ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 2 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 05 May 2017 My Price 8.00

malware used by APT 29 a Russian hacking group

Take a look at this malware used by APT 29 a Russian hacking group.  This is very advanced malware -  very stealthy.  This malware uses normal IT processes to execute, such as powershell.  This example is the reason that all Security Operations Centers need to monitor the changing threat picture.  Most organizations do not monitor powershell use.  In order to monitor powershell, the organizations needs to upgrade to powershell 5, then start ingesting logs into a correlated event management system. The organization then needs to establish a baseline of normal use in order to determine an anomaly.   Additionally a lot of commercial organizations use git hub and cloud storage, which this malware uses both.  Very hard to defend against this type of attack.  

Please answer the following:

1. What are some of the methods you would use to detect anonymous powershell activity?

2. As a security professional, what steps would you take to defend, detect and re mediate against this type of attack.

 

Requirements:

Needs to be in APA format with a min of 2 resources. Min 300 words

Answers

(11)
Status NEW Posted 05 May 2017 01:05 AM My Price 8.00

-----------

Not Rated(0)