<?xml version="1.0"?>
<Module projectID="1264" moduleID="1440">
	<ModuleName>mod4</ModuleName>
	<AU>C01_M04</AU>
	<Title>Module Conclusion</Title>
	<Subtitle>Module Conclusion</Subtitle>
	<LinkSet>links</LinkSet>
	<CourseMapSWFPath>../C01_M04/assets/coursemap.swf</CourseMapSWFPath>
	<NavBtns>
        <NavBtn>
			<ID>courseMenuBtn</ID>
			<Label>Course menu</Label>
			<RMAText>Course menu. Select this button to access the course menu.</RMAText>
			<ClickEventName>MainMenuButtonClicked</ClickEventName>
		</NavBtn> 	
		<NavBtn>
			<ID>moduleMapBtn</ID>
			<Label>Lesson Map</Label>
			<RMAText>Lesson Map.  Select this button to access the lesson map.</RMAText>
			<ClickEventName>CourseMapButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>glossaryBtn</ID>
			<Name>Glossary</Name>
			<RMAText>Glossary. Select this button open the glossary.</RMAText> 
			<ClickEventName>GlossaryButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resourcesBtn</ID>
			<Label>Resources</Label>
			<RMAText>Resources. Select this button open the resources.</RMAText>
			<ClickEventName>ResourcesButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>exitBtn</ID>
			<Label>Exit</Label>
			<RMAText>Exit.  Select this button to exit the course.</RMAText>
			<ClickEventName>ExitButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>replayBtn</ID>
			<Label>Replay</Label>
			<RMAText>Replay. Select this button to replay the current screen.</RMAText>
			<ClickEventName>ReplayButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>pauseBtn</ID>
			<Label>Pause</Label>
			<RMAText>Pause.  Select this button to pause the course.</RMAText>
			<ClickEventName>PauseButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn>
			<ID>resumeBtn</ID>
			<Label>Resume</Label>
			<RMAText>Resume. Select this button to resume the course.</RMAText>
			<ClickEventName>ResumeButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn prevBtn="true">
			<ID>previousPgBtn</ID>
			<Name>Previous Page</Name>
			<RMAText>Previous. Select this button to go to the previous screen.</RMAText>
			<ClickEventName>PreviousButtonClicked</ClickEventName>
		</NavBtn>
		<NavBtn nextBtn="true">
			<ID>nextPgBtn</ID>
			<Name>Next Page</Name>
			<RMAText>Next. Select this button to go to the next screen.</RMAText>
			<ClickEventName>NextButtonClicked</ClickEventName>
		</NavBtn>
	</NavBtns>
	<Topics>
		<Topic>
			<Title>Summary and Conclusion</Title>
			<Subtitle/>
			<Pages>
				<Page>
					<Title/>
					<Subtitle/>
					<Filename>disacnd04_01</Filename>
					<PageNbr>1</PageNbr>
					<ShowText>
						<Txt frameNbr="1">Now that you've learned about a methodology for conducting CND analysis, let's check in on Pat, the CND analyst that we met at the beginning of this module. Pat continues to see numerous IDS alerts each day. As before, there are some days when the alerts just trickle in and other days when they never seem to stop. On this day, the alerts have again been coming in with alarming frequency, but armed with a methodology to structure the analysis process, she is now better prepared to handle the growing queue of alerts. Instead of sending these alerts directly up the chain of command, she is looking to other sources of data to correlate the increasing volume of alert data. She is also consulting with other members of the CND team to develop hypotheses, validate theories, and create a narrative. She has been able to confirm that a successful intrusion has occurred, so right away, she reports up the chain of command that immediate action must be taken to mitigate and contain the threat. With a focused initial report and recommendation, Pat's superiors are able to deploy a system-wide lockdown that stops the adversary in his tracks. The threat has been mitigated for now, but Pat's job is not done. She continues with a full investigation, conducting the necessary research and analysis to provide context to the alert data and support several possible theories to explain the incident. As continued analysis provides further insight into the incident, her theories evolve until she is able to compile a detailed report that tells the story of the incident from beginning to end. Pat's final report contains multiple theories along with data and a narrative to support each one. Her report also contains descriptions of the methods used to gather and compile that data, a vulnerability analysis, and recommendations on how to prevent similar compromises in the future. With the context provided by her full analysis, her superiors are able to act on the report and implement system-wide eradication and remediation measures. At the end of the day, Pat's work in ensuring a quick response to the threat event combined with her knowledge, skills, and judgment have proven her to be a capable CND analyst. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Rich Media Text Description, Course: D O D Intrusion Detection System (I D S) Analysis, Part 3, Module 1: C N D Analysis: A Structured Approach to Intrusion Analysis, Lesson 4: Module Conclusion, For each screen you will hear a description. The description is cued by an audio tone. Listen to the description, and then select the play audio narration button to continue. Screen 1 of 3. Lesson title: Module Conclusion. Topic title: Summary and Conclusion. Screen title: Review. Reprised image displays of female analyst named Pat. Images and text display in support of audio. Image displays on screen of e-mail message to supervisor. Message reads as follows: Dave, The I D S is going berserk! The alert traffic is alarming, and indicators point to a successful intrusion. Analysis of the incident is ongoing, but you are advised to take immediate action to secure the network. The initial findings are attached. Sincerely, Pat, C N D Analyst.</ContentDescription></Sec508Data></Page>
			</Pages>
		</Topic>
		<Topic>
			<Title>Summary and Conclusion</Title>
			<Subtitle/>
			<Pages>
				<Page>
					<Title>Summary</Title>
					<Subtitle/>
					<Filename>disacnd04_02</Filename>
					<PageNbr>2</PageNbr>
					<ShowText>
						<Txt frameNbr="1">In this lesson, we will review what you have learned in this module. Lesson 2, Understanding Your Role in CND Analysis, reviewed the concept of analysis, discussed the role of the analyst in conducting analyses, explained the value of taking a structured approach to analysis, and introduced an analysis methodology for you to incorporate into your existing analysis processes. Lesson 3, An Approach to CND Analysis, examined the analysis methodology in depth, discussing each phase of the methodology and explaining how the methodology can be used to augment your existing analysis processes. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
					<Popups>
						<Popup>
							<Title>Summary</Title>
							<Subtitle/>
							<Filename>disacnd04_02_01</Filename>
							<PageNbr>2</PageNbr>
							<ShowText>
								<Txt frameNbr="1">  </Txt>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName></Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1"></ContentDescription></Sec508Data></Popup>
						<Popup>
							<Title>Summary</Title>
							<Subtitle/>
							<Filename>disacnd04_02_02</Filename>
							<PageNbr>2</PageNbr>
							<ShowText>
								<Txt frameNbr="1"/>
								<Txt frameNbr="1"/>
							</ShowText>
						<Sec508TriggerName></Sec508TriggerName><Sec508Data><ContentDescription frameNbr="1"></ContentDescription></Sec508Data></Popup>
					</Popups>
				<Sec508Data><ContentDescription frameNbr="1">Screen 2 of 3. Screen title: Summary. Two images display on screen to represent each of the content lessons presented in this module. One is labeled Understanding your Role in C N D Analysis. The other is labeled An Approach to C N D Analysis. Text displays as follows: References to open source or freeware in this training product are for training purposes only, and should not be considered endorsements of these products. Please check with your command, service, or agency for guidance on the use of these products.</ContentDescription></Sec508Data></Page>
				<Page>
					<Title>Conclusion</Title>
					<Subtitle/>
					<Filename>disacnd04_03</Filename>
					<PageNbr>3</PageNbr>
					<ShowText>
						<Txt frameNbr="1">Congratulations! You have completed the CND Analysis: A Structured Approach to Intrusion Analysis module. You should now be able to identify the role of the CND analyst in the analysis of CND information. You should also be able to analyze a narrative to determine whether it fully explains a CND incident, and you should be able to apply the recommended CND analysis methodology to your analysis of a CND incident. </Txt>
						<Txt frameNbr="1"/>
					</ShowText>
				<Sec508Data><ContentDescription frameNbr="1">Screen 3 of 3. Screen title: Conclusion. Congratulations text displays. Text displays in support of audio. Objectives bullets change to checkmarks in sync with audio.</ContentDescription></Sec508Data></Page>
			</Pages>
		</Topic>
	</Topics>
</Module>
