Defend Against Web Attack-Operation Bold Hermit-Mission 12
Scenario Overview:
Incidence response teams have been deployed across numerous government agencies, to provide emergency communications for critical operations to defend against attackers. These teams require reliable 24/7/365 communication in order to send and receive critical information pertaining to the terrorist attacks. A domestic terrorist organization has been making attempts to cut off, or hack, communications of deployed emergency management personnel. This terrorist has been known to make use of common Web application vulnerabilities to achieve their goals.
How to be Successful:
The learner will monitor for attacks, isolate them, and add additional defenses as necessary to prevent the attacks from being successful. They will need to identify relevant details about the attack in order to pass along to other personnel who may not have been hit yet_ The more details you provide, the better positioned others will be to defend against these attacks.
What should you know prior:
Learners should be familiar with incident response processes, network design, management and security.
Load Time |
Easy: 13 min Medium: 14 min |
Time Limit | 40 hrs |
# of Tasks | 7 |
Hints | Yes |
Save Session | Yes |
Team Based | Yes |
Scenario Overview:
Incidence response teams have been deployed across numerous government agencies, to provide emergency communications for critical operations to defend against attackers. These teams require reliable 24/7/365 communication in order to send and receive critical information pertaining to the terrorist attacks. A domestic terrorist organization has been making attempts to cut off, or hack, communications of deployed emergency management personnel. This terrorist has been known to make use of common Web application vulnerabilities to achieve their goals.
How to be Successful:
The learner will monitor for attacks, isolate them, and add additional defenses as necessary to prevent the attacks from being successful. They will need to identify relevant details about the attack in order to pass along to other personnel who may not have been hit yet_ The more details you provide, the better positioned others will be to defend against these attacks.
What should you know prior:
Learners should be familiar with incident response processes, network design, management and security.
Load Time |
Easy: 13 min Medium: 14 min |
Time Limit | 40 hrs |
# of Tasks | 7 |
Hints | Yes |
Save Session | Yes |
Team Based | Yes |