Power Grid Incident Response-Operation Black Dragon-Mission 13
Scenario Overview:
Intelligence reports that the power grids in the Nation of Formica are being targeted by an advanced cyber threat actor who seeks to demonstrate its global power. Experts are concerned that smart grid technologies, which use the Internet to connect to power meters and appliances, could allow an attacker to overtake thousands-if not millions-of unprotected devices, preventing power from being delivered to end users.
How to be Successful:
The learner will conduct a cyber defense assessment to evaluate risks, determine indicators of compromise, improve network monitoring and mitigate the attack. The end state of the assessment will be a defensible power grid with local defender ability to detect attempts to compromise the grid as well as the ability to attribute any attacks and respond accordingly.
What should you know prior:
Learners should be familiar with digital forensics, cryptography, identify management, vulnerability assessment, web technology and enterprise architecture.
Load Time | 17 min |
Time Limit | 40 hrs |
# of Tasks | 6 |
Hints | Yes |
Save Session | Yes |
Team Based | Yes |
Scenario Overview:
Intelligence reports that the power grids in the Nation of Formica are being targeted by an advanced cyber threat actor who seeks to demonstrate its global power. Experts are concerned that smart grid technologies, which use the Internet to connect to power meters and appliances, could allow an attacker to overtake thousands-if not millions-of unprotected devices, preventing power from being delivered to end users.
How to be Successful:
The learner will conduct a cyber defense assessment to evaluate risks, determine indicators of compromise, improve network monitoring and mitigate the attack. The end state of the assessment will be a defensible power grid with local defender ability to detect attempts to compromise the grid as well as the ability to attribute any attacks and respond accordingly.
What should you know prior:
Learners should be familiar with digital forensics, cryptography, identify management, vulnerability assessment, web technology and enterprise architecture.
Load Time | 17 min |
Time Limit | 40 hrs |
# of Tasks | 6 |
Hints | Yes |
Save Session | Yes |
Team Based | Yes |