Preview

FXT2 Task 2 Follow Up

Good Essays
Open Document
Open Document
799 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
FXT2 Task 2 Follow Up
FXT2 Task 2
Follow-Up re: Human Resources Data Modification
1. Identify areas that were not addressed by the IT staff’s response to the incident.
Based on the narrative, the only corrective measure the company implemented was PKI. As noted in the original evaluation, several areas need to be addressed:
Climate/culture of the organization
Employee training for social engineering attacks
Positive identification of employees when granting role-based access
Vulnerabilities within and without the network, specifically to sniffers and eavesdropping
The ease with which the employee changed his pay rate, indicating a single system used for HR profiles rather than segregated duties & systems
The PKI that was installed only addressed the HR system, rather than the entire organization
Honestly, the whole environment at this company needs a complete evaluation and overhaul!
2. Outline the other attacks mentioned in the scenario that were not noticed by the organization.
Social Engineering
Sniffing/Eavesdropping
Unauthorized Privilege Escalation
Network Penetration
Spoofing
a. Describe the nature of the attacks not noticed by the organization.
By “the nature of the attacks” I interpret this to mean the source of the attacks, or the skillset required to carry out the attacks. I believe this employee was tenured based on their ability to:
Hack into the HR system
Successfully intercept the email from audit to the other individuals
Successfully impersonate the individuals the email from audit was sent to
Successfully identify the company president and other employees whose pay records were modified
Successfully eliminate evidence of the attack, indicated by two paycheck cycles going by before audit caught the error
Knowing which access to acquire in order to modify other payroll records
Taken holistically, this indicates an employee who knew the organization and the company’s network quite well. This employee knew basic network attack tactics, and the checks and balances that

You May Also Find These Documents Helpful

  • Powerful Essays

    Jft2 Task2

    • 1878 Words
    • 6 Pages

    Financial strengths of the opera are positive cash flow, cash reserves and assets as well as fund raising.…

    • 1878 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 454 Lab 4 Essay

    • 457 Words
    • 2 Pages

    (1 point) 6. The first attack demonstrated on the Nittany Corp. network in the lab video is this kind of attack.…

    • 457 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT2580 Final Study Guide

    • 1423 Words
    • 6 Pages

    7. Which of the following is any weakness in a system that makes it possible for a threat to cause it harm? (Page 96)…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    A1. Bill Bailey You will want to read through the theories of motivation found in chapter 8 of your textbook and select the theory that you believe would be most appropriate for Bill Bailey to use, taking into consideration his position on the merger. Now you have the opportunity to show that you can take a theory and show, via discussion, how one would implement each of the components of a theory to successfully utilize the theory in real life. To do this you will need to discuss specifically what Bill might do to implement each of the parts of the theory.…

    • 854 Words
    • 4 Pages
    Better Essays
  • Better Essays

    3. The failure to have a “competent person” that was specifically trained in trench safety.…

    • 797 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Chapter 2 Assessment

    • 264 Words
    • 1 Page

    12) Which of the following best describes the term “attack surface”? B) All possible vulnerabilities that could be exploited.…

    • 264 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Threats can be encounter by a network administrator. One can come from the administrator because even after training is complete, they still can make errors if they do not understand what they have learned. Human error is still a factor but from a different point of view. If an administrator had the training and his expectation was just to be an administrator and not deal with security, he may not be too concerned about the security aspect of the job. New administrators must clearly understand what position they are being hire for. Matthias did know he was going to have to take basic information security training; it was a surprise to him. Another thing that will affect a new employee is if the supervisor is not engaged in the training of the new employees. This also can be one of the…

    • 621 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    St. Luke Case Summary

    • 62 Words
    • 1 Page

    However,they had few IT technical issues related to the network and other security related applications.Some of the issues related as :…

    • 62 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Week 4 Assignment

    • 815 Words
    • 3 Pages

    Cybercriminals will never stop trying to compromise systems to obtain data. Organizations need to be aware of where they may be open to attacks, how attackers can enter their environment and what to do if (and when) an attack occurs. This test should be done as a surprise attack, since a hacker…

    • 815 Words
    • 3 Pages
    Good Essays
  • Better Essays

    References: Bishop, M., Engle, S., Frincke, D. A., Gates, C., Greitzer, F. L., Peisert, S., & Whalen, S. (2010). A risk management approach to the 'insider threat '. Advances in Information Security, 49, 115-137. doi: http://dx.doi.org/10.1007/978-1-4419-7133-3…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Target Breach Case Study

    • 346 Words
    • 2 Pages

    Greg Steinhafel made many bad decisions during his time, whether it is a botched expansion into Canada, or the mishaps before and after the data breach in 2013 (Reisinger, 2014). Before the hack occurred, Greg displayed the managerial planning function by putting into place data security measures six months before the hacking (Riley et al., 2014). He was preparing and putting into place measures…

    • 346 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Gregg Shafel Case Summary

    • 422 Words
    • 2 Pages

    If I had the opportunity to advise Gregg Steinhafel and Target on actions to take to better handle a crisis like the cyber attack they experienced in 2013 I would focus on policy and training development. It seemed alarming to me that a CEO and his top executives disagreed on the best strategy and moved forward without reaching a consensus (Kinicki, 2016). Discrepancies between team members, especially at such a high level, would indicate to me an inconsistent or poorly established culture. Identifying the company's actual values and goals is imperative to then detail the ethical standards, proper course of action, appropriate communications, and resulting training (LeClair, 2000). Establishing these policies would lead to standard expectations in behavior and choices, and uniform culture (LeClair, 2000).…

    • 422 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Based on what you have learned in this chapter, describe several broad principles that could be applied in helping the individuals involved understand what went wrong in the following events. What suggestions could you make for remedying the problems involved?…

    • 1284 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Kessler International (2000, January 4). Employees, Not Hackers, Greatest Computer Threat. Retrieved December 13, 2003, from http://www.investigation.com/articles/library/2000articles/articles18.htm…

    • 4047 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    hero

    • 407 Words
    • 2 Pages

    2. How could the AVC have avoided the problems? How can they prevent them in the future?…

    • 407 Words
    • 2 Pages
    Satisfactory Essays