Task 2: Strategic Planning
Given the cyber security incident the Chief Information Officer believes that it is only a matter of time before Frothly will be successfully attacked. Ransomware is a serious cyber security threat. The Chief Information Officer has come to you to recommend how Frothly should proceed to prepare for a ransomware incident. There is an expectation that you will provide recommendations for Frothly processes and policies with examples related to specific ransomware campaigns.
Threat Intelligence (Your response should be limited to 1500 words or 3 pages)
Research a cybercrime syndicate or syndicates that are known for conducting ransomware campaigns. Demonstrate your understanding and knowledge of Threat Intelligence by recommending policies and processes for obtaining, developing, and analysing and evaluating threat intelligence related to this syndicate historical methods that may be specific to Frothly threat intelligence practices. (Currently Frothly does not have any processes that involve threat intelligence activities.)
Threat Hunting (Your response should be limited to 1500 words or 3 pages)
Demonstrate your understanding and knowledge of Threat Hunting by recommending procedures for hunting threats and identifying indicators of compromise that are known to your selected cybercrime syndicate that can be applied specifically to future Frothly threat hunting practices. (Currently Frothly does not undertake threat hunting activities.)
Playbook Development (Your response should be limited to 1500 words or 3 pages)
Demonstrate your understanding and knowledge of Incident Response Playbooks by describing an incident playbook for recent ransomware campaigns conducted by your selected cybercrime syndicate that Frothly can adopt. (Currently Frothly does not have incident response playbooks.)
Security Orchestration and Automated Response (Your response should be limited to 1500 words or 3 pages)
Demonstrate your understanding and knowledge of Security Orchestration, Automation and Response by describing processes and policies for providing an automated response for recent ransomware campaigns conducted by your selected cybercrime syndicate specific to Frothly. Research specific tools that could be recommended. Describe how these are to be configured and how they are expected to provide the automated response.
Maturity Model (Your response should be limited to 1500 words or 3 pages)
Frothly have determined that they will use C2M2 as a metric for measuring and improving their cyber security stance. Demonstrate your understanding and knowledge of C2M2 by describing which domains of the C2M2 audit process would be relevant for recent ransomware campaigns conducted by your selected cybercrime syndicate specific to Frothly. Describe the self-assessment process for each relevant domain and where the maturity level for each practice and objective could be set.
Reports may be submitted as a single PDF or DOCX file.
The quality of the presentation of a formal technical report is as important as the quality of the technical content of the report in the profession. Your assignment will be assessed on:
1. The body text of your report should be no more than 25 pages in length excluding appendices. 2. The text of your report should be in 12-point Times New Roman or 11-point Arial font or something equivalent and in single space. 3. Page size is A4 with 2cm in margins on all sides. 4. The report is suggested to be organised with executive summary within one page, table of contents, body text, and appendices. 5. The report body text consists of your overall analysis of each question, description of how you went about completing each task and your conclusions as well as statements for relevant Lessons Learned.
- Assignment status: Already Solved By Our Experts
- (USA, AUS, UK & CA PhD. Writers)
- CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS