![]() |
Cybersecurity Capstone: Breach Response Case Studies | IBM |
This course is designed to equip learners with foundational knowledge essential for developing Cybersecurity skills through the IBM Cybersecurity Professional Certificate programs. Participants will delve into incident response strategies and security frameworks, learning to identify and classify various vulnerabilities and the corresponding threats targeting contemporary enterprises. The course provides detailed examinations of both historical and recent breaches, focusing on detection methods employed and strategies for mitigating organizational risks. Moreover, participants will analyze the financial implications of data breaches based on comprehensive research and notable case studies.
A notable component of this course involves selecting and researching a current cybersecurity incident reported in the media. Participants will apply acquired knowledge and skills from this course, along with previous cybersecurity training, to conduct detailed analyses encompassing attack types, timelines, vulnerable systems, and potential missed opportunities. Evaluation of these projects will be performed peer-to-peer within the course.
This course caters to individuals aspiring to pursue careers in Cybersecurity as Analysts or Specialists, offering practical insights into real-world cybersecurity breaches. Successful completion of the course also qualifies participants to earn the Cybersecurity Capstone: Breach Response Case Studies IBM digital badge.
Notice!
Always refer to the module on your for the most accurate and up-to-date information.
Module 1 – Incident Management Response and Cyberattack Frameworks
Incident Management Knowledge Check
- Establish a formal incident response capability
- ‘Create an incident response policy
- ‘Hold incident response drills on a regular basis
- ‘Develop an incident response plan based on the incident response policy
- Hybrid incident response team
- Distributed incident response team
- Coordinating incident response team
- Central incident response team
- True
- False
- Detection & Analysis
- Post-Incident Activity
- Preparation
- Containment, Eradication & Recovery
Cyberattack Frameworks Knowledge Check
- Continue the attack, expand network access
- Continuous phases occur
- Attack beginnings
- Attack objective execution
- Launch and execute the attack
- Attack beginnings
- Launch and execute the attack
- Continuous phases occur
- Continue the attack, expand network access
- Attack objective execution
- Build a threat profile of adversarial actors who are likely to target the company
- Analyze all network traffic and endpoints, searching for anomalous behavior
- Thoroughly examine available forensics to understand attack details, establish mitigation priorities, provide data to law enforcement, and plan risk reduction strategies
- Enforce strong user password policies by enabling multi-factor authentication and restricting the ability to use the same password across systems
- Implement strong endpoint detection and mitigation strategies
- Enforce strong user password policies by enabling multi-factor authentication and restricting the ability to use the same password across systems
- Thoroughly examine available forensics to understand attack details, establish mitigation priorities, provide data to law enforcement, and plan risk reduction strategies
- Implement strong endpoint detection and mitigation strategies
- Analyze all network traffic and endpoints, searching for anomalous behavior
- Build a threat profile of adversarial actors who are likely to target the company
- True
- False
Incident Management Response and Cyberattack Frameworks Graded Assessment
1. In creating an incident response capability in your organization, NIST recommends taking 6 actions. Which three (3) actions that are a included on that list? (Select 3)- Establish policies and procedures regarding incident-related information sharing
- Secure executive sponsorship for the incident response plan
- Considering the relevant factors when selecting an incident response team model
- Develop incident response procedures
- Hybrid incident response team
- Coordinating incident response team
- Central incident response team
- Distributed incident response team
- The platform was put together by its very small IT department who has no experience in managing incident response.
- Migrate all online operations to a cloud service provider so you will not have to worry about further attacks
- Outsource the monitoring of intrusion detection systems and firewalls to an offsite managed security service provider while leaving the response to detected incidents to current IT staff
- Use internal IT staff only, forcing them to come up to speed as quickly as possible
- Completely outsource the incident response work to an onsite contractor with expertise in monitoring and responding to incidents
- Programming
- Network administration
- System administration
- Encryption
- Detection & Analysis
- Preparation
- Containment, Eradication & Recovery
- Post-Incident Activity
- Containment, Eradication & Recovery
- Post-Incident Activity
- Detection & Analysis
- Preparation
- Continue the attack, expand network access
- Attack beginnings
- Continuous phases occur
- Attack objective execution
- Launch and execute the attack
- Attack beginnings
- Launch and execute the attack
- Continue the attack, expand network access
- Continuous phases occur
- Attack objective execution
- Implement strong endpoint detection and mitigation strategies
- Thoroughly examine available forensics to understand attack details, establish mitigation priorities, provide data to law enforcement, and plan risk reduction strategies
- Build a threat profile of adversarial actors who are likely to target the company
- Enforce strong user password policies by enabling multi-factor authentication and restricting the ability to use the same password across systems
- Analyze all network traffic and endpoints, searching for anomalous behavior
- Thoroughly examine available forensics to understand attack details, establish mitigation priorities, provide data to law enforcement, and plan risk reduction strategies
- Implement strong endpoint detection and mitigation strategies
- Enforce strong user password policies by enabling multi-factor authentication and restricting the ability to use the same password across systems
- Build a threat profile of adversarial actors who are likely to target the company
- Analyze all network traffic and endpoints, searching for anomalous behavior
- True
- False
Module 2 – Phishing Scams
Introduction to Phishing Scams Knowledge Check
1. Some of the earliest known phishing attacks were carried out against which company?- Yahoo
- America Online (AOL)
- As a phishing attack.
- No attack, this is a legitimate note from the security department of your bank.
- A spear phishing attack.
- A whale attack.
- True
- False
- (Image: sjjLry3a7uk)
- Suspicious sender’s address.
- Suspicious attachments.
- There is a hyperlink in the body of the email.
- Poor quality layout.
- The average cost of a data breach is $3.86 million.
- 15% of people successfully phished will be targeted at least one more time within a year.
- 12% of businesses reported being the victim of a phishing attack in 2018.
- Phishing accounts for 90% of data breaches.
- Between 100 and 200.
- Between 1500 and 1800.
- Between 130,000 and 140,000.
- Between 1.3 million and 1.4 million.
Phishing Case Study Knowledge Check
1. Which three (3) techniques are commonly used in a phishing attack? (Select 3)- Breaking in to an office at night and installing a key logging device on the victim’s computer.
- Make an urgent request to cause the recipient to take quick action before thinking carefully.
- Send an email from an address that very closely resembles a legitimate address.
- Sending an email with a fake invoice that is overdue.
- A man in the middle attack.
- A phishing attack.
- A spear phishing attack.
- A whale attack.
- Microsoft
- IBM
- Apple
(Image)
- Suspicious attachments
- There is a hyperlink in the body of the email
- Poor quality layout
- There are spelling errors.
- 94% of phishing messages are opened by their targeted users.
- BEC (Business Email Compromise) scams accounted for over $12 billion in losses according the US FBI.
- 76% of businesses reported being a victim of phishing attacks in 2018.
- Phishing attempts grew 65% between 2017 and 2018.
- Credit card fraud
- Phone or utility fraud
- Loan or lease fraud
- Government documents or benefits fraud
Module 3 – Point of Sale Breach
Introduction to Point of Sale Attacks Knowledge Check
1. True or False. There are more successful PoS attacks made against large online retailers than there are against small to medium sized brick-and-mortar businesses.- True
- False
- PCI-DSS
- Sarbanes-Oxley (SOX)
- GDPR
- NIST SP-800
- Cardholder data may not reside on local PoS devices for more than 48 hours
- Protect stored cardholder data
- Install and maintain a firewall configuration to protect cardholder data
- Do not use vendor-supplied defaults for system passwords and other security parameters
- True
- False
- Windows
- Mac i/OS
- Linux
- POSOS
- Use it as part of a larger identity theft scheme
- Use it to buy merchandise
- Sell it to a carder
- Sell it to a distributor
- A voluntary payment card industry data security standard
- A provision of the European GDPR that covers payment card data privacy regulations
- A financial regulation in the United States covering the payment card industry that replaced Sarbanes-Oxley
- A financial regulation in the United States that supplements Sarbanes-Oxley with missing provisions covering the payment card industry
Point of Sale Breach Graded Assessment
1. Which group suffers from the most PoS attacks?- Restaurants and small retail stores.
- Large online retailers like Amazon.com
- Social media companies like Facebook and Instagram.
- Government agencies.
- Build and maintain a secure network and systems
- Maintain a vulnerability management program
- Protect cardholder data
- Require use of multi-factor authentication for new card holders
- Use and regularly update antivirus software
- All employees with direct access to cardholder data must be bonded
- Encrypt transmission of cardholder data across open, public networks
- Develop and maintain secure systems and applications
- Mobile Device Management (MDM)
- Employee Education
- Tokenization
- Discontinue use of magnetic strip readers and cards
- While stored on the PoS device hard drive
- While in RAM
- After the card data has been received by the credit card processor
- While in transit between the PoS device and the credit card processing center
- Credit card thieves use stolen credit cards to buy merchandise that is then returned to the store in exchange for store credit that is sold at a discount for profit
- Credit card thieves resell stolen card numbers to dark web companies that use call-center style operations to purchase goods on behalf of customers who pay for them at discounted rates using real credit cards
- Credit card thieves sell stolen credit cards directly to carders using weekly dark web auctions. The carders then encode credit card blanks with the stolen numbers and resell the cards
- Stolen credit card numbers are sold to brokers who resell them to carders who use them to buy prepaid credit cards that are then used to buy gift cards that will be used to buy merchandise for resale
Module 4 – 3rd Party Breach
THIRD-PARTY BREACH KNOWLEDGE CHECK1. A cyber attack originating from which three (3) of the following would be considered a supply-chain attack? (Select 3)
- An environmental activist group
- E-mail providers
- Subcontractors
- Web hosting companies
- Cloud-based storage or hosting providers
- Online payment or credit card processing services
- JavaScript on websites used for web analytics
- Security vulnerabilities in operating systems
- True
- False
10%
- 51%
- 80%
- 92%
Third-party Breach Graded Assessment
- True
- False
- Highly effective
- Effective
- Somewhat or not effective
- Not effective at all
- Corporate financial data
- Personal information
- Customer financial information
- Confidential corporate strategy data
- True
- False
- Tell others of their experience
- Use social media to complain about their experience
- Comment directly on the company’s website
- File a complaint with the FTC or other regulatory body
Module 5 – Ransomware
Ransomware Knowledge Check
1. You get a pop-up message on your screen telling you that critical files on your system have been encrypted and that you must pay a fee to get the encryption key. What type of ransomware has attacked your system?- Blockware
- Crypto
- Leakware/Doxware
- Locker
- Remote Desktop Protocol (RDP)
- Malicious Links
- Phishing
- Software Vulnerabilities
- Software Vulnerabilities
- Phishing
- Malicious Links
- Remote Desktop Protocol (RDP)
- Remote Desktop Protocol (RDP)
- Software Vulnerabilities
- Malicious Links
- Phishing
- Phishing
- Remote Desktop Protocol (RDP)
- Software Vulnerabilities
- Malicious Links
- Fully patched operating system and applications
- Strong passwords
- Anti-virus software
- A full system backup
- Bad Rabbit
- GoldenEye
- Jigsaw
- WannaCry
- True
- False
Ransomware Graded Assessment
1. You get a pop-up message on your screen telling you have been locked out of your computer and that access will remain blocked until you pay a fee to have your access restored. What type of ransomware has attacked your system?- Blockware
- Crypto
- Locker
- Leakware/Doxware
- Leakware/Doxware
- Blockware
- Crypto
- Locker
- Remote Desktop Protocol (RDP)
- Malicious Links
- Phishing
- Software Vulnerabilities
- Phishing
- Malicious Links
- Software Vulnerabilities
- Remote Desktop Protocol (RDP)
- Remote Desktop Protocol (RDP)
- Software Vulnerabilities
- Phishing
- Malicious Links
- Phishing
- Remote Desktop Protocol (RDP)
- Malicious Links
- Software Vulnerabilities
- True
- False
- Bad Rabbit
- GoldenEye
- Jigsaw
- WannaCry
- True
- False