Highlights
PURPOSE
Short answer questions to assess and reinforce learning of the concepts of Weeks 7-8 by exploring telemetry data for detecting attacks/compromise.
TASK(S)
Network managers must be vigilant in monitoring for malicious activity and keeping software up to date as evidenced recently by the vulnerabilities discovered in Microsoft Exchange which were subsequently exploited by attackers. Consider two scenarios where an attacker could gain access to downloading email from an organisations server (data exfiltration):
1. An attacker successfully exploits a vulnerability that allows them to modify the email web portal application code. As a result, the attacker can now download any email sent to any user on the system by using manually constructed URLs
2. An attacker successfully exploits a vulnerability that allows them to gain access to an interactive root shell (privileged user shell) on the mail server. Using this access, the attacker installs a program that quietly scans emails in the background, then forwards emails of interest to the attacker. To help prevent detection, the attacker doesn’t
forward the emails directly, instead forwarding the emails to a non-existent user causing them to bounce to the attackers controlled email.
For each scenario, identify a piece of telemetry data obtained through SNMP, IPFIX, or a custom data source, that if monitored would allow the attack to be discovered, and explain how the attack would be identified.
This SIT716 - IT Assignment has been solved by our IT experts at My Uni Papers. Our Assignment Writing Experts are efficient to provide a fresh solution to this question. We are serving more than 10000+ Students in Australia, UK & US by helping them to score HD in their academics. Our Experts are well trained to follow all marking rubrics & referencing style.
Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed that you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.
© Copyright 2025 My Uni Papers – Student Hustle Made Hassle Free. All rights reserved.