Cyber Security Use Case Project

We’re looking for a set of use cases (threat scenarios) written around the current issues/risks faced by small/medium sized businesses in regard to opening up their networks for remote connectivity. What the forced shift to remote working means for the cyber threat landscape.

We would like this to take the format of 5 detailed/technical blog posts or similar (as below).

Potential E-Mail Spam Malware / Large volume of emails sent from single address in a short timeframe or large volume of non-deliverable emails

This scenario can indicate malware hijacking mailboxes, causing a significant amount of spam/malicious emails to be sent from a user’s mailbox.


Speak to the user whose address has been potentially compromised to determine whether they are aware of the situation. If they are not aware, halt any outgoing mail from the exchange server from their mailbox and investigate their profile for any malware artifacts.


Mail transfer agent (MTA) or mail relay software logs will be correlated to detect bandwidth threshold-based alerts, threshold-based alerts and anomaly-based alerts. Matches will raise a correlated event/alert.

Event Sources:

Mail transfer agents, Firewalls, IDS/IPS, Antivirus / Malware solutions

Step 1: Preparation

This action can indicate potential bots sending spam from an internal host. For this to happen, the system must have been previously compromised. Technicians should be able to have access to AD or have up-to-date lists of contacts of all assets and staff information. Being able to quickly contact a user or the person in charge of a server is the key to being effective. IT Response Team should have knowledge of Anti-Botnet remediation best practices.

Step 2: Identification

The crucial goal is to determine which host is infected and sending an email. There are several symptoms which often manifest shortly after botnet infiltration as the compromised machine begins executing its instructions. Awareness of these symptoms can aid in early botnet detection. In action, bots are essentially backdoor Trojans. Look for unexpected IRC traffic from internal hosts. The port being used for IRC traffic may even be a non-standard IRC port (6666, 6667...) Run a complete IP check for sending Mail servers.

Step 3: Containment

Speak to the user whose address has been potentially compromised to determine whether they are aware of the situation. If they are not aware, halt any outgoing mail from the exchange server from their mailbox and investigate their profile for any malware artefacts. A good practice is only to allow mail traffic between the server and the internet. This is usually done by restricting communication to standard ports such as 25, 465 and 587.

Step 4: Eradication

Like most of the newer forms of malware, bots can be hard to detect and even harder difficult to remove. Methods can be tool based or manual. Depending on the remediator’s infrastructure and line of businesses, their respective may differ substantially.

Step 5: Recovery

To recover from a computer virus infection or to prevent future infections from malware or computer viruses, use a reliable antivirus. Check if you already have antivirus software installed, many operating systems bring their preinstalled security tools. Identify and track servers, keep a patch maintenance policy and follow post-patch security best practices.

Please note that these services do not remove malware, generally only removing the infection manually and rebuilding the site from backup can do that.

Step 6: Lessons Learned

Implement security awareness policies for employees and end users. Install virus-checking software and update it regularly. Use security software to block or disable potentially harmful applications. Malware is often a component of advanced multi-stage attacks. Configure your firewalls to send email notifications, SNMP Traps and syslog.

Квалификация: Компьютерная безопасность, Безопасность сети, Написание технических текстов, Интернет-безопасность, Security Sales

Показать больше soc use case examples, incident response use cases, cyber security use cases examples, how to develop and maintain security monitoring use cases, soc use case framework, cyber security use cases, ot security use cases, list of security use cases, use case diagram generating sales report, metatrader trading use case diagram, electronic bank system use case diagram, use case documentation, use case diagram hotel, pms use case activity, mmo java project join looking, use excel project tracking, use case diagram project hotel, use case web site project, use case diagram crm project, we are looking typing expert freelancer for my project we have millions of images to type in ms word files separated use font cl

О работодателе:
( 0 отзыв(-а, -ов) ) Gerrards Cross, United Kingdom

ID проекта: #24551842

33 фрилансеров(-а) в среднем готовы выполнить эту работу за £118


Hello, I am Noel Reuben. I have gone through your project details; you need an expert content writer. I am a Seasoned Ghostwriter for Hire. A proficient Copywriter and SEO expert like me is all you need to get the task Больше

£50 GBP за 4 дней(-я)
(246 отзывов(-а))

Hi. I am an IT Security expert and an experienced technical writer with an MS in Computer Science and Engineering. I have a very good understanding on security compliances such as PCI DSS, ISO 27000 series, NIST, HIPPA Больше

£200 GBP за 7 дней(-я)
(194 отзывов(-а))

Hi, I am a very experienced copywriter for cyber security content and I can help you connect more successfully with your audience. My writing approach combines intensive research with a style that is professional, auth Больше

£100 GBP за 2 дней(-я)
(88 отзывов(-а))

Note: I will do your project in 50 GBP. I have worked for my American, Australian, UK and European clients and they are happy with my work. Please check reviews. Hey Hope you are doing great :) I have read your p Больше

£50 GBP за 3 дней(-я)
(138 отзывов(-а))

I am an advanced penetration tester and a lethal hacker I can help you with your needs, bid can be negotiated

£135 GBP за 7 дней(-я)
(42 отзывов(-а))

Hi, I have read your project description and would like to offer my services. I am a certified network consultant having nine years of experience in network and system administration. I am proficient working with such Больше

£135 GBP за 7 дней(-я)
(39 отзывов(-а))

When writing specialized substance I approach the assignments with a view to pass on data to groups of onlookers in an unmistakable and successful way. I am great at making specialized data reasonable even to non-speci Больше

£50 GBP за 5 дней(-я)
(2 отзывов(-а))

Hello, I am Cyber Security Expert with 6 years of experience and ready yo write those 5 use case on this current threats. I will write all with screenshots practical for people to understand and follow . contact me

£250 GBP за 5 дней(-я)
(53 отзывов(-а))

I only live with two priorities quality work and client satisfaction. I am a reliable writer with over five years of experience in different fields of writing outside and inside freelancer. My expertise includes but no Больше

£55 GBP за 2 дней(-я)
(37 отзывов(-а))

I will help you in this case. Please tell me the deadline. I assure you quality work as per your given deadline. I can provide you with a guarantee of plagiarism free work. I am producing quality content for my clients Больше

£20 GBP за 1 день
(87 отзывов(-а))

Dear buyer! I am Annie, a stay at home mom with 9 month old daughter so I currently have free time throughout the day. I've done my Masters in Finance and HRM and is currently pursuing Phd. I'm interested to hear more Больше

£30 GBP за 3 дней(-я)
(50 отзывов(-а))

Dear client as pertains to this project, I have read and understood all the instructions I bring with enormous experience in the field of blog and article writing. I have the necessary skills to deliver quality SEO art Больше

£90 GBP за 7 дней(-я)
(96 отзывов(-а))

Hello, This is Pratiksha here, I have gone through your project description, and I am confident enough to handle it. I am an expert Article, Blog Writer, having experience of 7+ years. I would love to work with you. I Больше

£250 GBP за 7 дней(-я)
(42 отзывов(-а))

Are you in search of a reliable, professional, and credible writer? Look no further since a qualified and competent writer is here at your service. Am a graduate in Software engineering, MBA in project management and a Больше

£80 GBP за 7 дней(-я)
(40 отзывов(-а))

Hello, I have read your project details. I am a competent research writer and I will be glad to assist you with accomplishing your project. I have experienced in writing research reports on topics such as Conflicts an Больше

£100 GBP за 2 дней(-я)
(9 отзывов(-а))

Feel fee to contact me for Cyber Security Use Case Project .Shoot me message to discuss further more details .We provide the comments,images,videos,demos and live sessions in order to help the [login to view URL] payment only Больше

£150 GBP за 5 дней(-я)
(8 отзывов(-а))

Hello, I have read your job details carefully and I can do your work if you will provide me more details of the project. I will definitely give you a better solution to your problem. Thanks!! Hitesh Goyal

£100 GBP за 1 день
(2 отзывов(-а))

Hi, Hope you are doing great. I have more than 12 years of cyber security experience. I hold CISSP, CISM and ISO 27001 LI certifications. I have worked as consultant, trainer and auditor in multiple companies includi Больше

£225 GBP за 7 дней(-я)
(4 отзывов(-а))

Hi, I have great writing experience of 10 years. I can provide you very good research according to your requirements. I have completed a lot of similar projects of research, you can verify some of relevant projects fro Больше

£23 GBP за 1 день
(8 отзывов(-а))

With my 11 years of solid experience evaluating complex medical studies and publishing detailed reports and articles, my background in medicine—coupled with my outstanding writing and editorial skills—has prepared me t Больше

£135 GBP за 7 дней(-я)
(3 отзывов(-а))