Tuesday, March 12, 2019
Chapter 2 Exercises & Case Exercises Essay
Exercises1. Consider the statement an individual threat agent, sortingred a hacker, can be a f ventureor in to a greater extent than iodine threat category. If a hacker hacks into a net profit, copies a hardly a(prenominal) files, defaces the Web page, and steals realisation card numbers, how many different threat categories does this fall upon fall into?a. Overall, I desire this fervidness falls into four study threat categories deliberate acts of trespass, compromises to intellectual property, technical bankruptcys, and managerial ill. Further more than, I believe this attack would be categorized as a deliberate act of theft/trespass which compromises intellectual property due to technical and managerial failures. b. It seems as this hacker was deliberately causing harm (i.e. copying files, vandalizing the tissue page, and theft of credit card numbers) due to their method of entry hacking into a vane it leaves me to believe there were virtually technical failures, s uch as software vulnerabilities or a trap door. However, that is just one calamity as to what could birth occurred. This could pick up alike been a managerial failure say the unknown hacker customd social locomotiveering to book the cultivation to gain access to the ne twork proper planning and unconscious mold execution could have potentially thwarted this hackers attack. 2. development the Web, research Mafiaboys exploits. When and how did he compromise sites? How was he caught? c. Michael Demon Calce, also known as Mafiaboy, was a high school student from double-u Island, Quebec, who launched a serial publication of highly publicise DDoS (denial-of-service) attacks in February 2000 against large commercialized websites including rube, Fifa.com, Amazon.com, Dell, Inc., E*Trade, eBay, and CNN. Calce also attempted to launch a series of simultaneous attacks against nine of the thirteen root name servers. d. On February 7th, 2000, Calce tar compacted Yahoo With a ext ernalize he named Rivolta meaning riot in Italian. This examine utilized a denial of service cyber-attack in which servers become overload with different types of communications, to thepoint in which they completely shut cumulus.Calce managed to shut down the multibillion dollar club and the webs top search engine for almost an hour. His goal was to establish dominance for himself and TNT his cyber grouping. Over the attached week, Calce also brought down eBay, CNN, Amazon and Dell via the same DDoS attack. e. Calces actions were nether suspicion when the FBI and the Royal Canadian Mounted Police noticed posts in an IRC chatroom which bragged/claimed responsibility for the attacks. He became the chief suspect when he claimed to have brought down Dells website, an attack not yet publicized at the time. randomness on the source of the attacks was ab initio discovered and consider to the press by Michael Lyle, chief technology officer of Recourse technical schoolnologies. Ca lce initially denied responsibility but later pled guilty to most of the charges brought against him the Montreal Youth courtyard sentenced him on September 12, 2001 to eight months of centripetal custody, one year of probation, curtail use of the Internet, and a small fine. It is estimated that these attacks caused $1.2 billion dollars in global economical damages. 3. Search the Web for the The Official Phreakers Manual. What info contained in this manual of arms might help a trade nourishion administrator to protect a communications system? f. A hostage standard administrator is a specializer in computer and network warrantor, including the administration of security devices such as firewalls, as well as consulting on general security measures. g. Phreaking is a slang term coined to describe the activity of a culture of passel who study, experiment with, or explore telecommunication systems, such as equipment and systems connected to public telephone networks.Since telephone networks have become computerized, phreaking has become near linked with computer hacking. i. Example of Phreaking Using mixed audio frequencies to forge a phone system. h. Overall, a security administrator could use this manual to gain knowledge of terms associated with phreaking and the ins & outs of the process (i.e. how it is executed). However, the security administrator should focus on Chapter 10 War on Phreaking this subdivision (pg 71-73) deals with concepts such as access, doom, tracing, and security. An administrator could reverse engineer this development to protect his/her systems from such attacks. 4. The chapter discussed many threats and vulnerabilities to information security. Using the Web, find at to the lowest degree two other sources of information onthreat and vulnerabilities. Begin with www.securityfocus.com and use a keyword search on threats. i. http//www.darkreading.com/vulnerability-threatsii. Dark Readings Vulnerabilities and Threats Tech Center is your resource for breaking news and information on the in vogue(p) potential threats and technical vulnerabilities affecting todays IT environment. Written for security and IT professionals, the Vulnerabilities and Threats Tech Center is designed to provide in-depth information on newly-discovered network and application vulnerabilities, potential cybersecurity exploits, and security research results j. http//www.symantec.com/security_ solvent/iii. Our security research centers about the dry land provide unparalleled analysis of and protection from IT security threats that involve malware, security risks, vulnerabilities, and spam. 5. Using the categories of threats mentioned in this chapter, as well as the various attacks described, review several current media sources and identify examples of each. k. Acts of human error or failureiv. Students and staff were told in February that some 350,000 of them could have had their social security numbers and financial informa tion exposed on the internet. v. It happened during an upgrade of some of our IT systems. We were upgrading a server and through human error there was a misconfiguration in the stiffting up of that server, said UNCC spokesman, Stephen Ward. l. Compromises to intellectual propertyvi. nowadays we bring news of action against a site that supplied links to films, medical specialty and games hosted on file-hosters all around the world. Authorities say they have charged three individuals said to be the administrators of a very large file-sharing site. vii. To get an idea of the gravity local police are putting on the case, we can compare some recent stats. According to US judicature Megaupload, one of the worlds largest websites at the time, cost rightsholders $500m. GreekDDL (according to Alexa Greeces 63rd largest site) allegedly cost rightsholders $85.4m. m. Deliberate acts of espionage or trespassviii. The individual responsible for one of the most significant leaks in US politi cal history is Edward Snowden, a 29-year-old former technical assistant for the CIA and current employee of the defense contractor Booz Allen Hamilton. Snowden has been workings at the National Security Agency for the last four long time as an employee of various outside contractors, including Booz Allen and Dell. ix. Snowden entrust go down in history as one of Americas most eventful whistleblowers, alongside Daniel Ellsberg and Bradley Manning. He is responsible for handing over material from one of the worlds most secretive organization the NSA. x. Additional, interesting, read http//www.cbsnews.com/8301-201_162-57600000/edward-snowdens-digital-maneuvers-still-stumping-u.s-government/ 1. The governments forensic investigation is wrestling with Snowdens apparent ability to smite safeguards established to monitor and deter people looking at information without proper permission. n. Deliberate acts of information extortionxi. Hackers claimed to have breached the systems of the B elgian credit provider Elantis and threatened to publish confidential customer information if the bank does not pay $197,000 before Friday, they said in a statement stick on to Pastebin. Elantis confirmed the data breach Thursday, but the bank said it depart not give in to extortion threats. xii. The hackers claim to have captured login credentials and tables with online contribute applications which hold data such as full names, job descriptions, get across information, ID card numbers and income figures. xiii. According to the hackers the data was stored unprotected and unencrypted on the servers. To examine the hack, parts of what they claimed to be captured customer data were published. o. Deliberate acts of sabotage or vandalismxiv. Fired Contractor Kisses Off Fannie Mae With Logic Bomb xv. Rajendrasinh Babubha Makwana, a former IT contractor at Fannie Mae who was fired for making a label mistake, was charged this week with placing a logic bomb within the corporations Ur bana, Md., data center in late October of last year. The malware was set to go into effect at 9 a.m. EST Saturdayand would have disabled midland monitoring systems as it did its damage. Anyone logging on to Fannie Maes Unix server network aft(prenominal) that would have seen the words Server Graveyard appear on their workstation screens. p. Deliberate acts of theftxvi. Four Russian nationals and a Ukrainian have been charged with running a sophisticated hacking organization that penetrated computer networks of more than a dozen major American and international corporations over septet years, stealing and selling at least 160 million credit and debit card numbers, resulting in losses of hundreds of millions of dollars. q. Deliberate software attacksxvii. china Mafia-Style Hack Attack Drives California Firm to Brink xviii. A group of hackers from China waged a relentless campaign of cyber harassment against Solid oak tree Software Inc., Milburns family-owned, eight-person firm in Santa Barbara, California. The attack began less than two weeks after Milburn publicly accused China of appropriating his companys enate filtering software, CYBERsitter, for a national Internet censoring project. And it ended shortly after he settled a $2.2 billion lawsuit against the Chinese government and a string of computer companies last April. xix. In between, the hackers assailed Solid oak trees computer systems, shutting down web and e-mail servers, detecting on an employee with her webcam, and gaining access to sensitive files in a battle that caused company revenues to tumble and brought it within a hairs breadth of collapse. r. Forces of personalityxx. Websites Scramble As Hurricane Sandy Floods Data Centers xxi. The freak storm flood data centers in New York City, taking down several major websites and services including The Huffington Post, Buzzfeed and Gawker that depended on them to run their businesses. xxii. Several websites stored their data at a lower Manhat tan data center run by Datagram, whose basement was make full with water during the storm, flooding generators that were intended to keep the power on. s. Deviations in flavor of service from service providers xxiii. Chinas Internet hit by biggest cyberattack in its history xxiv.Internet users in China were met with sluggish response times early Sunday as the countrys globe extension came under a denial of service attack. xxv. The attack was the largest of its kind ever in China, according to the China Internet Network Information Center, a state agency that manages the .cn country domain. xxvi. The double-barreled attacks took place at around 2 a.m. Sunday, and then again at 4 a.m. The minute of arc attack was long-lasting and large-scale, according to state media, which said that service was easy being restored. t. practiced hardware failures or errorsxxvii. A hardware failure in a Scottish RBS Group technology center caused a NatWest bank outage. xxviii. It prevented custom ers from using online banking services or doing debit card transactions. u. Technical software failure or errorsxxix. RBS boss blames software upgrade for account problems xxx. The boss of RBS has confirmed that a software change was responsible for the widespread computer problems affecting millions of customers bank accounts. v. Technological obsolescencexxxi. SIM Cards Have last Been Hacked, And The Flaw Could Affect Millions Of Phones xxxii. After three years of research, German cryptographer Karsten Nohl claims to have finally found encryption and software flaws that could affect millions of SIM cards, and open up another route on mobile phones for surveillance and fraud. result ExercisesSoon after the board of directors meeting, Charlie was promoted to Chief Information Security Officer, a new position that surveys to the CIO, Gladys Williams, and that was created to provide leadership for SLSs efforts to change its security profile.Questions1. How do Fred, Gladys, and Ch arlie perceive the scope and scale of the new information security effort? a. Charlies proposed information security plan aims at securing business software, data, the networks, and computers which store information. The scope of the information security effort is quite a vast, aiming at securing each vulnerability in addition to the aforementioned, the new information security plan also focuses on the companys staff. Since extra effort will be required to implement the new managerial plan and install new security software and tools, the scale of this surgery is quite large. 2. How will Fred measure success when he evaluates Gladys performance for this project? How will he evaluate Charlies performance? b. Gladys is appointed as CIO of the team, which is gathered to improve the security of the company due to virus attack that caused a loss in the company I believe Fred will measure Gladys success by her ability to lead, keep the plan on track (i.e. time management) and successfu lly sticking to the proposed budget. Charlie was promoted to chief information security officer, a new position that reports to the CIO I believe Fred will measure Charlies success by his ability to implement the new plan, report his/their progress and the overall success of the new system. 3. Which of the threats discussed in this chapter should receive Charlies attention early in his planning process? c. Portable Media worry (Ex. USB, DVD-R/W) should receive Charlies attention early in his planning process
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment