Analyze a cybersecurity scenario

Assignment Help English
Reference no: EM131688941

Case Study Analysis Guidelines

Your paper should be submitted as a 4- to 5-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. All sources must be cited in APA format

Overview: This case study will help you analyze a cybersecurity scenario and identify which tenets were violated. Each skill in this paper is an essential part of the final project and the accompanying milestones in this course.

Prompt: Use the information provided in the scenario to analyze the cybersecurity occurrence and determine which tenet(s) were violated.

The required resources for this module detail a scenario at RSA that is similar to the one you will analyze for this assignment. Review each module resource and analyze the security breach that occurred with RSA. Note similarities between this example and the provided scenario for this assignment.

Scenario: In late May of 2011, Lockheed-Martin was targeted by a cyberattack. Lockheed-Martin claimed that they discovered the attack early and reacted quickly, with the result that no real harm was done.

The basis for this breach was with two-factor authentication, where a "factor" in authentication can be something you know, something your are, or something you have. A two-factor authentication system requires you to present instances of two of these three to authenticate with a system. Lockheed-Martin employed a two-factor authentication system that combined a password (something you know) with SecurID, a system produced by RSA labs that provides the "something you have" factor.

A SecurID is a small key fob that displays a number, which changes every 60 seconds. Each key fob has a unique number called its seed, which determines what number is shown in the fob at any given point in time. The server stores your username, password hash, and the seed value for your key fob, and this allows it to determine what number is showing on your key fob (as the fob is synched with your account). When you authenticate, you enter your username and regular password, then you look at the key fob and enter in the number shown there. The authentication server knows what number should be shown at that time on the key fob, and so can verify that the key fob is indeed a thing you have. This is called a one-time password (OTP) system.

In March of 2011, someone attacked RSA with a relatively unsophisticated phishing attack with an attached Excel file with embedded code that exploited a zero- day vulnerability in Adobe Flash.

This enabled attackers to set up a "backdoor"-a way for them to get into the computer-where the attackers were able to steal from RSA the seed values of SecurID key fobs.

In late May of 2011, the attack moved to Lockheed-Martin, where attackers managed to get a keylogger onto a company system. The keylogger recorded the username, password, and SecurID OTPs used by the victim when he or she authenticated, along with the date and time of the log in.

Two-factor authentication is designed for just this kind of scenario. The attacker cannot authenticate because knowing the username, password, and an old OTP is not enough; the current OTP is required. However, these attackers stole seed values. For a given seed value and date/time, they could calculate the number the key fob with that seed value would display at that date and time. All the attackers had to do was to write a program that would compute, for every stolen seed value, the number that would have been showing at the date and time the keylogger recorded the victim's login. Once they found a match with the OTP the keylogger recorded, they would have matched a seed value with a username. This appeared as if the attackers actually had the key fobs themselves.

Critical Elements

Your paper should include these critical elements:

  • Identification of cybersecurity tenets that were violated and rationale of cause
  • Analysis of cybersecurity occurrence and data defense
  • Recommendation of best practices to prevent further recurrence

Reference no: EM131688941

Questions Cloud

Facility in the dallas-fort worth metroplex : Grumheed Corporation (GC), a world leader in advanced tactical drones, plans to open a facility in the Dallas-Fort Worth metroplex.
Phrase and change the same 2-3 characters : You have a long list of websites (more than 20) that you visit frequently, all of which require an ID and password to access the site.
Evaluate the inventory section of two companies : Evaluate the inventory section of two companies using basic comparative analysis and to interpret data to gain insight about the company's inventory management.
Demonstrate the ability to use online productivity tools : Demonstrate the student's ability to use online productivity tools and how they contribute to increased productivity in the work environment.
Analyze a cybersecurity scenario : This case study will help you analyze a cybersecurity scenario and identify which tenets were violated.
Compute the range and coefficient of variation : Compute the range, interquartile range, variance, standard deviation, and coefficient of variation. Compute the Z scores. Are there any outliers?
What is the multifactor productivity : What is the percentage and unit change in multifactor productivity if the factory decreased the labor-hour to 25 hours per day?
Moving the line of visibility away from the customer : What would be the implications of moving the line of visibility away from the customer
Determine what assets we have : How would we determine what assets we have, what needs to be protected, and how to protect them?

Reviews

Write a Review

English Questions & Answers

  Analyzing magazine content

For this assignment you will analyze the content of three magazines. Choose three different magazine for your analysis. Look at the advertisements in the magazine and complete the chart to determine what kinds of advertisements are most common and..

  Explore the internet and retrieve articles

Explore the Internet and retrieve articles that discuss the pros and cons of the planning function.

  Harvard referencing interactive tutorial

Harvard Referencing Interactive Tutorial

  How has technological change affected the roles of women

How has technological change affected the roles of women and ideas of gender?

  Examine one of the model udl lesson plans

Examine one of the model UDL lesson plans from the Center for Applied Science Technology (CAST) website, Explore Model UDL Lesson Plans.

  Write an assignment about my favourite hoppy

write an assignment about My favourite hoppy, Which is shopping, Why i love it and how i feel when i do it and How great it is for me and how it important in my life.

  Write an essay based on the information provided

Write an essay based on the information provided. You may choose any topic given as you find it comfortable to write about. You may find the list of the topics in the syllables.

  What issues will emerge or gain focus in area of education

What three to five issues will emerge or gain focus in the area of special education? Which disability do you believe would be the hardest for an individual to cope with and why?

  Write a paper on current trends in education

Write a paper on Current Trends in Education and Themes in Education: Action Research. What topics did you see and read about that lead you toward clarifying a general idea and establishing an area of focus for research?

  Edwards sinners in the hands of an angry god

You are going to write a 2 page (not counting the works cited page) paper in proper MLA format in which you give your opinion on how the works we have read have influenced United States culture as you perceive it today.

  What company-product does image represent

What company/product does this image represent? How is this symbol relevant to my life and today's world?

  Evaluate the presidential state of the union address

Evaluate the Presidential State of the Union Address of January 28, 2014. Write a short (two to three pages) evaluation of this speech, covering the following items.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd