retake esp sonali task 2

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

TASK 2

Sonali Paul Jassal

 

 

 

LongStaff Marketing Solutions



Draft Questions:

Hello, I’m Sonali and I am your IT support Technician, I have been notified about some of issues you are currently facing therefore I would like to know more about your organisation and about these following areas: current setup, attack details, network and system access, security measures, data protection and backup and lastly, details about post-attack and staff awareness.

 

Current Setup-

1.    How many staff are currently in your organisation?

 

 

2.    How many devices such as laptop, desktops do your organisation have? Could you talk me through your infrastructure?

 

 

3.    Do you have plans to expand? If so, what are they?

 

 

Attack Details-

I have been informed that you have encountered a recent malware attack, could you confirm if that is that correct?

1.    Could you provide some details of the malware attacks on the NAS drive?

 

 

2.    How was the attack detected? Was there a system in place to detect this?

 

 

3.    Were there specific vulnerabilities that were exploited by the attackers to gain access to the NAS?

 

4.    *Firewall- Could you tell me about the firewall and how it works, in terms of the rules and about the outbound and inbound traffic? Is it configured securely? Do you get any alerts on suspicious activity?

 

 

Network and System Access-

1.    What user access controls are currently in place for the NAS and how are permissions assigned to staff?


 

2.    Are there any remote access restrictions in place to access the NAS and how does it make sure its secure?

 

3.    Were there any unauthorised accounts or unusual login attempts identified in the firewall or system logs during the attack?

 

 

Security measures-

1.    What security measures were in place on the NAS before the attack? (E.g any antivirus software, IDS systems)

 

 

2.    Are software updates and patches regularly applied on the NAS and other systems? If so, how regular?

 

3.    Is there multi-factor authentication implemented for accessing the NAS? If not why not?

 

Data Protection and backup-

1.    Were the deleted files backed up, if so, how frequently are the backups performed?

Following on that question, where are the backups stored?

 

 

2.    What encryption method are used to protect personal information stored on the NAS?

 

 

3.    How do you ensure sensitive company data such as client records or employees’ information is kept safe and protected?

 

 

Post-Attack and Staff Awareness-

1.    Did you have a mitigation process or strategy after the incident. If so, could you briefly tell me what It was?

 

 

2.    Are staff aware on how to report any incidents? Do you have a system in place for this? Are there any policies for this?


 

3.    Do employees receive regular cybersecurity training such as recognising phishing attempts?


Email to Line Manager:

 

FROM: SONALI PAUL JASSAL- IT SUPPORT TEHCNICIAN

TO: LINE MANAGER

CC/BC:

SUBJECT: Summary of the meeting with IT Manager

Dear line Manager,

I hope this email find you well. I recently attended a meeting with the IT Manager regarding the current infrastructure and the recent malware attack that occurred to gain a deeper understanding. Therefore, in this email I will be discussing about the topics that were covered in the meeting.

 

Firstly, I wanted to find out a bit more about the organisation and how to operates. Therefore, my first question was: How many staff are currently in your organisation? The answer provided was-we have 25 employees, 10 which are office based and 15 are provided with laptops to work at home if agreed with management. This shows that the company have enough devices provided for everyone and are able to connect to work at home or in the office.

 

My second question was- How many devices such as laptop, desktops do your organisation have? Could you talk me through your infrastructure?

The answer was we have 15 laptops which are for remote users and they connect to the VPN ,10 desktops, a SOHO router, a NAS drive where all the client information is stored. This shows they are clearly lacking good secure network infrastructure as they are using a SOHO router which is used for more small homes and offices, However, as they are growing it is vital for them to upgrade and have a better router that is more fit to their needs but also for their intensive marketing programs

 

Then, I moved onto the details of the attacks to discover why it has occurred and whether it was due to the vulnerabilities that were present in the organisation.

 

My first question for this was- Could you provide some details of the malware attack on the NAS drive?

The answer given was- The NAS was hacked and several important files were deleted which included Personally identifiable information (PII) and it related in losing two long term clients

Key Issues- This is a big impact as this malware attacks have clearly lost their reputation as a business and will take a lot of reassurance and building the brand again to make their company be reliable. Furthermore, the NAS drive being hacked shows there was clearly a vulnerability in place that make it easy for the hackers to exploit this and use It to their advantage

 

My second question was- How was the attack detected? Was there a system in place to detect this?

The answer provided was- There was nothing in place to detect the attack, but we only found out when we had seen the several files deleted and missing.


My follow up question was, would you like a solution in place to detect these types of issues?

The answer stated was that yes that is something they would like to implement Key issues-There is clearly an issue highlighted as there was no system in place to

detect the cyberattacks, which meant no one in the company was aware. Therefore, the malware attack could have ended up a lot worse than it was. Consequently, I would recommend implementing an IDS or IPS in place that will definitely help the company be aware of anything that happens which can help in reducing the impact but also is a good mitigation strategy in order to reduce the amount of cyberattacks

 

My third question was-What do you have in place in term of security? The answer stated- We have a SOHO router with a built-in firewall

Key issues-A SOHO router with a built-in firewall has quite basic features and can lack advanced threat protection. Furthermore, the router may not receive frequent updates which leave them open to any new malware if it is outdated. Also, the router is designed for usually 1-10 users and that may lead to complications with more devices or complex setups.

 

My fourth question was- Could you tell me about the firewall and how it works in terms of rules and about the outbound and inbound traffic?

The answer provided was- I’m not too sure about how the firewall is configured and I have not reviewed the security. But I’m not sure which ports are blocked or not and I do not get any alerts on any suspicious activity.

Key issue- They are clearly not aware on how the firewall is configured which is a big threat as I was informed that the attack was external and this could be reason as allowing access on inbound traffic that is not necessary is an issue.

 

After this I moved onto finding out more about the network and system access.

 

My first question was- What user access controls are currently in place for the NAS and how are permissions assigned to staff?

The response given was-The users control to the NAS drive thought the shared administrative account and all staff have shared access and can install any software they would like.

Key issues- This is a concern as it is going to lead to all staff making unauthorised changes and modify anything they like and without a way of tracing the individuals it can be hard as an to keep track and log what has been done. Furthermore, an employee might install something malicious or a malicious software, which will affect the entire network and will cause many disruptions but also leave the organisation suffering financially and reputationally

 

My second question was- Are there any remote access restrictions in place to access the NAS and how does it make sure its secure?

The reply given was- All remote users connect to the NAS drive through a VPN have a username and password to access.

I then asked, is the username and password quite generic or strong?

The answer given was- its not as secure, the username is LMSAdmin and the password is password with special characters and numbers.

Key issues- The problem is that they have tried to make it secure by adding a VPN however the account username and password is not secure at all and that is a


weakness which can leave the remote users quite easily experiencing a cyberattack but also disrupting the whole network.

 

Next, I moved onto the security measures that were placed at that current time and assessing whether they were suitable or not according to the organisation.

 

My first question was- What security measures were in place on the NAS before the attack? (E.g., any antivirus software, IDS systems)

The input received was- No, nothing in place just a firewall built in the SOHO router. Key Issues-This is a problem as it showing they are weak In some areas regarding security which needs to be solved immediately to reduce the risk of experiencing another cyber incident again.

 

My second question was- Are software updates and patches regularly applied on the NAS and other systems? If so, how regular?

The answer provided was-The NAS Is Linux based but I cannot confirm anything about the updates

Key issues- They are clearly not aware of the backups, which will definitely needed to be implemented to keep a copy of files and data in case of an incident were to occur. Then I asked about the VPN and whether if it was up to date

The answer provided was- The VPN is on a Windows Server 2019 and we believe it is quite outdated.

 

After this I moved onto data protection and backups.

 

My first question was- Were the deleted files backed up, if so, how frequently are the backups performed?

Following on that question, where are the backups stored?

The answer stated was- There’s no backups in place and it’s not frequent

 

Key Issues- There is no backup, therefore this means that if all files were deleted, for example in this case several have been deleted.it means that they cannot be restored and all the data has been lost. Therefore, if there was a backup in place there would a copy of the documents.

 

Ultimately, I moved onto finding more about Post attack and staff awareness. The Key information I found was that staff aren’t aware much of how to report incidents or any of the latest information. They’re only required to do an induction session which only included 3 videos totalling to 2 hours.

To conclude, form my finding from the interview with the IT Manager, it has led me to realise that:

 

·         There is lack of training

·         Lack of backups

·         Outdated operating system

·         Weak passwords

·         Generic, weak passwords

·         No role-based access controls

·         Shared admin accounts


I hope this is useful, Thank you for your time.


 

Email to Managing Director

 

 

FROM: SONALI PAUL JASSAL- IT SUPPORT TEHCNICIAN

 

 

TO: MANAGING DIRECTOR

CC/BC:

 

SUBJECT: Summary of meeting with IT manager.

Dear HR, from my findings from the interview with the IT Manager, it has led me to realise that: ·

 

·         There is a lack of security controls

·         A lack of knowledge in mitigation and security overall

·         Less focus on regular maintenance

·         Training needs to be carried on a regular basis

·         Operating systems aren’t standardised

·         Lack of Knowledge in this area.

·         There Is a lack of security controls as employees are sharing admin passwords

·         There is no role-based access control in place

No Role Based Access

Furthermore, as employees have full admin access, there are allowed to install software without any permission needed. This is a concern as it is going to lead to all staff making unauthorised changes and modify anything they like and without a way of tracing the individuals it can be hard as an to keep track and log what has been done. Furthermore, an employee might install something malicious or a malicious software, which will affect the entire network and will cause many disruptions but also leave the organisation suffering financially and reputationally.

Maintenance

There is generally less focus on regular maintenance and making sure everything is looked after, which poses a big risk as security vulnerabilities will keep growing and they may not be aware of anything that might be a danger to the company.

Employee training

Having only one session of training on the induction and only password safety and basics is clearly not enough as technology is rapidly advancing and so are threats, therefore everyone in the company should be fully aware on the latest threats but also should know how to effectively mitigate it if it were to happen

No detection or alert systems

Not having a system in place can put the business at risk of threats as it can lead to system failures, security breaches all going unnoticed and can cause data loss, financial damage without anyone knowing

I hope this is a clear overview. Thank you for your Time

 

Comments

Popular posts from this blog

TASK 1 MINE FULL

Eveything TASK format

Full format what i done at home questions