0% found this document useful (0 votes)
923 views

CSIA 310 Project #1 A

The document is a cybersecurity incident report form from Sifers-Grayson detailing a security breach. Attackers accessed the R&D network, stole login credentials and files, installed malware, and stole a test drone. Key impacts were the loss of the drone system source code and a test vehicle. The incident occurred due to misconfigured firewalls, lack of intrusion detection, and poor physical security. Recovery is estimated at $27,400 while total costs are $1.2 million. Business operations would be halted during recovery and the company's reputation negatively affected.

Uploaded by

Adam Stoker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
923 views

CSIA 310 Project #1 A

The document is a cybersecurity incident report form from Sifers-Grayson detailing a security breach. Attackers accessed the R&D network, stole login credentials and files, installed malware, and stole a test drone. Key impacts were the loss of the drone system source code and a test vehicle. The incident occurred due to misconfigured firewalls, lack of intrusion detection, and poor physical security. Recovery is estimated at $27,400 while total costs are $1.2 million. Business operations would be halted during recovery and the company's reputation negatively affected.

Uploaded by

Adam Stoker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Running head: CYBERSECURITY INCIDENT REPORT FORM

Sifers-Grayson Cybersecurity Incident Report Form

Adam R. Stoker

CSIA 310

University of Maryland Global Campus

September 15th, 2020


CYBERSECURITY INCIDENT REPORT FORM
2

SIFERS-GRAYSON CYBERSECURITY INCIDENT REPORT FORM


1. Contact Information for the Incident Reporter and Handler
– Adam R. Stoker
– Cybersecurity Analyst
– Nofsinger Consulting, LLC
– adam.stoker@nofsinger.com
– 066-806-7431
– 1890 Star Shoot Pkwy
Ste 170 Box 1982
Lexington, KY 40509
2. Incident Details
– Status change date/timestamps (including time zone): when the incident started, when
the incident was discovered/detected, when the incident was reported, when the incident
was resolved/ended, etc.
– Physical location of the incident: 1555 Pine Knob Trail, Pine Knob, KY 42721
– Current status of the incident: The incident has ended.
– Source/cause of the incident: unauthorized access to the R&D servers by an unknown
hostname and IP address.
– Description of the incident: Attackers accessed the network and the facility and stole
passwords, logins, files, and installed malware. The incident went undetected by Sifers-
Grayson staff.
– Description of affected resources: The R&D servers (IP 10.10.135.3/4) were
compromised and 100% of the design documents and source code for the AX10 Drone
System was stolen, programming workstation (IP 10.10.135.10) was used to install
malware onto an AX10-a test vehicle, test vehicle (IP 10.10.145.8) was stolen from the
test range.
– If known, incident category, vectors of attack associated with the incident, and
indicators related to the incident: Attackers hacked into the enterprise network through an
unprotected network connection, gained access to the facility through social engineering,
and planted USB keys with malware installed.
– Prioritization factors: Loss of the source code for the drone system and the AX10-a test
vehicle was the primary impact. The test vehicle may be recovered but the documents
and source code has been exposed.
– Mitigating factors: There is a single firewall but it was unable to detect the intrusion.
There are two system administrators responsible for the Data Center.
CYBERSECURITY INCIDENT REPORT FORM
3

– Response actions performed: There was no effective incident response due to the lack
of a centralized team for network incidents and computer security incidents. (e.g., shut
off host, disconnected host from network)
– Other organizations contacted: No other organizations were contacted.

3. Cause of the Incident: The single firewall does not provide adequate protection and was
misconfigured. The lack of intrusion detection and anti-malware software did not block
the unauthorized USB keys and was unable to detect the malware. Employees were
careless with physical access security.

4. Cost of the Incident: The loss of the drone system source code and test equipment cost
Sifers-Grayson $1.2 million in research and development cost and loss of potential
contracts. The recovery efforts to scan all devices, reimage affected workstations, and
restore servers from backups will take approximately 274 person hours at $100 per hour,
totaling $27,400.

5. Business Impact of the Incident: The financial loss as a result of the incident would be
significant. Business operations would be halted or severely limited during the attack and
recovery. If news was spread of the successful attack due to the company’s negligence,
the reputation of Sifers-Grayson would be negatively impacted.

6. General Comments:

Sifers-Grayson’s customer base is made up of manufacturing firms, utility companies,


U.S. Department of Defense, and U.S. Department of Homeland Security. The
government contracts require compliance with DFARS252.204-7008, 7009, and 7012.
The derivative requirements include DFARS requirements for cloud computing and NIST
guidance for incident response, SCADA security, software/system development lifecycle
security, and configuration management.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy