Security breach discussion

Assignment Help Basic Computer Science
Reference no: EM131660305

Security Breach Discussion

Read the following scenario below. Once finished reading, follow the discussion question instructions.

An auditor was hired to determine if he could gain access to the network servers of a printing company that contained important proprietary information. The chief executive officer (CEO) of the printing company boldly proclaimed that breaking into the servers by the auditor would be "next to impossible" because the CEO "guarded his secrets with his life." The auditor was able to gather information about the servers, such as the locations of the servers in different printing plants and their IP addresses, along with employee names and titles, their e-mail addresses, phone numbers, physical addresses, and other information.

The auditor also learned that the CEO had a family member who had battled through cancer and lived. As a result the CEO became involved in cancer fundraising. By viewing the CEO's entry on Facebook, he was also able to determine his favorite restaurant and sports team.

The auditor then called the CEO and impersonated a fundraiser from a cancer charity that the CEO had been involved with before. The auditor said that those individuals who made donations to this year's charity event would be entered into a drawing for prizes, which included tickets to a game played by the CEO's favorite sports team and gift certificates to area restaurants, one of which was the CEO's favorite.

After stoking the interest of the CEO in the fake charity event, the auditor said that he would e-mail him a PDF document that contained more information. When the CEO received the attachment he opened it, and a backdoor was installed on his computer without his knowledge. The auditor was then able to retrieve the company's sensitive material. (When the CEO was later informed of what happened, he called it "unfair"; the auditor responded by saying, "A malicious hacker would not think twice about using that information against you")

Answer These Questions:

  • Now pretend that you are an employee of that company and that it is your job to speak with the CEO about the security breach. 
  • What would you say to him? Why? 
  • What recommendations would you make for training and awareness for the company?

Reference no: EM131660305

Questions Cloud

How to filed a petition in bankruptcy : James Stout, a professor of economics and business at Cornell College in Mount Vernon, Iowa, filed a petition in bankruptcy, seeking to discharge about $95,000.
Network architecture that allows users : Design a "Simple" network architecture that allows users in the untrusted domain to communicate with systems in the trusted domain employing
Computes and returns the sum of all numbers : Write static recursive function named "sum" that computes and returns the sum of all numbers from 1 to n (where n can be assumed to be is positive).
Discuss the problem-exceptions to discharge : Exceptions to Discharge. Between 1988 and 1992, Lorna Nys took out thirteen student loans, totaling about $30,000, to finance an associate of arts degree.
Security breach discussion : Read the following scenario below. Once finished reading, follow the discussion question instructions.
Aims to explore standardized terminology : This week aims to explore standardized terminology, While NANDA, NIC, and NOC are among the 13 approved terminologies by the ANA
Compare the three study designs-exploratory : What biases are built into these three research study designs? Provide specific examples to illustrate your points, building on the material covered to date.
Application to customers over the internet : A cloud consumer of a PaaS service who delivers an application on the PaaS and sells access to application to customers over the Internet is acting
Discuss what leadership strategies use to reawaken : What leadership strategies would you use to reawaken the passion for practice

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd