Concept Paper: Red Team Assessment Strategies in Cybersecurity
1. Read the scenario, access the resources, and review the rubric below to help you understand the assignment. The final paper will be due in Week 7. You should begin working on the assignment right away, and you will share your progress in Week 6.
2. Write a paper that follows the listed parameters, addresses the important concepts, and includes the required sections:
3. Your paper should enable a casual reader to understand this topic and its importance. Please make sure the following outcomes are addressed within your paper:
Due: In week 7 with the specific date posted in Blackboard. You will be directed to complete and share parts of this assignment in Week 6.
Scenario: A large multinational fintech wanted to conduct a Red Team Assessment to evaluate its ability to detect and respond to a real-world cybersecurity attack.
The read team started their assessment by sending a phishing email that persuaded the victim to log in to a fake portal hosted on a server to obtain valid credentials. While a small number of users clicked on the malicious link sent in the email, none of them submitted their credentials. This could be attributed to the regular social engineering tests and security awareness training delivered to staff.
After the failed phishing campaign, the team went back to the drawing board to come up with a new plan of attack. Reviewing the company’s Twitter account, the team discovered that they host a monthly community event at one of their buildings. The team registered for the event to deploy a purpose-built device into their internal network. The device will allow the team to gain remote access to the network using either an independent wireless connection or a 3G/4G mobile connection.
Two members of the red team attended the event. They managed to slip away from the main event to see if there were any unlocked offices or conference rooms. Once a room had been found. One team member acted as a lookout while the other plugged the device and checked that he could reach it from his mobile phone. Shortly afterward the testers left the event and joined the rest of the team in a coffee shop down the road. Once connected to the network, the team started mapping the internal network and gathering additional information. Over the next couple of days, the team captured several password hashes, which were achieved by exploiting a weakness in Windows’ broadcast protocols. However, users appeared to be using strong complex passwords and it was not possible to crack the hashes to recover clear-text passwords. The team then decided to relay a captured hash belonging to a user and use it to log in into a workstation where they had local administrative privileges. This allowed them to extract the clear-text password of the currently logged-in users from memory.
Resources to help you complete this assignment:
Assignment: Red Team Assessment Strategies in Cybersecurity
Below 60-70 F
1. Compare and contrast red teaming versus penetration testing based on the presented case. Met outcomes.
Did not submit or incompletely compared and contrasted red teaming versus penetration testing based on the presented case. Did not meet outcomes.
Partially compared and contrasted red teaming versus penetration testing based on the presented case. Partially met outcomes.
Satisfactorily compared and contrasted red teaming versus penetration testing based on the presented case. Met outcomes.
Thoroughly compared and contrasted red teaming versus penetration testing based on the presented case. Exceeded outcomes.
2. Describe the approach to red team assessment.
Did not submit or incompletely described the approach to red team assessment.
Partially described the approach to red team assessment.
Satisfactorily described the approach to red team assessment.
Thoroughly described the approach to red team assessment.
3. Discuss how different types of organizations are utilizing red teaming.
Did not submit or incompletely discussed how different types of organizations are utilizing red teaming.
Partially discussed how different types of organizations are utilizing red teaming.
Satisfactorily discussed how different types of organizations are utilizing red teaming.
Thoroughly discussed how different types of organizations are utilizing red teaming.
5. 3 References
No references were provided.
Does not meet the required number of references; some or all references poor quality choices.
Meets the number of required references; all references high-quality choices.
Exceeds the number of required references; all references high-quality choices.
6. Clarity, writing mechanics, formatting.
More than 6 errors present
5-6 errors present
3-4 errors present
0-2 errors present
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.Read more
Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.Read more
Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.Read more
By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.Read more