Unit 5 Assignment Directions: Project 3 Part A: Planning an Indicator of Attack/Compromise Investigation
This research paper aims to address the challenges faced by the City of Gotham in implementing a solid Cybersecurity Operation Center (SOC). The city’s IT security has failed to protect its assets and user data, resulting in successful intrusions and violations of privacy and security rules mandated by the government. The mayor, recognizing the situation’s urgency, has turned to our consulting company for assistance. This research paper outlines a detailed and applied project that embodies forefront practices in cybersecurity, demonstrates cybersecurity concepts and adherence to national standards through practical application, devises a structured plan for hands-on cybersecurity experiences, and sets precise, achievable goals with strategic approaches for the project’s implementation.
Note the following machines which will be deployed as you go about planning your project.
- Kali Machine: This machine will act as the Attacker machine.
- Windows 10 Machine: This machine will act as the Victim machine.
Introduction
Exercise 1: Craft a detailed and applied project that embodies the forefront practices in cybersecurity.
In this first exercise, you will outline your applied plan for an IoC/IoA investigation in the Research Paper template.
- Introduction:
- Overview of the challenges faced by the City of Gotham regarding cybersecurity
- Importance of implementing a solid Cybersecurity Operation Center (SOC) to address these challenges
- Explanation of the objective to craft a detailed and applied project that embodies forefront practices in cybersecurity
- Background and Needs Assessment
- Comprehensive needs assessment of the City of Gotham’s cybersecurity requirements and challenges
- Research on forefront practices in cybersecurity, considering emerging threats, industry standards, and successful case studies
- Identification of relevant frameworks and methodologies to guide the SOC implementation project
- Proposal
- Proposal for the detailed and applied project, integrating forefront practices in cybersecurity
- Explanation of how these practices address the identified challenges and enhance the city’s cybersecurity posture
- Detailed plan for implementing each practice, including resource allocation and timeline
Cybersecurity Concepts Review
Exercise 2: Demonstrate cybersecurity concepts and adherence to national standards through practical application.
In this second exercise, you will develop a literature review section of your research paper with an evaluation and alignment of what you researched for the current scenario.
- Overview:
- Explanation of the objective to demonstrate cybersecurity concepts and adherence to national standards
- Overview of key cybersecurity concepts relevant to the SOC implementation project
- Importance of adhering to national cybersecurity standards and regulations
- Research:
- In-depth research on cybersecurity concepts, including threat intelligence, incident response, vulnerability management, network security, and identity and access management—Align what you choose to research on the Industry and Associated Skills Master List and select 3-5 skills from this list.
- Evaluation of their applicability to the City of Gotham’s cybersecurity project.
- Analysis of national cybersecurity standards and regulations, such as the NIST Cybersecurity Framework, ISO 27001, and relevant privacy laws
- Evaluation and Alignment:
- Demonstration of comprehensive expertise in cybersecurity concepts and their applications to the SOC implementation project
- Evaluation of the city’s current adherence to national standards and identification of areas for improvement
- Development of strategies to align the city’s cybersecurity practices with the relevant national standards and regulations
Strategy Planning
Exercise 3: Devise a structured plan for hands-on cybersecurity experiences, focusing on real-life scenarios.
In this third exercise, you develop the strategy section of your research paper.
- Overview:
- Explanation of the objective to devise a structured plan for hands-on cybersecurity experiences
- Importance of hands-on learning experiences in cybersecurity
- Relevance of real-life scenarios to enhance learning outcomes
- Methods:
- Design of a structured plan for hands-on cybersecurity experiences for the IT security team involved in the SOC implementation
- Identification of key focus areas for hands-on learning, such as incident detection and response, vulnerability assessment, and secure network design
- Incorporation of real-life scenarios and case studies to enhance the learning experiences
- Analysis:
- Comprehensive plan for hands-on cybersecurity experiences, focusing on real-life scenarios
- Explanation of how the plan enhances the IT security team’s skills and knowledge
- Evaluation criteria to measure the effectiveness of the hands-on learning activities
Tactical Plan
Exercise 4: Construct specific, quantifiable objectives and formulate tactical plans for the cybersecurity project’s execution.
In this fourth exercise, you will finalize the tactical plan in your research paper for the implementation of your penetration test.
- Overview:
- Explanation of the objective to set precise, achievable goals and map out strategic approaches
- Importance of clear and measurable goals for successful project implementation
- Overview of the project management approach for the SOC implementation
- Objectives, Scope, and Communication:
- Development of specific, quantifiable objectives for the SOC implementation project, addressing areas such as intrusion prevention, incident response, and regulatory compliance
- Review and select 3-7 main competencies that your project is achieving based on the objectives you defined. Use the CTCH Cybersecurity Technology Competencies Master List.
- Establishment of precise, achievable goals for the SOC implementation project, addressing areas such as intrusion prevention, incident response, and regulatory compliance
- Development of strategic approaches for the implementation of the cybersecurity project, considering timelines, milestones, and resource allocation
- Creation of a communication and reporting framework to ensure effective coordination
- Timeline, Monitoring, and Evaluation:
- Precise, achievable, SOC implementation project goals aligned with the identified needs and challenges
- Detailed strategic approaches outlining the execution timeline and responsible parties
- Monitoring and evaluation framework to track progress and ensure successful completion of the project
- Conclusion:
- Summary of the research paper’s findings and contributions
- Emphasis on the importance of a solid Cybersecurity Operation Center for the City of Gotham
- The potential impact of the applied project in addressing the city’s cybersecurity challenges and restoring trust in its security capabilities
Tutorial for Planning an Indicator of Attack/Compromise Investigation

