I just placed an Order #LW92136 Therefore, I need a totally different writer for

For This or a Similar Paper Click Here To Order Now

I just placed an Order #LW92136
Therefore, I need a totally different writer for this order.
If the wording and sources are exactly the same, I will submit a Revision Request
ASSIGNMENT – DISTRIBUTED DENIAL OF SERVICE ATTACK Case Study
****PLEASE USE 4 PAGES TO COMPLETE THIS ORDER****
For this case study, you will research a “DISTRIBUTED DENIAL OF SERVICE ATTACK” that involved the 1.7 Tbps DDoS attack against NETSCOUT Arbor
ASSIGNMENT INSTRUCTIONS
PART 1
Please use 3 of the 4 pages to write a case study report addressing the following bullets:
•Describe the background, history, organizational and leadership culture, and risk appetite of the organization. Did the Organizational Leadership communicate and demonstrate their cyber risk tolerance, appetite, and influence the culture of the organization? Did the victim do anything to “provoke” the attack?
• Identify the victim’s security policies, procedures, technical security measures and relationship with their Internet Service/Hosting Service Providers that were in place to prevent or immediately respond to the DDoS threat from impacting them.
• Identify the motivation(s) of the Threat Agent. How was the Threat Agent identified?
• Using the publicly known cyber vulnerability reporting systems and the MITRE ATT&CK framework, map out the DDoS attack Tactics, Techniques, and Procedures (TTPs) used by the Threat Agent. Reflect on why and how the Threat Agent was effective in attacking the Internet-facing e-commerce, gaming/entertainment, social media/blogging web sites.
• Describe the response to the DDoS Attack – what was done to identify, assess, respond, and mitigate the attack? What information was used to make this decision? What role did the ISP/hosting service provider have in responding to and mitigating the attack? What were the lessons learned in responding to this attack? Where there any consequences to the Threat Actor or other considerations?
Therefore, there should be five sections…. with subsections.
PART 2
Please use 1 of the 4 pages to Create 2 Case Study Annexes
*** The annexes come after the conclusion
FOR THE FIRST ANNEX, USE 137 WORDS TO Build a DDoS Attack against the Internet-facing e-commerce, gaming/entertainment, social media/blogging websites –
Use the ATTACHED EXAMPLE to create a risk register table. It can use some of the following elements:
•Risk factors
•Threat agents, threats, and vulnerabilities
•Risk scenarios
•Criticality, severity, or priority of risk
•Asset information
•Impact of the risk on an asset
•Likelihood of the threat exploiting the vulnerability
•Current status of risk response actions
•Resources that may be committed to respond to risk
•Risk ownership information
•Planned milestones toward risk response
After you create the risk register table using the elements listed on the attachment, Please fill in the table with 3 different possible scenarios/events that could occur
FOR THE SECOND ANNEX, USE 137 WORDS TO Create a DDoS Cyber Threat Incident Response Plan Annex. (This will be a list of bullet point tasks). Identify specific “DDoS” policies, procedures, technical security controls, executive management roles and responsibilities, decisions, checklists, communications plans (internal, external), legal considerations, external support, ISP/Web Hosting services engagement requirements, business continuity, and disaster response considerations..
***Please make sure to only use website sources***
***DO NOT USE BOOKS as sources for this assignment***
****This assignment should be writing from Scratch****
****Please do not use examples found on different websites such as Coursehero or any other websites****

For This or a Similar Paper Click Here To Order Now