Analyze and explain the seriousness of the situation

Assignment Help Management Information Sys
Reference no: EM132313277 , Length: word count : 2000

Assessment Title : Research in Information Security Management

Purpose of the assessment

Students should be able to demonstrate their achievements in the following unit learning outcomes:

Investigate and discuss the appropriate design and secure solutions for varieties of organisations

Implement a process to support the administration and the management of organisations’ security

Conduct practical investigations into network systems including industry procedures of information gathering, vulnerability identification, exploitation and privilege escalation. 

A report between 1500 and 2500 words

Assignment Description

In the recent times the frequency of cyber-attacks has increased and needs to be dealt proactively. The cyber-attacks have been witnessed and reported against, from world’s leading businesses like yahoo and GitHub to the small organizations like law firms. These attacks ultimately result losing sensitive or private data and increased service downtimes. As the measures used to minimize the impact of such attacks are coming into the plays, the attackers are also using novel network attack approaches.

To understand how to defend a network against attacks, an administrator must first identify network vulnerabilities. Specialized security audit software developed by equipment and software manufacturers can be used to help identify potential weaknesses. In addition, the same tools used by attackers can be used to test the ability of a network to mitigate an attack.

After the vulnerabilities are known, steps can be taken to help mitigate the network attacks. This Assignment gives a planned research project that is separated into three parts: Researching Network Attacks, Current attack and a Case study.

In Part 1, you research various network attacks that have actually occurred. You select one of these and describe how the attack was perpetrated and how extensive the network outage or damage was. You also investigate how the attack could have been mitigated or what
mitigation techniques might have been implemented to prevent future attacks. In Part 2, you research about the attack on GitHub and answer the questions that are related with the part. In Part 3, you need to write a technical report about the given case study, which is about social engineering attack.

Part 1- Researching Network Attacks

In Part 1 of this Assignment, you will research various computer system attacks that have recently occurred and select one on which to report. Fill in the form below based on your findings.

Task: List one of the computer attacks you identified in your search? The following table can be used.

Name of attack:

Type of attack:

Dates of attacks:

Computers / Organisations affected:

How it works and what it did:

Mitigation options:

References:

Part 2- Researching about GitHub DDOS Attack

On February 28, 2018, the biggest ever DDOS attack (1.35Tbs) on GitHub’s code hosting website was reported. DDOS attack is a denial of service attack in which the perpetrator seeks to make a machine resource unavailable. GitHub managed to drive the availability in 10minutes after becoming aware of the attack. Research about this attack is required while answering to the below questions. At least three different resources should be used.

Q1) How it works and what techniques are used?

Q2) How this attack is propagated?

Q3) Discuss the impact of this attack on the operation of an organization? What are some key steps organizations can take to help protect their networks and resources?

Q4) Give an example of a duty of the Incident response planning, Disaster recovery planning and Business continuity planning when having an unexpected event like this attack.

Q5) How GitHub’s incidence recovery plan helped limiting the downtime of this attack?

Q6) Briefly describe the lessons learned from this DDOS attack.

Q7) If any Australian organization or Australian businesses is infected with cyber-attacks, who is the main point of contact for this cyber security issues?

Part 3- CASE STUDY: How cyber-criminals targeted QLD law firm with social engineering.

Recently The Brisbane Times broke a story about cybercriminals who stole millions of dollars from Queensland law firms in December. This story is interesting because the cybercriminals involved didn’t hack into the lawyer's network or infect their computers with a virus - they
just sent them an email. The lawyers who fell for this scam were targeted with phone calls from people who said they were seeking legal representation. The phone calls seemed legitimate; after explaining their problems the callers promised to email the lawyers with ‘important documents’ related to their cases.

When the lawyers received the emails they found links to a file-sharing site. They clicked on the links and were required to enter their email account passwords to gain access. This whole process was a trick designed to collect the lawyer’s email login passwords. Once the
scammers gained access to the lawyer's email accounts they moved to phase two of the scam, monitoring the firm's email traffic for invoices requesting payment. When they saw a suitably large invoice arrive in the firm’s inbox they sent a bogus message with false bank account details so that the payment went into the bank account of the scammers instead of the law firm.

Lawyers are smart people, right? Not the sort who easily fall for scams. But the criminals who executed this fraud gained their trust by speaking to them on the phone so that when the  scam email arrived, the victims were primed and waiting to click on the malicious link it
contained.

Speaking to The Brisbane Times, Queensland Law Society(QLS) president Christine Smythe said, “They are quite cunning... They are people who speak good English, answer in a convincing away and come with a backstory... The precise method of attack varies, but the
essence is that the criminals obtain access to the firm’s email accounts and use this to misdirect funds.”

The fraud against this Queensland law firm is an example of social engineering, a method of cybercrime that hinges on psychological manipulation. Most people would categorise cybercrime as an IT issue but in reality, the majority of cyber-attacks are targeted at people,
because they are usually the weakest link in the security chain.

Contemporary cybercrime is as much about psychology as technology. The criminals behind the law firm fraud went to a lot of trouble to make sure their scam hit home, but similar techniques are used in email scams every day. Using the brand names of well-known companies or posing as government agencies, cybercriminals use many different manipulation tricks to deceive. But the ultimate objective of these social engineering attacks is always the same; to gain the trust of the victim just long enough to extract a password or account number that will get them past the company’s defences.

People are not machines. We make a lot of decisions based on emotional responses and social cues. We haven’t got the mental bandwidth to parse every communication and verify its authenticity. Like the lawyers who fell for the email scam in Queensland, we’re all prone to
making errors of judgement and that’s the security gap cybercriminals can most easily exploit.

Social engineering is a booming crime category because cybercriminals understand that it’s easier to deceive a person than a machine. TechBeacon’s ‘2016 Cybersecurity Trend Report’ reveals that 65% of professionals identify social engineering as the most serious security threat to their business. Human beings are still the gatekeepers of valuable data.

Bank accounts, file storage, credit card details; they are all protected by passwords and those passwords can be obtained with trickery because they are stored in human brains. Hacking into a company using social engineering techniques is as simple as sending a cleverly worded email to people who work there.

If criminals can trick one person into clicking on a malicious link or logging into a compromised website, they can use that person as an access point to the company’s most valuable data. In her interview about the law firm scams, Smythe commented, “These emails are coming almost every day now at our firm, just from different people… It's something we talk about with staff on a daily basis; as soon as you are asked for email credentials then pull back. All practitioners must take the measures they can to ensure their email account is secure and stays secure.”

Task: Write a Memo that analyses and explains the seriousness of the situation and highlight key breaches, also elaborate ITSec recommendations.

Reference no: EM132313277

Questions Cloud

Example of integrated marketing communication : What is integrated marketing communication (IMC)? Please explain why Apple's advertisement, 1984, can be an early example of integrated marketing communication.
Consider the set of all students on campus : Consider the set of all students on campus. In each part of this problem, we define a relation R on this set.
If r and s are transitive relations on a : Let A be a set. Prove or disprove each of the following claims: (a) If R and S are transitive relations on A, then R n S is transitive.
How is a rose for miss emily story about the human heart : Consider Faulkner's own words as you think about "A Rose for Emily." How is "A Rose for Miss Emily" a story about the human heart in conflict with itself?
Analyze and explain the seriousness of the situation : MN604 IT Security Management-Melbourne Institute of Technology- Australia-Investigate and discuss the appropriate design and secure solutions for varieties.
Subjects of many academic and business discussions : The evaluation of information technology and its business value are the subjects of many academic and business discussions.
Identify of research topic and make a compelling case : MGMT617 - Research Methods Assignment - Topic identification and relevance, Australian Catholic University, Australia. Identify of research topic
Show that a dfs of an undirected graph g can be used : Show that a DFS of an undirected graph G can be used to identify the connected componentof G, and that the DFS contains as many trees as G has connected
Bfs on the undirected graph : Show the result of running BFS on the following undirected graph, using vertex u as the source.Make sure to show show all intermediate results.

Reviews

len2313277

5/28/2019 11:33:59 PM

All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. ? The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2.54 cm margins on all four sides of your page with appropriate section headings. ? Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension ? If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment.

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd