Identify one step in the attack that used social engineering

Assignment Help Other Subject
Reference no: EM131251022

In this written assignment you will relate the cyber attack on HBGary Federal to some of the terminology introduced in the first two modules.

Like most written assignments, this must be submitted as a PDF file. If you choose to include the questions to your answer sheet, please highlight your answers, that makes it so much easier to grade!

Question 1- Types of vulnerabilities/exploits.

a. Identify one step in the attack on HBGary Federal that exploited an unpatched manufacturer vulnerability in commonly used software. (Hint: I believe there is only one exploit in the entire attack that fits this category, this will likely be the hardest one to find).

b. Identify one step in the attack that exploited a local vulnerability. This is the most common type of vulnerability exploited in the attack.

c. Identify one step in the attack that used social engineering.

Question 2. Is the HGBary Federal attack best categorized as a "targeted" or "opportunistic" attack, and most importantly, why?

 Question 3. Characterizing attacks according to the CIA (Confidentiality, Integrity, Availability) triad. The attack on HBGary Federal had elements of all three types of attacks.

a. What part of the attack on HBGary Federal can be considered as a Confidentiality attack, and why?

b. What part of the attack on HBGary Federal can be considered as an Integrity attack, and why?

c. What part of the attack on HBGary Federal can be considered as an Availability attack, and why?

Question 4. Like most cyber attacks, the attack on HBGary Federal did not consist of one single act, but a series of actions linked together. Here's a list of eight actions that were taken by Anonymous during the attack.

 A. Anonymous defaces the HBGary Federal website

B. Anonymous deletes backups and research data

C. Anonymous gains administrator access to HBGary's Google App's email system

D. Anonymous gains root access to a Linux computer, support.hbgary.com

E. Anonymous retrieves usernames, email addresses and hashed passwords of administrators for the HBGary Federal web server

F. Anonymous takes over Aaron Barr's twitter account

G. Anonymous tricks an administrator into giving them root access to the rootkit.com web server

H. Anonymous is able to use hashed passwords to find plaintext passwords belonging to Aaron Barr and Ted Vera

Some of these events are dependent upon earlier events, for instance, Anonymous could not take over Aaron Barr's twitter account without having already found his plaintext password. The purpose of these next three questions is to identify other dependencies among these events.

a. Among these eight actions, there is one that started everything else for anonymous, one action that all of the others were dependent upon. Which action is this, and why?

b. Actions C and G are closely related, and one of them had to have occurred before the other. Which one occurred first, and why?

c. Actions B and D are closely related, and one of them had to have occurred before the other. Which one occurred first, and why?

These are the website we can write about so you can choose from them-

https://arstechnica.com/tech-policy/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price/

https://arstechnica.com/tech-policy/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack/  

https://www.pcworld.com/article/221504/8_security_tips_to_learn_from_the_hbgary_hack.html  

https://arstechnica.com/tech-policy/2011/02/the-ridiculous-plan-to-attack-wikileaks/  

https://www.huffingtonpost.com/2012/01/20/aaron-barr-cybersecurity-anonymous-occupy-wall-street_n_1219328.html

Reference no: EM131251022

Questions Cloud

Improve your key accounting operations : you have been asked by the CFO of your firm to look at ways to improve your key accounting operations (billing, A/R, and A/P). Recommend a best practice for one of these functions, explaining how your best practice will improve your firm’s operations..
Determine the e-r for the proposed system : Determine the E-R for the proposed system. Provide the timeframe for delivering the solution to the project. Proposed system Interfaces and Dialogues prototype including forms and reports.
Auditor for wartz limited : MQ Chartered Accountants (MQ) was the auditor for Wartz Limited (Wartz) for the financial year ending 30 June 2016. In August 2016, Downtown Limited (Downtown) made a successful takeover offer of Wartz Limited based on the unqualified 2016 audit r..
How do elderly people respond to exercise training compared : From a public health standpoint, why is there so much attention paid to increasing a sedentary person's physical activity by a small amount rather than suggesting strenuous exercise? How do elderly people respond to exercise training compared to yo..
Identify one step in the attack that used social engineering : Identify one step in the attack that exploited a local vulnerability. This is the most common type of vulnerability exploited in the attack. Identify one step in the attack that used social engineering
Explain basic concept of process management in unix kernel : You have wide range of choices for this assignment. First, design your program to explain the basic concept of the process management in Unix Kernel.
Production function of a perfectly competitive firm : Given the Production Function of a perfectly competitive firm, Q = 160L + 18L2 - L3, where Q = Output and L = labor input a. At what value of L will Diminishing Returns take effect? b. Calculate the range of values for labor over which stages I, II, ..
State clearly investment in the riskless cash fund : Obtain Hypatia's new allocation of her inheritance to the (now) six funds.  - State clearly investment in the riskless cash fund and describe in detail the tangency portfolio.
How social media influenced the 2016 presidential elections : Based upon the articles above, how has social media influenced the 2016 presidential elections? Has this influence been positive or negative? You MUST cite specific examples from the articles in response to these questions. Points will be deducted..

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd