Reference no: EM131291783
Network Forensic
You are notified of a phishing email attempting to lure victims to a fictitious Federal Bank Online website. The Federal Bank Online is a division of Bank of Atlas which provides financial services to members of the U.S. federal government. The phishing email contains a link to a website purporting to be run by the Federal Bank Online. Bank of Atlas has confirmed that the site, hosted at IP address 12.184.79.86, is not an authorized site (all IP addresses and site names in this scenario are fictitious and do not represent any actual persons or organizations).
You contact the owner of the web server using IP address 12.184.79.86. The administrator states that he was unaware of the Federal Bank Online site being on his server and provides the following logs from the server. Analyze the logs and determine the following, citing specific log entries to support all of your answers:
1. How did the attacker gain access to the system? Provide as much detail as possible about the attack, the tool used, etc.
2. What IP address or addresses did the attacker use?
3. How did the attacker create the fictitious Federal Bank Online site on the server?
4. Was the attacker successful at his first attempt at creating the fictitious Federal Bank ?Online site?
5. Did the attacker create any other fictitious sites on the server?
6. Can you provide any other information about the attack that you feel is relevant?
Would organizations have tried to drive ethical behavior
: Think about the impact of the U.S. Sentencing Guidelines. Would organizations have tried to drive ethical behavior among employees without government encouragement?
|
Analyze the ethical culture at tap
: Analyze the ethical culture at TAP. Does the culture appear to be in alignment? Misalignment?- Why did his culture change effort fail? What would it take for it to succeed?
|
What extent do mental disorders such as adhd
: what extent do mental disorders such as Attention Deficit Hyperactivity Disorder (ADHD) and Post-Traumatic Stress Disorder (PTSD) affect learning among school going, children?How does such school going children behave when learning, especially, in ..
|
What types of physical security measures are in place why
: What types of physical security measures are in place? Why? What specific tools or hardware are used for physical security? Why? How effective is the process to administer physical security?
|
What ip address or addresses did the attacker use
: What IP address or addresses did the attacker use? How did the attacker create the fictitious Federal Bank Online site on the server? Was the attacker successful at his first attempt at creating the fictitious Federal Bank ?Online site?
|
How cloud technology could align with the companys business
: Create a workflow diagram to illustrate how analytics and cloud technology could align with the company's business processes. Note: The graphically depicted solution is not included in the required page length.
|
What is the maximum rate of change of the elevation
: If you are at the point (60,100) in what direction is the elevation changing fastest? What is the maximum rate of change of the elevation at this point?
|
Active directory replication topology for your company
: How do you choose the appropriate Active Directory replication topology for your company? What kinds of problems do you want to prevent? Give examples. Please explain in approximately in two paragraphs.
|
Discuss about the diversity issues in career counseling
: Discuss about the Diversity Issues in Career Counseling.A discussion of each of the following and discuss why is it important that all forensic psychologists need to be well-versed in them:Specific Amendments to the U.S. Constitution and why they ar..
|