Reference no: EM132991338
Questions -
1. What can a person to avoid getting victimized by a spoofing attack?
2. What do you think is the motivation for denial-of-service attacks?
3. Why is a distributed denial-of-services deemed more destructed than a regular DoS attack?
4. Why is public key encryption deemed more secured compared to private key encryption?
Albuj Salim is a newly hired accountant of Garozza Publishing House. She is an active member in a social media community. During her lunch break, she decided to access her social media account in her office computer. Her company's internet connection does not block access to any website in the internet. While browsing through her feeds, she mistakenly click on a link that opened a pop-up window that immediately closed after a few seconds. Since nothing happened, she decided to close her web browser and return to work. Before the day ended, she sent an e-mail to Bolch Corporation, a Germany-based ink supplier, to confirm the receipt of an invoice amounting to $30,000 and requested for bank details to process the payment of the invoice through a fund transfer.
Two days later, Salim received a reply from Bolch's accountant that instructs her to effect payment to an account number named under Blobolsch Inc. The e-mail also stated that Bolch has already changed its name in their local securities regulator and is still in the process of updating all corporate documents. Salim processed the payment using the information stated in the e-mail and the payment was approved by her superior.
A month after the wire transfer, Salim received another email from Bolch that is following-up the payment on the last invoice sent. Sethi argued that the invoice was already paid through a fund transfer, and forwarded to Bolch a copy of the fund transfer form and the e-mail received a month ago. Bolch denied Salim's claims and said that they did not receive the funds, nor provided Salim their bank details.
Upon discovery of the irregularity, the case was subjected to an investigation and the IT team was instructed to trace the source of the fake e-mail. Upon tracing by the company's IT personnel, it was discovered that the e-mail originated from Tokyo, Japan.
Requirement -
a. Describe the chain of events that exposed the company to networks risks, causing financial losses.
b. What actions that the company should have taken in order to prevent this situation?