Cyber Operations
Cyber Operations
Add comment
22/10/2024 to 23/12/2024
Details
Assignment brief
This individual assessment is designed to assess your ability to detect, analyse, and mitigate
sophisticated cyberattacks from a national security perspective. You will be provided with a PCAP
file containing traces of a suspected attack targeting the critical national infrastructure. The
assessment will require you to identify the type of attack, and its potential impact, and gather
counterintelligence to understand the attacker's methods and objectives. Based on your analysis,
you will propose defensive countermeasures and operational strategies to prevent future attacks.
Your task is to act as a cyber operations analyst for a government agency tasked with protecting
national assets. The report will simulate the critical decision-making process involved in a real-
world cyber incident affecting the nation's defence capabilities, public safety, and economic
stability.
This assessment is weighted at 60% of the overall mark and should take you approximately 30
hours to complete. The report is expected to be around 3500 words, and you will submit both a
technical report and a defensive bash script that automates network defences.
Note: Use of paraphrasing tools to avoid plagiarism and, using LLM models, such as Chat
GPT, Bard, Bing AI etc, to complete the assignment will be regarded as academic
misconduct and will be dealt with in accordance with the university's academic misconduct
policy.
Scenario Overview:
You work as a cybersecurity analyst for CyOps Global Defence, a private firm contracted by the
government to secure and defend critical national systems. Recently, abnormal traffic was detected
on the NMC2S, and your team has captured this data in a PCAP file for post-attack analysis.
https://herts.instructure.com/courses/116917/assignments/315752 1/5
11/11/2024, 16:03 Assignment -1
1. Analyse the provided PCAP file to identify the type of attack, its success or failure, and its
potential impact on the NMC2S.
2. Determine the attacker's objectives and gather counterintelligence that could help prevent
future attacks.
3. Propose mitigation strategies to secure the network and harden the infrastructure against
future threats.
4. Implement defensive mechanisms via a bash script designed to mitigate the threats identified
during your analysis.
https://herts.instructure.com/courses/116917/assignments/315752 2/5
11/11/2024, 16:03 Assignment -1
Mark
Task
Available
Total 60
https://herts.instructure.com/courses/116917/assignments/315752 3/5
11/11/2024, 16:03 Assignment -1
Scenario Details
The National Military Command and Control System (NMC2S) is designed to:
Your PCAP file contains traffic from the network during an attack window. You are expected to
identify:
Deliverables
1. Technical Report:
Detailed analysis of the attack, its implications on national security, and recommended
defence strategies.
The report should include packet analysis from Wireshark, specific references to key
packets, and screenshots.
You must use a formal report structure (Introduction, Body, Conclusion, References,
Appendices).
Include a counterintelligence section that outlines your findings about the attackers, their
techniques, and potential future threats.
2. Bash Script:
A script that automates specific network defence tasks (e.g., blocking malicious IPs, setting
up alerts, or scanning for known attack signatures).
The script must run on Kali Linux VMs provided in the lab environment.
Ensure the script is well-commented and documented.
PCAP File
Assignment PCAP.pcapng (https://herts.instructure.com/courses/116917/files/9982657?
wrap=1) (https://herts.instructure.com/courses/116917/files/9982657/download?
download_frd=1)
(https://herts.instructure.com/courses/116917/files/9982657/download)
https://herts.instructure.com/courses/116917/assignments/315752 4/5
11/11/2024, 16:03 Assignment -1
Note: Every effort has been made to remove anomalies from the PCAP, but there could still be traces of
malware or viruses. We strongly recommend that students conduct the analysis in a controlled
environment, preferably using a Virtual Machine (VM) for the PCAP file analysis.
Students will apply their knowledge by designing and implementing custom cyber defence
solutions, such as creating automated scripts, developing custom security tools, or
integrating existing tools in innovative ways.
https://herts.instructure.com/courses/116917/assignments/315752 5/5