What procedure could help prevent similar breach of security

Assignment Help Management Information Sys
Reference no: EM132246727

This week were hired consultants working on one of the many attacks orchestrated by the infamous hacker Kevin Mitnick. Here's the extract from our textbook

Group Project: Breaking into Sprint's Backbone Network

Read the assigned Case Study at the end of Chapter 2 of the textbook. Work with the group designated by your Instructor as if you are hired security consultants. When you have reached consensus as a group, create a report to document the following:

What procedures could help prevent a similar breach of security at your organization?

Phishing is usually associated with identity theft, but could this tactic also be used to gain information needed to circumvent security controls?

Many social engineering breaches involve using what is believed to be insider information to gain the trust of individuals in an effort to obtain confidential information. Test your ability to obtain what some might consider "insider information" using a search engine to find contact or other useful information referencing your organization.

Case Study: Breaking into Sprint's Backbone Network

Many of the technical controls put into place can be circumvented with a simple phone call. Recently, famed hacker Kevin Mitnick demonstrated this by breaking into Sprint's backbone network.

Rather than mounting a buffer overrun or DoS attack, Mitnick simply placed a call posing as a Nortel service engineer and persuaded the staff at Sprint to provide login names and passwords to the company's switches under the guise that he needed them to perform remote maintenance on the system. Once the password information had been obtained, Mitnick was able to dial in and manipulate Sprint's networks at will.

Many people believe this was an isolated incident, and they would not fall for a similar act of social engineering, but Mitnick gained notoriety during 1980s and 1990s by applying similar techniques to computer networks around the world. Mitnick's more notorious crimes included accessing computer systems at the Pentagon and the North American Aerospace Defense Command (NORAD), and stealing software and source-code from major computer manufacturers.

Kevin Mitnick was arrested six times, and has been networking as a consultant specializing in social engineering techniques, having "gone straight" after serving a five-year sentence for his most recent crime. He even has authored several books regarding social engineering including The Art of Intrusion and The Art of Deception.

Reference no: EM132246727

Questions Cloud

Cost-minimizing combination of labor and capital : A manager hires labor and rents capital equipment in a very competitive market. Currently, the wage rate is $10/hour and capital rental price is $5/hour.
Develop a minimum of four slides per issue : Develop a minimum of four slides per issue for a minimum total of 16 slides. Provide at least a paragraph on each slide (in the notes section) to explain.
What obstacles present themselves as informatics expands : A major obstacle to the global adoption, expansion, and progress of eHealth is the lack of available healthcare workers trained in informatics.
What problem might the ceo expect : What problem might the CEO expect if the company switches to a matrix structure?
What procedure could help prevent similar breach of security : Phishing is usually associated with identity theft, but could this tactic also be used to gain information needed to circumvent security controls?
Calculate the effective annual rate : Suppose the nominal rate is 10% per year and interest is compounded every two years. Calculate the effective annual rate.
Identify a specific scenario or event in a game : The goal of each personal essay is to identify a specific scenario or event in a game you've recently played and to reflect on that specific event.
Operating under monopolistic competition : Assuming that a firm is operating under monopolistic competition with many producers and buyers for its product
Importance of doing research in big data analytics : For a research interest in area of Big data Analytics. what are the Advantages of Big data analytics in information technology?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Discuss about the providing security over data

The CIA triad (confidentiality, integrity, and availability) offers three (3) security tenets that allow data owners the framework to secure data. Considering your place of employment or your home computing environment, discuss in detail the prima..

  Explain the various functions and activities within IS area

Explain the various functions and activities within the information systems area, including the role of IT management and the CIO, structuring of IS management

  What strategic competitive benefits do you see in a company

What strategic competitive benefits do you see in a company's use of extranets? Explain your position and provide concrete examples.

  The history of military medicine in the united states

the history of military medicine in the united states provides some interesting benchmarks for examining how medicine

  Define each component of an information system

Define each component of an information system. Define how you can use the five-component model to guide your learning and thinking about information systems. Include at least one outside research item in your paper

  Choose one of the following options for your summary

You are hired as a research coordinator by the new hospital in town. One mission of the hospital is to work hard in preventing health issues by using new technologies created by health conscious engineers. Your task is to review health-related vid..

  Explain the roles and responsibilities of people

Explain the roles and responsibilities of people working in retail supply management. Explain how these roles and responsibilities are applied at your organization or an organization with which you are familiar.

  Write paper for publication to the website

Please prepare a white paper for publication to the website (APA Format) that discusses knowledge management systems. Please begin by explaining the differences among data, information and knowledge

  Explain competency-base and traditional approach to training

Describe why the competencies of the past are not compatible with the competencies of the future for the global organization. Explain the competency-based and the traditional approach to training.

  What steps or procedures should the it staff use

As one of the Y&Z team members, how should you proceed? What steps would you take, and what would be your priorities?

  Advantage the proposal brings to the company

Justify the implementation of one of the proposals by doing the following: Discuss one short-term advantage the proposal brings to the company. Discuss one long-term advantage the proposal brings to the company

  What constraints did you experience

What is that project? Provide complete description. Consider using PPM.What constraints did you experience and how did you handle them?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd