Define the term social engineering

Assignment Help Management Theories
Reference no: EM131191463

CSM660 INFORMATION SECURITY MANAGEMENT ASSIGNMENT-

Case 1 - Marcum State University

The personnel department at Marcum State University has recently purchased PCs for individual offices in the various departments so that they can keep their own records. In the past, all records were stored on the university's mainframe computer. By decentralizing this computer function, each department will have better control over its individual records, and the security of these records will be easier to manage. Most of the departments would like to transfer personnel records of faculty, staff, and student employees in their departments to their PCs from the mainframe. Dr. John Gould, Chairperson of the Accounting Department, would like to use the personnel data regarding the people in his department to generate some statistics concerning salaries, vacation days used, and absences. Rather than code the files or use social security numbers, Dr. Gould would like to keep the names of the individuals with the information that is recorded about them.

  • What are some of the security considerations in this conversion?
  • What are some of the ethical and legal ramifications of keeping files with a person's name attached?
  • What might be a better way of extracting (and storing) this information to ensure maximum security and control?

Case 2 - Bishop Enterprises

Bishop Enterprises, located in Seattle, Washington, is a medium-sized business specializing in building concrete structures (storage building, bridges, utility buildings, and various defense-related installations).

Peter Bishop, president of the company, states that security of its computer systems is critical due to the competitiveness of the commercial concrete industry and the need to protect defense-related information. BE's computer system, as is typical of many, grew on an ad hoc basis as the company grew. Security was not an issue in the early days when there were only a few key employees and the day-to-day, hands-on-management style assured constant vigilance. Mr. Bishop now feels that a solid security package should be added to ensure the ongoing protection of the computer operation.

Mr. Bishop has assigned the task of evaluating several security packages to the director of computer operations, James Clarke. The four objectives that Mr. Clarke has defined for the package selected are:

1. Accountability

2. Auditability

3. Integrity

4. Usability

What factors should be included in an official policy statement sent out with the request for proposal to the vendors? Write a clear and concise statement so that the vendor is able to respond correctly.

Case 3 - Read the following scenario and then answer the questions below.

"Stafford, Cripps Stockbrokers, Accounts Dept, Susan Briggs speaking"

"Susan - we need your help. I'm Dave Bloggs, manager of the new audit division. I'm doing a statutory audit of the accounts system and need a password to check access controls. What is your password?"

"Are you from that new division in Manchester controlled by Mr Stafford himself?"

"Yes - that's us"

"I would like to help but I cannot give you my password without authorization from my manager"

"Glad to see you're careful Susan - I'll contact your manager directly - what is his name?"

"Michael Phillips"

"Many thanks - I'll speak to Mike and mention your help"

Later:

"Stafford, Cripps Stockbrokers, Accounts Dept, John Nugent speaking"

"Good morning John. I'm Dave Bloggs, assistant manager to Mr Stafford the CEO in Manchester. We are redesigning the accounts system with your manager Michael Phillips and John, we've decided to include you on our team"

"Really? Thank you"

"It will be a demanding role but it is a high profile project - do well and promotion could be yours. So, John, to get things rolling I need some help from you. We've already approached your colleague Susan Briggs for her password and now need yours."

"Of course - it's o-p-e-n-d-o-o-r"

"Thank you John"

  • In the context of the above scenario, define the term 'social engineering'.
  • In the above scenario, identify FOUR (4) instances where the staff member was subject to a social engineering technique. Identify the technique and say why it was used.
  • Compare different methods of making staff more aware of 'social engineering' techniques.

Case 4 - Bank of Shenandoah Valley

Today, banks are transferring large sums of money electronically and facing enormous exposure in the process. The Bank of Shenandoah Valley, located in Roanoke, Virginia, is actively involved in this process. The possibility of funds transfer fraud is prompting many banks to adopt protective measures. The two most common techniques used in the banking industry are encryption and message authentication. Encryption involves the scrambling of messages sent-for example, from a commercial bank to the Federal Reserve Bank. An authenticated message is sent clear-anyone who intercepts it can read it. Tacked on to the message is a related secret code that only the receiving party is capable of decoding.

Most observers say that authentication offers more security than encryption because a key is involved.

The Bank of Shenandoah Valley is considering both options and needs to address the following questions:

  • Are there major differences between the two techniques?
  • Are all messages critical or would encryption/authentication be applied only to certain transmittals? If so, which ones?
  • Will these processes slow down operations?
  • What other safeguards should be considered? (Provide 3 suggestions).

Reference no: EM131191463

Questions Cloud

Describe the three most important rules of media buying : You have been assigned the task of purchasing media for your client's advertising campaign. In a two to four-page paper, discuss the steps you would use in determining how you would select a media venue. Describe each of the five W's for your medi..
Prepare a multi-step income statement for each year : Prepare a multi-step Income Statement for each year. Prepare a balance sheet for each year using the information given. Calculate Working Capital, Return on Investment and Return on Equity Ratios for each year
Discuss the effect on the assessable income of the parent : Discuss whether or not the three payments are income from personal exertion.- Discuss the effect on the assessable income of the parent.
Would all employees benefit from these policies : Suggest two policies that you think employers could institute that would best promote work-life balance among their employees. Be sure to explain why you think these policies would help. Would all employees benefit from these policies or just cert..
Define the term social engineering : In the context of the above scenario, define the term 'social engineering'. In the above scenario, identify FOUR (4) instances where the staff member was subject to a social engineering technique. Identify the technique and say why it was used
Determine the tension t required to hold the rectangular : Determine the tension T required to hold the rectangular solid in the position shown. The 125-kg rectangular solid is homogeneous. Friction at D is negligible.
What average tax rate will result in increase tax revenues : If the income effect is in effect for all taxpayers, what average tax rate will result in a 8 percent increase in tax revenues?
Determine the internal loads in the handle on a plane : A tennis player at the net holds the racquet firmly in a horizontal position. The ball strikes the racquet head below its center, exerting a normal force of 200 N. Determine the internal loads in the handle on a plane through the center of the gri..
How does change impact motivation of employees : Discuss how employers will explain about the training that will be offered to all employees and how employee job skills will change with the implementation.

Reviews

len1191463

9/3/2016 2:11:17 AM

For each of the cases below, please respond to the question(s) appearing at the end of each case. Strictly confine your responses to 250 - 350 words for each case. Penalty will be imposed if you do not follow the word limit. Keep in mind to document your sources (Internet sites, text material, outside readings, etc.). Your marks will depend heavily based on the originality of your answer.

Write a Review

Management Theories Questions & Answers

  What types of waste are present at airco

What types of waste are present at AIRCO

  Approaches to knowledge management

Evaluate critically a substantial case study using systems ideas and different approaches to knowledge management and Identify and present the issues within the context of the assigned task and from this demonstrate a logical structure and layout fo..

  Identify different compensation systems

Identify different compensation systems and provide the benefits and disadvantages of each.

  Planned incorporation of the club

He has learned that to form a corporation, it must have a clear business purpose, and wonders whether forming a corporation merely to acquire a special liquor license sat- isfies the business purpose requirement. Write a letter to Ruiz that addres..

  Who are you as a future role model

A video presentation for a science classroom that is designed to teach students how to use character to accomplish tasks through teamwork.

  Research one of the technical analysis tools

Research one of the technical analysis tools mentioned. Provide a brief description of the tool and an Internet link to the site you used.

  Jack''s outdoor world

Jack's Outdoor World is a company that manufactures and sells garden furniture. They have been operating for the past ten years and have a comfortable share of the market.

  The upper path through the project network

Reconsider the Tinker Construction Co. problem presented in Prob. 10.5-1. While in college, Sean Murphy took an OR course that devoted a month to linear programming, so Sean has decided to use linear programming to analyze this problem

  Crafting a compensation and benefits plan

Crafting a Compensation and Benefits Plan

  Operation management responsibilities

Operation management responsibilities can be both strategic and tactical

  Describe the lean production philosophy

Describe how managerial accounting is different from cost accounting. Describe the lean production philosophy.

  The different characteristics of your target market

The different characteristics of your target market

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd