Reference no: EM132950050 , Length: word count:1000
LAB 1 - CIA and Identity Theft
Confidentiality, Integrity, Availability
Part 1
Within your organization, you have a server called Server1 that is running Windows Server 2008 R2. On Server1, you create and share a folder called Data on the C drive. Within the Data folder, you create a folder for each user within your organization. You then place each person's electronic paycheck in his or her folder. Later, you find out that John could go in and change some of the electronic paychecks and delete others.
Explain which of the CIA components was not followed in this scenario.
The CIA component fail was Integrity, because did not maintain the expected state of the information due to it was modifying for John.
Part 2
Is it a breach of confidentiality, integrity, or availability? Answer the following questions:
1. How did the 2017 Equifax exposure of 143 million records breach the CIA Triad?
Some hackers won access to systems by exploiting a website application vulnerability to gain access to certain files by software that had not to update on Equifax servers (Wikipedia, June 2021).
2. Downloading what appears to be a legitimate app, a user installs malware that contains keylogging software. What type of breach is the downloading of malware?
The type of malware is Spyware that infects the computer or network and steals information and any other valuable data, however not always is illegal software malware(Malwarebytes website)
3. An email phishing attack results in ransomware, in which the files and folders on a computer are encrypted. What type of breach is ransomware?
The ransomware is a form of malware that some files are encrypted and, the organization or person has to pay a ransom to retrieve access to the data(csoonline.com).
4. How do fake social media accounts breach the CIA Triad?
Confidentiality is a major flaw in social media safety, but depending on how you use the network, you may limit who sees your information. Spread propaganda and disinformation with some curiosity about the types of propaganda that are spread and how they are published on social media. Only a few times has the integrity and availability of the system been compromised.
Part 3
What is identity theft and how to avoid it? Check this link from the American's Federal Trade Commission about "Avoiding Identity Theft". Explore the information on the Federal Trade Commission's website and answer the following questions:
• What is identity theft? When someone stolen personal information about you without your permission (oxford language) .
• How to Avoid identity theft? It is unlike to find way to avoid becoming a victim of identity theft but there are, some steps to bring down the risk of being robbery: Safeguard Social Security number, Protect your mobile phone, create strong passwords and change them regularly (April 20, 2022, Experian).
LAB 2 - "Attacks to Gain Unauthorised Access"
Attacks to Gain Unauthorised Access
In this lab you will need to research 10 attack methods to gain an understanding of how unauthorized access is gained:
1. Shoulder Surfing:
2. Social engineering:
3. Malware:
4. Phishing:
5. Malicious links:
6. Brute force:
7. Piggybacking / Tailgating:
8. Packet Sniffing:
9. Weak passwords:
10. Physical theft:
Briefly explain how attackers gain unauthorized access using these attack methods.
Shoulder Surfing: The thief steals personal information by looking over the victim's shoulder (Wikipedia,2020).
Social engineering: It uses manipulation control to trick users into giving away delicate information.
Malware: Is the conjunct of several malicious software forms, including viruses, ransomware, trojans, spyware, and other harmful computer programs (Wikipedia).
Phishing: when an attacker sends an email, a phone call, or a text message to a victim with the hopes of tricking them into divulging sensitive information(Wikipedia).
Malicious Link: This is a clickable link inserted within the content of an email. It is used to inject malware into your devices (Wikipedia,2021).
Brute force: It is an exhaustive search that tries out numerous password combinations and eventually finding the right one (Wikipedia, 2021).
Tailgating: when someone without access authorization closely follows an authorized person to enter a secured premise (blog.mailfence.com).
Piggybacking An authorized person allows another person to pass through a restricted area.
Packet Sniffing: is used for network troubleshooting, is a piece of computer hardware or computer software used to monitor network traffic (paessler.com).
Weak passwords: A weak password is one that can be guessed quickly by humans.
Physical theft: Is someone who steals other people's belongings.
LAB 3 - Element 011 "Security Policy"
Security Policy
The establishment of a security policy is critically important to ensure that organization has the necessary plans and procedures in place to safeguard its information assets. Without an effective policy, many aspects of information security will be unenforceable.
Part 1
Investigate the security policies of Anglia Ruskin University and compare the policies with any other institution/organisation of your choice. The following policies should be highlighted and compared in the investigation.
1. Network and Internet Usage Policy
a. What type of restrictions are placed on the use of the network and Internet? Or a variety of reasons, networks and the internet are used to transport and download sensitive and confidential information. As a result, many people intend to steal or misappropriate data. In Anglia Ruskin University, you must not attempt to alter any connection, configuration without being allowed for university and must not inappropriate extend any wi-fi cable or install any software or hardware (Anglia Ruskin University policy). Meanwhile, Northumbria University has been placed other restriction about network security as Firewalls, Intrusion Prevention System, Mail, and Web Filtering, Anti-Virus. Also, a connection of equipment to the network of the university must be approved by IT Security Manager and users must respect the physical network configuration of University networks. Both universities have been created network policies to established secure systems and protect sensitive data from their users. Likewise, both universities ensure all components of the CIA be fully complied with.
2. Password Policy
a. What are the specific instructions for creating passwords?
Concerning creating password both universities have created a series of rules to create a password as minimum characters, contain letters, numbers and special characters. Meanwhile, Anglia Ruskin university encourages the user to change the password when it expired, Northumbria university specific the rule clearer about password change password every 90 days. Both universities include their password policy, not writing the password down or do not share with someone else, also not use something obvious as name, surname, or a dictionary word.
Part 2
After checking examples of policies, you will do some research and write policy statements for an "Email Usage Policy".
Email
• Read communications before sending them to ensure that they are clear and that they do not contain any unintentional discrimination, harassment, or defamation.
• Large attachments and videos should not be sent by email.
• Only open email links and attachments if they come from a trusted source.
• Never respond to spam messages.
LAB 4 - "Digital Forensics Scenario"
Digital Forensics Scenario
Part 1
Search the internet for the standards relating to digital forensics and list each of the standards you think apply.
Identification
Identify acquisition of evidence that preserves the integrity of data collected (CJCSM 6510.01B, 2012).
Preservation
In this phase, the integrity of the data is kept during this period (guru99.com).
Analysis
In this step, reconstruct data fragments for analysis and interpretation of digital evidence discovered at the crime scene in this step. (guru99.com).
Documentation
A record of every visible data must be made, and it must be reviewed (guru99.com).
Presentation
In this stage, the process of the analysis of report investigation is presented alongside with demonstrative material as photographic, tools graph (guru99.com).
Part 2
Using the evidence shown in the figure below and write a brief report discussing how you are going to complete your investigation using the three main digital forensic steps:
1. Collecting: In crime scene investigation, office police look for evidence. To start with the evidence on the wall next to entry door can find mobile control thermostat and next to it, at writing note with the password. The right-hand side of the wall next to door observes at home Rub wireless & internet extension. The smart TV switch on and show the channel with search different medias option. Same table is finding gaming console off. On the table observe electric car key, Tesco Clubcard and Boris bike token and Laptop was disconnected, switch on the channel of YouTube. The sofa lying down tablet with cloud storage and oyster card. On the cupboard are notices different devices as wi-fi router and broadband home Hub on and Vonage telephone on. The window view has been seen a neighbour is writing at computer and using WIFI. The phone is on the floor and the body lying down on the floor carrying a GPS Smart watch.
2. Analysing: Gathering devices found in the scene crime is review and label in laboratory searching for relevance information as time, modification data, examination, and extraction data, correlating the files and installed applications, encryption programs, Facebook profile, examination the users default storage location, examination GPS. Meanwhile, information provides for witness to determine clarify the investigation.
3. Presenting:
For this case, handling digital forensic process that involves the examination, extraction, and interpretation of evidence. The evidence is extracted from the devices and the data is analysed. Conclusion of this case is given alongside with the proof were found in the house of victims.
Attachment:- Attacks to Gain Unauthorised Access.rar