Sifers-Grayson Cybersecurity Incident Report Form
CSIA 310
SIFERS-GRAYSON CYBERSECURITY INCIDENT REPORT FORM
1. Contact Information for the Incident Reporter and Handle
· Name:
· Role: Cyber Incident Response Team Lead
· Organizational unit: Engineering Department / Sifers - Grayson
· Email address:
[email protected]– Phone number: (502) 234-5555
· Location: 1555 Pine Knob Trail, Pine Knob, KY 42741
2. Incident Details
· Status change date/timestamps: It is yet unknown when the onslaught will begin. Certain computer systems become slow-moving as a result of the enormous volume of traffic over the network networks. Red flags were also raised by the occu
ence when drone operation equipment was lost.
· Physical location of the incident: Pine Knob, KY
· Cu
ent status of the incident: The attack has ended.
· Source/cause of the incident: The R&D center's IP address 10.10.135.0/24 served as the attack's origin. The servers were
eached via an unsecured data connection to a business network that merely had a firewall installed and that was not set up to send out notifications in the event of any failures or problems.
· Description of the incident: When the network stopped working owing to heavy traffic, the assault was discovered. suspicious emails that appear to be coming from the company. unusual password behavior
ought on by compromised logins The proof came from the logs data from a server that was running Task Manager.
· Description of affected resources: The R&D Center server was hacked (IP Address 10.10.135.0/24) and all documentation and source codes for the AX10 Drone System were stolen. When keylogging software was left unattended, 20% of worker USB key logins were compromised. The test range's network (IP Address 10.10.145.0/24) has already been compromised. Once an infected PROM (malware) was installed on the AX10 drone prior to flight and flown from the stated testing site, its drone was declared "stolen." A corporate headquarters workstation (IP Address 10.10.100.0/24) has been used to send "phishing" mails utilizing credentials collected. And over 1500 external receivers' emails & IP addresses were lost as...