services consortium of the threat and the mitigating activities necessary to protect against that threat.
Step 6: Explain Other Detection Tools and Techniques
In the previous step, you included appropriate information in the proper document. In this step, perform independent research and briefly discuss what other tools and techniques may be used to detect these signatures.Provide enough detail so that a bank network administrator could follow your explanation to deploy your system in production. Include this information in the Joint Network Defense Bulletin.
Step 7: Complete Malicious Network Activity Report
Now that you have gathered all the data for your Malicious Network Activity Report, it is time to organize and submit it. The following is a suggested outline:1.Introduction: Describe the banking institution and the issue you will be examining.2.Overview of the Network Architecture3.Network Attacks4.Network Traffic Analysis and Results5.Other Detection Tools and Techniques6.Recommended Remediation Strategies
Step 8: Create the Joint Network Defense Bulletin
In this step, you will create the Joint Network Defense Bulletin. Compile the information you have gathered, taking care to eliminate any sensitive bank-specific information. The Joint Network Defense Bulletin is an educational document for the financial services consortium. This bulletin should be addressed to the FBI chief and the FS-ISAC representative. 



 Read less

Answer Detail

Get This Answer

Invite Tutor