Analysis of cybersecurity occurrence and data defense

Assignment Help Computer Engineering
Reference no: EM131721223

Case Study Analysis Guidelines

Guidelines for Submission: Your paper should be submitted as a 4- to 5-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. All sources must be cited in APA format

Overview: This case study will help you analyze a cybersecurity scenario and identify which tenets were violated. Each skill in this paper is an essential part of the final project and the accompanying milestones in this course.

Prompt: Use the information provided in the scenario to analyze the cybersecurity occurrence and determine which tenet(s) were violated.

The required resources for this module detail a scenario at RSA that is similar to the one you will analyze for this assignment. Review each module resource and analyze the security breach that occurred with RSA. Note similarities between this example and the provided scenario for this assignment.

Scenario: In late May of 2011, Lockheed-Martin was targeted by a cyberattack. Lockheed-Martin claimed that they discovered the attack early and reacted quickly, with the result that no real harm was done.

The basis for this breach was with two-factor authentication, where a "factor" in authentication can be something you know, something your are, or something you have. A two-factor authentication system requires you to present instances of two of these three to authenticate with a system. Lockheed-Martin employed a two-factor authentication system that combined a password (something you know) with SecurID, a system produced by RSA labs that provides the "something you have" factor.

A SecurID is a small key fob that displays a number, which changes every 60 seconds. Each key fob has a unique number called its seed, which determines what number is shown in the fob at any given point in time. The server stores your username, password hash, and the seed value for your key fob, and this allows it to determine what number is showing on your key fob (as the fob is synched with your account). When you authenticate, you enter your username and regular password, then you look at the key fob and enter in the number shown there. The authentication server knows what number should be shown at that time on the key fob, and so can verify that the key fob is indeed a thing you have. This is called a one-time password (OTP) system.

In March of 2011, someone attacked RSA with a relatively unsophisticated phishing attack with an attached Excel file with embedded code that exploited a zero- day vulnerability in Adobe Flash.

This enabled attackers to set up a "backdoor"-a way for them to get into the computer-where the attackers were able to steal from RSA the seed values of SecurID key fobs.

In late May of 2011, the attack moved to Lockheed-Martin, where attackers managed to get a keylogger onto a company system. The keylogger recorded the username, password, and SecurID OTPs used by the victim when he or she authenticated, along with the date and time of the log in.

Two-factor authentication is designed for just this kind of scenario. The attacker cannot authenticate because knowing the username, password, and an old OTP is not enough; the current OTP is required. However, these attackers stole seed values. For a given seed value and date/time, they could calculate the number the key fob with that seed value would display at that date and time. All the attackers had to do was to write a program that would compute, for every stolen seed value, the number that would have been showing at the date and time the keylogger recorded the victim's login. Once they found a match with the OTP the keylogger recorded, they would have matched a seed value with a username. This appeared as if the attackers actually had the key fobs themselves.

Critical Elements

Your paper should include these critical elements:

• Identification of cybersecurity tenets that were violated and rationale of cause

• Analysis of cybersecurity occurrence and data defense

• Recommendation of best practices to prevent further recurrence

Reference no: EM131721223

Questions Cloud

The standard variable overhead application rate : Calculate (and provide details for) each of the following variances. The standard variable overhead application rate. The total overhead spending variance
Prepare dml statement for each dml requirement : In a Word document, prepare the following for each DML requirement you came up during Step II: The description for your requirement.
Example related to environmental justice : Can you think of an example related to environmental justice? No landfill though as we have had extensive discussions on that example.
Evaluate kelly approach to selling products : Kelly Andrews has developed a new line of jewelry that has created some positive buzz among friends and some stores in her local community.
Analysis of cybersecurity occurrence and data defense : Identification of cybersecurity tenets that were violated and rationale of cause
Develop a new type of space heater : Shannon has developed a new type of space heater that is quieter and safer than previous generations of space heaters and is particularly geared to people.
What is the firm short-run supply curve : How many units of output should it produce when the price of the product is $70, $85, or $95, respectively, and what is the firm's short-run supply curve?
What is the functional organizational structure : What is the functional organizational structure? State three functions (departments) in modern organizations based on its responsibilities?
Assess the strength of red bull overall marketing plan : If you need additional information, conduct Internet or library research to obtain it. Using a scale of 1 to 10 (10 is high).

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd