How did the attacker gain access to the system

Assignment Help Computer Network Security
Reference no: EM131299433

Network Forensic

You are notified of a phishing email attempting to lure victims to a fictitious Federal Bank Online website. The Federal Bank Online is a division of Bank of Atlas which provides financial services to members of the U.S. federal government. The phishing email contains a link to a website purporting to be run by the Federal Bank Online. Bank of Atlas has confirmed that the site, hosted at IP address 12.184.79.86, is not an authorized site (all IP addresses and site names in this scenario are fictitious and do not represent any actual persons or organizations).

You contact the owner of the web server using IP address 12.184.79.86. The administrator states that he was unaware of the Federal Bank Online site being on his server and provides the following logs from the server. Analyze the logs and determine the following, citing specific log entries to support all of your answers:

1. How did the attacker gain access to the system? Provide as much detail as possible about the attack, the tool used, etc.

2. What IP address or addresses did the attacker use?

3. How did the attacker create the fictitious Federal Bank Online site on the server?

4. Was the attacker successful at his first attempt at creating the fictitious Federal Bank ?Online site?

5. Did the attacker create any other fictitious sites on the server?

6. Can you provide any other information about the attack that you feel is relevant?

Reference no: EM131299433

Questions Cloud

Write a recursive method writeblock : Write a recursive method writeBlock (char, int, int) that uses the recursive method writeLine (char, int) to write m lines of n characters each. For example, writeBlock (‘ *' , 5, 6) produces the following output:
Aligning education outcome with market needs : Prepare a seminar presentation on the use of qualitative approaches in their research area - What qualitative approaches would work in their area and What are the strengths of these approaches?
Write a pseudocode for deleting a node from a bst : Write a pseudocode for deleting a node from a BST. Simulate your algorithm with a BST of 10 nodes and show the deletion process. Especially show the deletion of the interior nodes and not just leaf nodes.
Design a welding jig : MFG 343 Manufacturing Tool Design Project. For the part show in the following drawing you are to design a welding jig sufficient to locate and clamp the part for the necessary welding operations
How did the attacker gain access to the system : How did the attacker gain access to the system? Provide as much detail as possible about the attack, the tool used, etc. What IP address or addresses did the attacker use?
What are strategies behind implementing cloud computing : What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world?
Create an analogy or metaphor : Create an analogy or metaphor that explains how banks create and destroy money-one that would be understood by someone with absolutely no background in economics.
Rename and organize the worksheets within the workbook : Worksheet & Workbook Management- Rename and organize the worksheets within the workbook and re-save the workbook itself by following the instructions below: Access and open 1010excel.xlsx.
What role do banks play in process : Explain how the Fed can increase the money supply by engaging in open-market operations. What role do banks play in this process?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe the process used in restoring the scrambled bits

You will be required to restore the scrambled bits to their original order and copy the plain text in your assignment. Describe the process used in restoring the scrambled bits and insert plain text in the assignment

  Problem regarding the machine probability

The probability that two machines is related by , A to work is 0.7 and the probability that B works if A is working is 0.8 , and 0.35 if A fails work find that machine probability B does not work.

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Network management in network management why is it

network management in network management why is it important to carefully consider decisions that will lock the firm

  Oral presentation on your logical network design

Oral presentation on your logical network design. The scenario to be used for the logical network design - You are to demonstrate your technical as well as presentation skills by presenting your logical network design

  Design a modern network for a private high school

Design a Modern Network for a Private High School. The network is proposed to achieve the above objectives considering the school's following business and technical goals.

  Formulate a digital forensics process

Write a guide on how to load a VHD file and what strategies should you use? Which acquisition method should you use?

  Computer security is not an issue for organizations alone

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer.

  Describe what hacking of memory or hacking of ram means

Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action

  Design a network or network component

Students are to design a network or network component using a design tool (example: Visio or CAD). Required is a visual representation of this network along with a document describing all aspect of the network design including product selection.

  Identify steps required for implementing a security program

Identify three steps required for implementing a physical and environmental security program. Explain how you would factor risk management practices into the development of the policies you constructed above.

  Explain differences between the types of network securities

Explain the differences between the types of network security offered by the banks in the case. Which bank would you open an account with and why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd