Psychological and social characteristics of threat detection

Assignment Help Computer Engineering
Reference no: EM131721337

Read the social engineering case study below, Summarize and express your opinions in at least 3 paragraphs.

Social Engineering and Insider Threat

In recent years insider threat and social engineering techniques have been ever so prevalent. It is the combination of these two techniques that make it almost impossible to detect and mitigate. One well known insider threat used social engineering within a classified data center and happens to be one of the most wanted in the latest espionage cases in The United States. There are two distinct classifications of social engineering and several social and psychological characteristics that may let you know who may be considered an insider threat at the work place.

The two major categories of social engineering are:

1. Internal
2. External

Some of the psychological and social characteristics of insider threat detection are:

1. Showing financial troubles by complaining in the work place about bills and asking to borrow money
2. Distress
3. Depression
4. Moody and angry disposition
5. Continuous family drama and problems that may result from work or is constantly talked about at their place of employment
6. Drug and alcohol abuse

Now that you know some of the basic characteristics and the different categories of social engineering and insider threats, let's see if you can detectsome of these in the following brief case scenario:

Joe is a manager of a big box store that recently opened and is named "Housing Warehouse Stores." The technology in the new store was state of the art. The newly opened store was supplied with its own independent client servers, patch panels, and communication demarcation access point for the communication fiber backbone and distributed LAN and WAN network system. The system connected back to their corporate headquarters located just outside of New York City. Since the store was so new, Joe needed to check on their new system, which was enclosed in a com closet located in the back of the store.

Joe the manager was awfully tired. He really did not have any subordinates that he actually managed. It was all him and occasionally someone would volunteer to assist him. They were usually students working part-­-time there at the store since there was a local nearby college. He had his share of volunteers. However, there was always that danger of trust, especially with workers who would come and go. The attrition within the chain of stores for stock clerks and helpers was terrible. It was all up to Joe to maintain the specialized rack of server appliances that connected his store to corporate systems and the main third-­-party payment processing system. Despite his exhaustion, Joe tended to his duties of inspecting the new equipment located in the com room.

He sat his detailed notepad down on one of the near-­-by server racks to take a closer look at some of the below floor cooling vents. It seemed to be awfully warm in the closet. He immediately ran over to the cooling unit, called a CRAC unit and noticed that the temperature was rising rapidly. The com room had to maintain a constant room temperature of 68 degrees Fahrenheit in order to maintain and keep the multiple of server appliances running at peak condition. The temperature in the com room had already reached 78 degrees. Once the com room hits 80 degrees, servers will start shutting down.

Joe was not going to let that happen! Joe ran up to the front of the store to make an emergency maintenance call. He called the stores regularly assigned HVAC maintenance technician. The technician just so happened to be his best friend from high school. It was a small town. They went back years, all the way to elementary school. However, Joe knew his friend suffered from severe gambling and drinking problems. He was always sober or at least appeared to be sober all the time during working hours.

Jim had just arrived on the scene and they got caught up on old times. He trusted Jim and would always leave him to complete his technician work on the new HVAC system. Jim had gotten to the new store just in the nick of time. After-­-all he was the contractor on-­-site that installed the system. He had warned them about installing such a generic CRAC unit from the start. However,it was always costly, and so it went, the installation of an unreliable system. Joe had already left the com closet to tend to other areas of the store. He left Jim there by himself. Jim as he had always done started to scan over his work environment.

The room was humming from all of the new shiny equipment. Jim immediately noticed the pad that was on top of the server rack. He quickly glanced through it. It must be Joe's he exclaimed to himself. Wow! This is awfully detailed information. It even has administrator passwords. Well, Joe would have been smart enough to change them he thought and without hesitation Jim started copying the IPs and admin passwords. I will challenge myself as a penetration tester, he thought. Jim wanted to sharpen his computer tech skills. He would hack just for the fun of it along with other members of his cyber gang that he had started while attending high school. He gently placed the notebook back on the server rack where he had found it.He finished up his service order and politely reported back to his old friend Joe. "All done!" he exclaimed. "The system is back to cooling, and the room is at a steady temperature of 68 degrees," he stated. "Just call me if it gives you any more trouble! Don't be a stranger. We're friends with history," he exclaimed again to Joe. "We are all finished here!"

Reference no: EM131721337

Questions Cloud

Risk tolerance is willingness of person : performance of an endeavor, and risk tolerance is the willingness of a person or the organization to accept or avoid such risk.
How much does the dividend pay : An action has a price of $ 38. The dividends of this action grow in perpetuity "g" to 5%. The return required by "R" investors is 11%.
Write paper about external recruiting vs internal promotion : Write a paper about external recruiting vs. internal promotion. You will need to rehearse this, timing yourself to a very short presentation.
Briefly evaluate the information of the case : Research the Internet and locate an incident that has a related occurrence to this incident. Please discuss and describe the entire case.
Psychological and social characteristics of threat detection : Showing financial troubles by complaining in the work place about bills and asking to borrow money
Investigate what is required to place the certification mark : Ken and Jackie Smith just purchased a small winery in the Napa Valley of northern California. One thing they noticed when they were investigating the winery.
What is the net present value of the investment : The investment will cost you $ 5,534 today. If the appropriate Cost of Capital is 11.0 %, what is the Net present Value of the investment?
What is the best estimate of the risk-free rate : Treasury bill expiring on April 20 had a bid discount of 5.86, and an ask discount of 5.80. What is the best estimate of the risk-free rate as given in the text
Write a critical analysis based on scientific information : Learning outcomes of the module with respect to the abilities to critically analyse technical papers, interpret scientific & technical data, proper referencing

Reviews

Write a Review

Computer Engineering Questions & Answers

  Design a sequential circuit whose state diagram is given

Design a sequential circuit whose state diagram is given in Fig. using a 3-bit register and a 16 x 4 ROM.

  Examine how social media gives a competitive advantage for

analyze how social media provides a competitive advantage for an organizations web strategy given that many companies

  Computer security is not an issue for organizations alone

computer security is not an issue for organizations alone. anyone whose personal computer is connected to a network or

  Defining relationships within a database can improve

Defining relationships within a database can improve search capabilities and optimal performance of the database in the long run.

  What is meant by active termination

What is the reflection coefficient for a bus with a characteristic impedance of 75 U and a termination of 200 fl?

  What model should dsi adopt for a cloud-based osds

What model should DSI adopt for a cloud-based OSDS? How should DSI assess the risk of adopting a cloud-based OSDS? What steps should DSI take to provide adequate security for the OSDS

  Test a class that prints william on the screen

Write down compile, and test a class that prints William Nichols, 777 Mockingbird Lane, Detroit MI 48222 on three separate lines on the sceen. Sace as Address.java

  Estimate yearly costs for maintenance and support of system

Estimate yearly costs for maintenance and support of this system. Estimate customization costs for system. Assume 10% customization. Estimate software licensing costs

  Describe the key analogies the monitors expose to users

Describe the key analogies and concepts these monitors expose to users, including the task-domain objects users manipulate on the screen. Determine the conceptual model that you would use when designing a product for your restaurant.

  Give description on wireless communication

As an IT consultant, you have been tasked to implement wireless communication for a car company with about with 1500 associates. In four locations.

  Explain the properties of the gray codes

Which rows and which columns of a 4 × 16 map for Boolean functions in six variables using the Gray codes 1111, 1110, 1010, 1011, 1001, 1000, 0000, 0001, 0011.

  Make a math tutor program in vb.net

make a math tutor program in VB.Net.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd