Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Diamond model of intrusion analysis

09/11/2021 Client: muhammad11 Deadline: 2 Day

Cybersecurity Assignment

Cyber Threat Intelligence and Incident Response Report
This template leverages several models in the cyber threat intelligence domain (such as the Intrusion Kill Chain, Campaign Correlation, the Courses of Action Matrix and the Diamond Model) to structure data, guide threat intel gathering efforts and inform incident response actions. If you’re not familiar with this approach, read the following papers: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains and The Diamond Model of Intrusion Analysis. This framework is discussed in depth in the SANS Institute course FOR578: Cyber Threat Forensics.

Incident Name

Report Author

Report Date

Revision Dates and Notes

Executive Summary
Describe in up to three paragraphs your key observations and takeaways related to the intrusion. Explain the adversary’s tactics, techniques and procedures. Outline the most significant courses of action taken to defend against the adversary when responding to the intrusion. The remainder of the report should substantiate this summary.

The Adversary’s Actions and Tactics
Summarize in one paragraph the adversary’s actions and tactics, as well as the effects that the intrusion had on the victims. This section of the report overlays the intrusion kill chain’s phases over the diamond model vertices to capture the core characteristics of the malicious activities.

Description of the Adversary
Describe observations and indicators that may be related to the perpetrators of the intrusion. If possible, highlight the attributes of the adversary operator and the adversary’s potential customer. Outline potential motivations and identifying elements. Categorize your insights according to the corresponding phase of the intrusion kill chain, as structured in the following table.

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command and Control

Actions on Objectives

The Adversary’s Capabilities
Describe the adversary’s capabilities in terms of tactics, techniques and procedures (TTPs). Address the tools and tradecraft employed by the intrusion perpetrators, such as exploits backdoors, staging methods and situational awareness. Categorize your insights according to the corresponding phase of the intrusion kill chain, as structured in the following table.

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command and Control

Actions on Objectives

The Adversary’s Infrastructure
Describe the infrastructure, such as IP addresses, domain names, program names, etc. used by the adversary. Categorize your insights according to the corresponding phase of the intrusion kill chain, as structured in the following table.

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command and Control

Actions on Objectives

The Victims and Affected Assets
Describe the victims affected by the adversary’s actions. Address applicable victim identifiers such as people and organization names. Also outline the affected victim assets, such as networks, systems and applications. Categorize your insights according to the corresponding phase of the intrusion kill chain, as structured in the following table.

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command and Control

Actions on Objectives

Course of Action During Incident Response
Summarize in one paragraph the steps you’ve taken when responding to the various phases of the intrusion chain. The section below should describe your actions in greater detail.

Discover
Describe in the following table the steps you’ve taken to determine what the adversary has done so far as part of the intrusion, as determined based on the analysis of logs, network packer captures, forensic data and other sources.

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command and Control

Actions on Objectives

Detect
Describe in the following table the measures you’ve put in place to identify the adversary’s future activities related to the applicable intrusion phase. Explain how you defined and deployed indicators and signatures, additional sensors or instrumentation, security event data monitors, etc.

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command and Control

Actions on Objectives

Deny
Describe in the following table the measures you’ve implemented to block the adversary from taking the malicious actions, staying within the context of the intrusion phase described in this report. For instance, did you block specific IPs at the perimeter firewall, patch targeted vulnerabilities, block emails that matched specific patterns, etc.?

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command and Control

Actions on Objectives

Disrupt
Describe in the following table the measures you’ve established to interfere with the adversary’s attack in progress to cause it to fail. For instance, did you use an intrusion prevention system or firewall to terminate the adversary’s active network connections, quarantined suspicious files, distributed updated antivirus signatures, etc.?

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command and Control

Actions on Objectives

Degrade
Describe in the following table the actions you’ve taken to slow down or otherwise degrade the attack in progress. One example of such measures might be to configure the network equipment to rate-limit the connections attributed to the adversary.

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command and Control

Actions on Objectives

Deceive
Describe in the following table the steps you’ve taken to misinform the adversary in the context of the applicable intrusion phase. Deception might involve planting fake assets that might interest the intruder, redirecting the adversary’s network connections, fooling malware into believing the targeted system is already infected, employing honey tokens, etc.

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command and Control

Actions on Objectives

Destroy
Describe in the following table the offensive actions you’ve taken against the adversary to reduce their ability to carry out the intrusion. Such steps are generally unavailable to private individuals or firms outside of specific law enforcement or military organizations, although coordination and intelligence sharing with these organizations is within scope of this section.

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command and Control

Actions on Objectives

Intrusion Campaign Analysis
If applicable, summarize in one paragraph the relationship between the intrusion discussed earlier in the report and other related intrusions that, when taken together, form a campaign. Mention the indicators and behaviors shared across the intrusions within the campaign. Outline the commercial, geopolitical or other factors that might have motivated the adversary’s activities.

Other Intrusions in the Campaign
Describe other incidents or intrusions that share commonalities with the intrusion discussed earlier in the report. Explain whether the shared attributes indicate a low/medium/high likelihood that the intrusions form a larger campaign. Provide internal and external intrusion names or other relevant identifiers. Include references to related internal and external documents. Clarify when the intrusions occurred.

Shared Intrusion Attributes
Specify the key indicators and behavioral characteristics that are consistent across intrusions within the campaign. Categorize the attributes according to the kill chain phase when they were exhibited and their relevance to the adversary description, attack infrastructure, capabilities (tactics, techniques and procedures) and the affected victims. Wherever possible, account for Adversary, Infrastructure, Capabilities and Victim in each applicable phase of the kill chain.

Adversary

Infrastructure

Capabilities

Victim

Reconnaissance

Weaponization

Delivery

Exploitation

Installation

Command and Control

Actions on Objectives

Campaign Motivations
Outline the likely motivation for the adversary’s activities across the intrusion campaign, including the relevant commercial, geopolitical or other factors. If practical, offer substantiated theories regarding the attribution of the campaign to specific individuals, groups or nation states.

Third-Party References
Provide references to third-party data about the intrusion discussed in this report, the campaign that it is a part of or the associated adversaries.

This report is based on the template created by Lenny Zeltser. The template is distributed according to the Creative Commons Attribution license (CC BY 4.0), which basically allows you to use this material in any way, as long as you credit the author for the original creation. The contents build upon the concepts and terminology defined by Eric M. Hutchins, Michael J. Cloppert and Rohan M. Amin’s paper Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains and Sergio Caltagirone, Andrew Pendergast, and Christopher Betz’s paper The Diamond Model of Intrusion Analysis. It also incorporates the insights from SANS Institute’s course FOR578: Cyber Threat Forensics as taught by Michael J. Cloppert and Robert M. Lee.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Helping Hand
Financial Assignments
Supreme Essay Writer
Top Class Engineers
Homework Tutor
Financial Analyst
Writer Writer Name Offer Chat
Helping Hand

ONLINE

Helping Hand

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$20 Chat With Writer
Financial Assignments

ONLINE

Financial Assignments

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$17 Chat With Writer
Supreme Essay Writer

ONLINE

Supreme Essay Writer

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$16 Chat With Writer
Top Class Engineers

ONLINE

Top Class Engineers

I reckon that I can perfectly carry this project for you! I am a research writer and have been writing academic papers, business reports, plans, literature review, reports and others for the past 1 decade.

$15 Chat With Writer
Homework Tutor

ONLINE

Homework Tutor

I have written research reports, assignments, thesis, research proposals, and dissertations for different level students and on different subjects.

$34 Chat With Writer
Financial Analyst

ONLINE

Financial Analyst

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$41 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Howler brothers skulls and begonias - Super mario maker 2 scatting - Kahoot it login create - Convert 1 atm to mmhg - Cover letter for public health job - Economic - Vcaa biology exam 2010 - Case study/BPH - Discussion and Brief Analysis - Feedback examples for students - Analysis on Food Security - What are three risks and threats of the user domain - Ulsterbus cookstown to belfast - How to win friends and influence people critique - Adp manager self service - Probate form pa2 booklet - 12/70 park street st kilda west - How to count vertices on a cube - Walden social change mission - Pm asmnt 7 - Tweeter etc case analysis - Unit II PowerPoint APA 7th Edition - Difference between narrator and speaker in poetry - Log mean temperature difference derivation - Aws innovate ai/ml edition - Nation centered federalism - Assignment 1 - In a prominent bar in secaucus one day tone - What is hoodooing in to kill a mockingbird - Cross product how to remember - 2 Discussions and 1 case Study - Chinese zodiac php source code - Duty of care definition child care - Essay: Current Event - Construction Decision & Risk Analysis 3,000-Word Essay - Bus.com 4.2 - Economic - How does multitasking confuse the resource availability of project team personnel? - Inverting and noninverting amplifier lab report - Cobalt chloride equilibrium - Lsp - Apps twc state tx us ubs login - Igolder pgp key generator - Bromothymol blue indicator colour change - Air jordan target market - Adult social services portsmouth - Literature class discussion --- due in 12 hours - How to do hess's law calculations - How to find z score in statcrunch - Difference price ceiling and price floor - Week 2 Discussion - Structure and function of the body 12th edition - What residue is prevented by cleaning floor surfaces - Dr souhel najjar net worth - The wright group sunshine books guided reading level - Coca cola dividend payout ratio - 5 act structure tv - British council gerunds and infinitives - Bret contreras program free - Week 5 _African American Studies - Answer these questions - What factors helped the vikings invade europe successfully - C++ coding exercise about Lighting Equations (GLM) - ACC 401 Week 6 Discussion "Consolidated Financial Statements – Ownership, Income Taxes, and Legal Reorganizations" - Holistic learning theory laird 1985 - George mason engineering building - The financial staff of cairn communications has identified - How to identify a function - Sro vic gov autopay - Psy 410 week 2 individual assignment - Philippine normal university uniform - Penner medical products case study solution - Ainsworth and bowlby 1991 - Creating a virtual museum exhibit edgenuity - 27 stonebridge rise epping - Conputer Science - Reply needed - Financial reporting and analysis edition solutions - Ellon to aberdeen bus times 68 - English 102 - Red zuma project - Lin corporation has a single product - Poverty and its impact on population health. 1400 words due 10/27/2020 - Maximum security prison brisbane - 4 pics 1 word brain in lightbulb man smelling wine - Poem essay - Human Resources Management Discussion APA - Comparing and contrasting documentation - Research paper 10 pages - LDR531 Week 6 FInal Exam SCORE 90 PERCENT - Patellar pubic percussion test - How can we differentiate between permutation and combination - Data warehouse solutions comparison - Math 107 Quiz # 3 - Johns hopkins level of evidence - Stage backcloth crossword clue - What year did nehemiah rebuild the wall - Holmbyre boarding cattery and dog groomers - How to write a text response - Order 2584127: Identifying and Empowering Instructional Leaders