What type of breach is the downloading of malware

Assignment Help Other Subject
Reference no: EM132950722

LAB 1 - CIA and Identity Theft

Confidentiality, Integrity, Availability

Part 1
Within your organization, you have a server called Server1 that is running Windows Server 2008 R2. On Server1, you create and share a folder called Data on the C drive. Within the Data folder, you create a folder for each user within your organization. You then place each person's electronic paycheck in his or her folder. Later, you find out that John could go in and change some of the electronic paychecks and delete others.

Explain which of the CIA components was not followed in this scenario.
The CIA component fail was Integrity, because did not maintain the expected state of the information due to it was modifying for John.

Part 2

Is it a breach of confidentiality, integrity, or availability? Answer the following questions:
1. How did the 2017 Equifax exposure of 143 million records breach the CIA Triad?
Some hackers won access to systems by exploiting a website application vulnerability to gain access to certain files by software that had not to update on Equifax servers (Wikipedia, June 2021).

2. Downloading what appears to be a legitimate app, a user installs malware that contains keylogging software. What type of breach is the downloading of malware?
The type of malware is Spyware that infects the computer or network and steals information and any other valuable data, however not always is illegal software malware(Malwarebytes website)

3. An email phishing attack results in ransomware, in which the files and folders on a computer are encrypted. What type of breach is ransomware?
The ransomware is a form of malware that some files are encrypted and, the organization or person has to pay a ransom to retrieve access to the data(csoonline.com).

4. How do fake social media accounts breach the CIA Triad?

Confidentiality is a major flaw in social media safety, but depending on how you use the network, you may limit who sees your information. Spread propaganda and disinformation with some curiosity about the types of propaganda that are spread and how they are published on social media. Only a few times has the integrity and availability of the system been compromised.

Part 3
What is identity theft and how to avoid it? Check this link from the American's Federal Trade Commission about "Avoiding Identity Theft". Explore the information on the Federal Trade Commission's website and answer the following questions:
• What is identity theft? When someone stolen personal information about you without your permission (oxford language) .
• How to Avoid identity theft? It is unlike to find way to avoid becoming a victim of identity theft but there are, some steps to bring down the risk of being robbery: Safeguard Social Security number, Protect your mobile phone, create strong passwords and change them regularly (April 20, 2022, Experian).

LAB 2 - "Attacks to Gain Unauthorised Access"

Attacks to Gain Unauthorised Access

In this lab you will need to research 10 attack methods to gain an understanding of how unauthorized access is gained:
1. Shoulder Surfing:
2. Social engineering:
3. Malware:
4. Phishing:
5. Malicious links:
6. Brute force:
7. Piggybacking / Tailgating:
8. Packet Sniffing:
9. Weak passwords:
10. Physical theft:
Briefly explain how attackers gain unauthorized access using these attack methods.
Shoulder Surfing: The thief steals personal information by looking over the victim's shoulder (Wikipedia,2020).
Social engineering: It uses manipulation control to trick users into giving away delicate information.
Malware: Is the conjunct of several malicious software forms, including viruses, ransomware, trojans, spyware, and other harmful computer programs (Wikipedia).
Phishing: when an attacker sends an email, a phone call, or a text message to a victim with the hopes of tricking them into divulging sensitive information(Wikipedia).
Malicious Link: This is a clickable link inserted within the content of an email. It is used to inject malware into your devices (Wikipedia,2021).
Brute force: It is an exhaustive search that tries out numerous password combinations and eventually finding the right one (Wikipedia, 2021).
Tailgating: when someone without access authorization closely follows an authorized person to enter a secured premise (blog.mailfence.com).
Piggybacking An authorized person allows another person to pass through a restricted area.
Packet Sniffing: is used for network troubleshooting, is a piece of computer hardware or computer software used to monitor network traffic (paessler.com).
Weak passwords: A weak password is one that can be guessed quickly by humans.
Physical theft: Is someone who steals other people's belongings.

LAB 3 - Element 011 "Security Policy"

Security Policy
The establishment of a security policy is critically important to ensure that organization has the necessary plans and procedures in place to safeguard its information assets. Without an effective policy, many aspects of information security will be unenforceable.

Part 1
Investigate the security policies of Anglia Ruskin University and compare the policies with any other institution/organisation of your choice. The following policies should be highlighted and compared in the investigation.
1. Network and Internet Usage Policy
a. What type of restrictions are placed on the use of the network and Internet? Or a variety of reasons, networks and the internet are used to transport and download sensitive and confidential information. As a result, many people intend to steal or misappropriate data. In Anglia Ruskin University, you must not attempt to alter any connection, configuration without being allowed for university and must not inappropriate extend any wi-fi cable or install any software or hardware (Anglia Ruskin University policy). Meanwhile, Northumbria University has been placed other restriction about network security as Firewalls, Intrusion Prevention System, Mail, and Web Filtering, Anti-Virus. Also, a connection of equipment to the network of the university must be approved by IT Security Manager and users must respect the physical network configuration of University networks. Both universities have been created network policies to established secure systems and protect sensitive data from their users. Likewise, both universities ensure all components of the CIA be fully complied with.
2. Password Policy
a. What are the specific instructions for creating passwords?
Concerning creating password both universities have created a series of rules to create a password as minimum characters, contain letters, numbers and special characters. Meanwhile, Anglia Ruskin university encourages the user to change the password when it expired, Northumbria university specific the rule clearer about password change password every 90 days. Both universities include their password policy, not writing the password down or do not share with someone else, also not use something obvious as name, surname, or a dictionary word.

Part 2
After checking examples of policies, you will do some research and write policy statements for an "Email Usage Policy".
Email
• Read communications before sending them to ensure that they are clear and that they do not contain any unintentional discrimination, harassment, or defamation.
• Large attachments and videos should not be sent by email.
• Only open email links and attachments if they come from a trusted source.
• Never respond to spam messages.

LAB 4 - "Digital Forensics Scenario"

Digital Forensics Scenario

Part 1
Search the internet for the standards relating to digital forensics and list each of the standards you think apply.
Identification
Identify acquisition of evidence that preserves the integrity of data collected (CJCSM 6510.01B, 2012).
Preservation
In this phase, the integrity of the data is kept during this period (guru99.com).
Analysis
In this step, reconstruct data fragments for analysis and interpretation of digital evidence discovered at the crime scene in this step. (guru99.com).
Documentation
A record of every visible data must be made, and it must be reviewed (guru99.com).

Presentation
In this stage, the process of the analysis of report investigation is presented alongside with demonstrative material as photographic, tools graph (guru99.com).

Part 2
Using the evidence shown in the figure below and write a brief report discussing how you are going to complete your investigation using the three main digital forensic steps:

1. Collecting: In crime scene investigation, office police look for evidence. To start with the evidence on the wall next to entry door can find mobile control thermostat and next to it, at writing note with the password. The right-hand side of the wall next to door observes at home Rub wireless & internet extension. The smart TV switch on and show the channel with search different medias option. Same table is finding gaming console off. On the table observe electric car key, Tesco Clubcard and Boris bike token and Laptop was disconnected, switch on the channel of YouTube. The sofa lying down tablet with cloud storage and oyster card. On the cupboard are notices different devices as wi-fi router and broadband home Hub on and Vonage telephone on. The window view has been seen a neighbour is writing at computer and using WIFI. The phone is on the floor and the body lying down on the floor carrying a GPS Smart watch.

2. Analysing: Gathering devices found in the scene crime is review and label in laboratory searching for relevance information as time, modification data, examination, and extraction data, correlating the files and installed applications, encryption programs, Facebook profile, examination the users default storage location, examination GPS. Meanwhile, information provides for witness to determine clarify the investigation.

3. Presenting:
For this case, handling digital forensic process that involves the examination, extraction, and interpretation of evidence. The evidence is extracted from the devices and the data is analysed. Conclusion of this case is given alongside with the proof were found in the house of victims.

Attachment:- Attacks to Gain Unauthorised Access.rar

Reference no: EM132950722

Questions Cloud

Assessment of political-legal risk : 1. Analysis of the political-legal factors in the macro environment, should include an assessment of political-legal risk.
Which features of a limited liability company provide : Which features of a limited liability company provide it advantages over a partnership? limited life, nontaxable (flow-through) entity
Calculate the basis for each partner : Profits/losses are allocated 10% to both A and B, 30% to C, and 50% to D. Calculate the basis for each partner
What the expected value of an investment is : What the expected value of an investment is? the expected annual average return over the life of the project./ the risk that an investment might face
What type of breach is the downloading of malware : Downloading what appears to be a legitimate app, a user installs malware that contains keylogging software. What type of breach is the downloading of malware
Negative comment about a product or business : -Have you ever left a negative comment about a product or business? Have others' negative comments influenced a purchase?
Describe the establishment of goals : As organizations are continuously faced with restructuring, strategic planning, and unexpected conflict, what techniques do you feel are best to consider when c
How managers behave in the workplace : The hawthorne studies in terms of how they were designed and in terms of the results which were helpful to developing a better understanding of how managers beh
What difference between macroeconomics and microeconomics is : What difference between macroeconomics and microeconomics is? microeconomics concentrates on individual markets while macroeconomics focuses primarily

Reviews

len2950722

7/26/2021 11:05:49 PM

This coursework with 4 lab , each lab should have 250 words and last one with 1000 words. In total is 5 lab. I am writing assessment but I need help to improve it

Write a Review

Other Subject Questions & Answers

  Define numerous people depend on the press for information

Numerous people depend on the Press for information, and only a few citizens can recognize

  Post a description of measures identified from interviews

Post a description of the measures identified from the interviews, the challenges to obtaining the data that were discussed, and a summary of how this quality.

  Identify the size of the population

Be sure to describe and identify the size of the population from which the sample will be drawn. If you are addressing representativeness and generalizability.

  Explain from psychoanalytic approach about unconscious mind

Explain one of the theories from the cognitive approach about how thinking is believed to increase a person's vulnerability to develop a mental disorder (e.g., learned helplessness, negative thinking, etc.).

  Why do historians rely on the work of archaeologists

Why do historians rely on the work of archaeologists? When and how did humans migrate into North America? When and how did humans migrate into North America?

  Reflect on the current trends of health and safety

Reflect on the current trends of health, safety, growth, and nutrition. How do these trends impact YOUR work with children and families every day?

  What human nature is

Of the philosophers we looked at in this Module, which one has a theory closest to your own view of human nature? Explain their view by using what you think is an instructive quote from the Singer textbook and then discuss what you might disagree ..

  According to national geographic what is balance

According to National Geographic what is balance? How does NG achieve balance in its magazine?

  How countries are engaged together in international trade

International Business Management - BUS 417 - explain the various concepts like how countries are engaged together in international trade, which usually are bounded by free trade agreement and other more associations.

  Think about federal or state government assistance

Being mindful of its financial limitations, what are five components that a small business should primarily focus on in its business continuity plan?

  Explain a real-world application for each subspecialties

What is at least one thing you learned about each of the two subspecialties that you did not previously know? Describe a "real-world" application.

  How does policy monitoring compare to policy evaluation

Your team has been tasked with writing a report where you compare and contrast policy monitoring and policy evaluation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd