Ways to prevent network intrusion

Assignment Help Basic Computer Science
Reference no: EM13829858

Problem:

Scenario:

You are the manager of a large division of your company. One of the supervisors under your leadership handles customer complaints. This supervisor recently received an e-mail addressed specifically to the supervisor from a customer complaining that one of the product listings on your website was incorrect. The e-mail contained a URL that pointed to the page with the error on it. The supervisor came to you to let you know that after clicking on the URL provided by the customer, nothing appeared to be wrong with the page. The supervisor attempted to reply to the customer's e-mail address but received a message that read, "No such e-mail address exists." Shortly after the supervisor responded to the customer complaint e-mail, you noticed that your computer was running slowly and that someone had been able to access some confidential files on your system. Normally, supervisor e-mail addresses are not public, so you are not sure how the customer obtained the supervisor's e-mail address. You also are not sure how anyone could have gotten password or access privileges to your confidential files. Your boss told you other individuals have noticed that some of their confidential files have been accessed. Your boss wants a report on his desk by the end of the week that outlines:

  • How an intruder could have gained access to the confidential files located on the network
  • What process you are going to use to ensure that the network and files are not compromised again
  • What type of training or policies need to be put in place to ensure that the network and files are secure
  • Your task will be to provide answers to the three questions given to you by your boss. Your suspicion is that your company was a victim of a social engineering attack, and you believe that this information was used to gain access into the company's computer systems.

Task:

A. Create a memo (suggested length of 1 page) discussing how you believe the intruder gained access to the company's network using social engineering.

B. Create a security recommendations list suggesting prescriptive measures that should be implemented to prevent such intrusions in the future.

C. Create a mock-up (suggested length of 1-2 pages) of how you would test your organization's vulnerability to a social engineering attack. Include the following in your mock-up:

  • What techniques you would use
  • Who you would use the techniques on
  • What questions you would ask

Additional Information:

This is a scenario analysis where company's confidential information was accessed by network intruder. This was noticed after responding to the customer's query as well as following the link provided by customer. The required actions as well as plans to secure the network and network files has been given comprehensively in the solution.

Total Word Limit: 1484 Words

Reference no: EM13829858

Questions Cloud

Explains the relationships between students and teachers : The question is an article summary that explains the relationships between students and teachers, particularly sexual relationships. The summary and the analysis clarify the implications of sexual relationship between students and teachers/.
Critical importance of it in company strategy : For this assignment you will have to prepare a paper that critically discusses how organizations apply the strategic use of IS/IT to achieve competitive advantage. Some aspects and issues you may discuss in your paper could include (but are not li..
Write one or more pages summarizing the interview : Write one or more pages summarizing the interview. Describe the background of the person you interviewed and his or her experiences as an educator working with young children, as a speech pathologist, or as a parent of a young child with a speech del..
Describe descent and alliance theory used by anthropologists : The question is related to Sociology and the question is describe the descent and alliance theory used by anthropologists to describe the terms marriage and family issues.
Ways to prevent network intrusion : You are the manager of a large division of your company. One of the supervisors under your leadership handles customer complaints. This supervisor recently received an e-mail addressed specifically to the supervisor from a customer complaining tha..
What did you learn from your observation : What did you learn from your observation and interview about the child's typical language activity? Give examples of the child's use of "language" that provide evidence of the child's stage of language development. Describe the type of interactions b..
Decision support system scenario analysis : Assumption: Your Company was able to purchase major holdings in FaceTalk. As a result of the stellar work of your committee, all of you were given big bonuses at the end of the 4th quarter.
How the relationship between narrator and zhu wenli changes : Describe how the relationship between the narrator and zhu wenli changes over the course of ha jin's short story "a decade" from his collection under the red flag
Calculate on network to be safe : You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd