Once the incident was discover, the auditor should follow the incident response plan and inform the incident response team of the breached in person …show more content…
The hacker was able to intercept the email communication between the auditor and several individuals and create fake response with the auditor until he was able to gain additional permission to the financial records systems using the man-in-the-middle attack. The social engineering allows the hacker to persuade the auditor to give him the permission he did not originally have to the financial records by impersonating the other individuals, which allowed him to change the lower the salary of the company president and several other employees. Because the email system did not include any authentication protocol, the hacker was able to send the fake emails to the