{"id":141,"date":"2021-09-18T00:07:39","date_gmt":"2021-09-18T00:07:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2024-11-27T19:17:14","modified_gmt":"2024-11-27T19:17:14","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/josiah-marshall\/cyse-300\/","title":{"rendered":"CYSE 300"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Introduction to Cybersecurity<\/h1>\n<p>The course contains ten cybersecurity laboratory assignments and a research paper. Please include the research paper and a few of the laboratory reports you generated for the class. The laboratory reports should contain the required artifacts illustrating the successful completion of cybersecurity-related activities. They should be formatted and written in a professional manner as if you were submitting them to executives in an organization.<\/p>\n<p>The cybersecurity laboratories include the following:<\/p>\n<ul>\n<li>Performing reconnaissance and probing using common tools;<\/li>\n<li>Performing a vulnerability assessment;<\/li>\n<li>Enabling Windows Active Directory and user access controls;<\/li>\n<li>Using group policy objects and Microsoft Baseline Security Analyzer for change control;<\/li>\n<li>Performing packet capture and traffic analysis;<\/li>\n<li>Implementing a business continuity plan;<\/li>\n<li>Using encryption to enhance confidentiality and integrity;<\/li>\n<li>Performing a website and database attack by exploiting identified vulnerabilities;<\/li>\n<li>Eliminating threats with a layered security approach; and<\/li>\n<li>Implementing an information systems security policy.<\/li>\n<\/ul>\n<p>Below is a research paper that I wrote in this course.<\/p>\n<p>COLONIAL PIPELINE CYBER ATTACK<br \/>\nJosiah Marshall<br \/>\nCYSE 300: Introduction to Cybersecurity<br \/>\nDr. Joseph Kovacic<br \/>\nJanuary 24th, 2023<\/p>\n<p>In May of 2021, the Colonial Pipeline was the victim of one of the biggest ransomware<br \/>\nattacks in the last decade. A ransomware attack is where a hacker or hackers break into a system<br \/>\nsuch as a network or system files and demand an account of money in return for them. This<br \/>\nransomware attack shut down the main pipeline that runs along the East coast for several days<br \/>\nand was even declared a state of emergency by President Joe Biden. In this attack were many<br \/>\ndifferent cybersecurity vulnerabilities, threats, and overall low security that led to this attack<br \/>\nhappening.<\/p>\n<p>The threat in this ransomware was a leaked password. However, there were multiple<br \/>\ncybersecurity vulnerabilities that led to this ransomware. Hackers of group that calls themselves<br \/>\n\u201cDarkSide\u201d accessed the colonial pipeline network system through an exposed password from a<br \/>\nVPN account. Like many other big organizations, the colonial pipeline uses a VPN to provide<br \/>\nextra security and encrypted remote access into the corporates network. The VPN account that<br \/>\nthe colonial pipeline company had was inactive and very poor. Combining an inactive VPN<br \/>\naccount with not having a multifactor authentication, it made it very easy for DarkSide to hack<br \/>\ninto the network system.<\/p>\n<p>This incident led to a lot in the short time that it happened. As stated above in the<br \/>\nintroduction, the pipeline was shut down for the week to reduce the risk of exposure to the<br \/>\noperational network. Also, the colonial pipeline had to pay about approximately $4.4 million in<br \/>\nBitcoin to the DarkSide. This all could have been stopped if the colonial pipeline just had a<br \/>\ncybersecurity team with the right security measures. If the company didn\u2019t have an inactive VPN<br \/>\naccount and had a multifactor authentication tool, the DarkSide could not have been able to<br \/>\naccess their network. This just shows that every big company needs a cybersecurity team to<br \/>\nimplement the right security measures and test them every so often. If the inactive VPN account<br \/>\nwas tested, then the colonial pipeline would have known that it was inactive and not working.<br \/>\nThen something could have been done about that. It is important to investment into a<br \/>\ncybersecurity team to help build your security instead of taking massive amounts of money loss<br \/>\nlike the colonial pipeline did.<\/p>\n<p>References<br \/>\n\u201cColonial Pipeline hack explained: Everything you need to know\u201d<br \/>\nhttps:\/\/www.techtarget.com\/whatis\/feature\/Colonial-Pipeline-hack-explained-Everything-you<br \/>\nneed-to-know<br \/>\n\u201cBack to Basics: A Deeper Look at the Colonial Pipeline Hack\u201d<br \/>\nhttps:\/\/www.govtech.com\/sponsored\/back-to-basics-a-deeper-look-at-the-colonial-pipeline-hack<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Cybersecurity The course contains ten cybersecurity laboratory assignments and a research paper. Please include the research paper and a few of the laboratory reports you generated for the class. The laboratory reports should contain the required artifacts illustrating the successful completion of cybersecurity-related activities. They should be formatted and written in a professional&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/josiah-marshall\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":21947,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-marshall\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-marshall\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-marshall\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiah-marshall\/wp-json\/wp\/v2\/users\/21947"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/josiah-marshall\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/josiah-marshall\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":309,"href":"https:\/\/sites.wp.odu.edu\/josiah-marshall\/wp-json\/wp\/v2\/pages\/141\/revisions\/309"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/josiah-marshall\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}