Identify one step in the attack that used social engineering

Assignment Help Other Subject
Reference no: EM131251022

In this written assignment you will relate the cyber attack on HBGary Federal to some of the terminology introduced in the first two modules.

Like most written assignments, this must be submitted as a PDF file. If you choose to include the questions to your answer sheet, please highlight your answers, that makes it so much easier to grade!

Question 1- Types of vulnerabilities/exploits.

a. Identify one step in the attack on HBGary Federal that exploited an unpatched manufacturer vulnerability in commonly used software. (Hint: I believe there is only one exploit in the entire attack that fits this category, this will likely be the hardest one to find).

b. Identify one step in the attack that exploited a local vulnerability. This is the most common type of vulnerability exploited in the attack.

c. Identify one step in the attack that used social engineering.

Question 2. Is the HGBary Federal attack best categorized as a "targeted" or "opportunistic" attack, and most importantly, why?

 Question 3. Characterizing attacks according to the CIA (Confidentiality, Integrity, Availability) triad. The attack on HBGary Federal had elements of all three types of attacks.

a. What part of the attack on HBGary Federal can be considered as a Confidentiality attack, and why?

b. What part of the attack on HBGary Federal can be considered as an Integrity attack, and why?

c. What part of the attack on HBGary Federal can be considered as an Availability attack, and why?

Question 4. Like most cyber attacks, the attack on HBGary Federal did not consist of one single act, but a series of actions linked together. Here's a list of eight actions that were taken by Anonymous during the attack.

 A. Anonymous defaces the HBGary Federal website

B. Anonymous deletes backups and research data

C. Anonymous gains administrator access to HBGary's Google App's email system

D. Anonymous gains root access to a Linux computer, support.hbgary.com

E. Anonymous retrieves usernames, email addresses and hashed passwords of administrators for the HBGary Federal web server

F. Anonymous takes over Aaron Barr's twitter account

G. Anonymous tricks an administrator into giving them root access to the rootkit.com web server

H. Anonymous is able to use hashed passwords to find plaintext passwords belonging to Aaron Barr and Ted Vera

Some of these events are dependent upon earlier events, for instance, Anonymous could not take over Aaron Barr's twitter account without having already found his plaintext password. The purpose of these next three questions is to identify other dependencies among these events.

a. Among these eight actions, there is one that started everything else for anonymous, one action that all of the others were dependent upon. Which action is this, and why?

b. Actions C and G are closely related, and one of them had to have occurred before the other. Which one occurred first, and why?

c. Actions B and D are closely related, and one of them had to have occurred before the other. Which one occurred first, and why?

These are the website we can write about so you can choose from them-

https://arstechnica.com/tech-policy/2011/02/how-one-security-firm-tracked-anonymousand-paid-a-heavy-price/

https://arstechnica.com/tech-policy/2011/02/anonymous-speaks-the-inside-story-of-the-hbgary-hack/  

https://www.pcworld.com/article/221504/8_security_tips_to_learn_from_the_hbgary_hack.html  

https://arstechnica.com/tech-policy/2011/02/the-ridiculous-plan-to-attack-wikileaks/  

https://www.huffingtonpost.com/2012/01/20/aaron-barr-cybersecurity-anonymous-occupy-wall-street_n_1219328.html

Reference no: EM131251022

Questions Cloud

Improve your key accounting operations : you have been asked by the CFO of your firm to look at ways to improve your key accounting operations (billing, A/R, and A/P). Recommend a best practice for one of these functions, explaining how your best practice will improve your firm’s operations..
Determine the e-r for the proposed system : Determine the E-R for the proposed system. Provide the timeframe for delivering the solution to the project. Proposed system Interfaces and Dialogues prototype including forms and reports.
Auditor for wartz limited : MQ Chartered Accountants (MQ) was the auditor for Wartz Limited (Wartz) for the financial year ending 30 June 2016. In August 2016, Downtown Limited (Downtown) made a successful takeover offer of Wartz Limited based on the unqualified 2016 audit r..
How do elderly people respond to exercise training compared : From a public health standpoint, why is there so much attention paid to increasing a sedentary person's physical activity by a small amount rather than suggesting strenuous exercise? How do elderly people respond to exercise training compared to yo..
Identify one step in the attack that used social engineering : Identify one step in the attack that exploited a local vulnerability. This is the most common type of vulnerability exploited in the attack. Identify one step in the attack that used social engineering
Explain basic concept of process management in unix kernel : You have wide range of choices for this assignment. First, design your program to explain the basic concept of the process management in Unix Kernel.
Production function of a perfectly competitive firm : Given the Production Function of a perfectly competitive firm, Q = 160L + 18L2 - L3, where Q = Output and L = labor input a. At what value of L will Diminishing Returns take effect? b. Calculate the range of values for labor over which stages I, II, ..
State clearly investment in the riskless cash fund : Obtain Hypatia's new allocation of her inheritance to the (now) six funds.  - State clearly investment in the riskless cash fund and describe in detail the tangency portfolio.
How social media influenced the 2016 presidential elections : Based upon the articles above, how has social media influenced the 2016 presidential elections? Has this influence been positive or negative? You MUST cite specific examples from the articles in response to these questions. Points will be deducted..

Reviews

Write a Review

Other Subject Questions & Answers

  How many standard deviations is sally from the mean

Suggest changes to this test to make it better. Justify your reason for each suggestion supporting each reason with psychometric principles from the text book or other materials used in your course.

  Analyze the relationship interaction explaining why it works

analyze the relationship interaction, explaining why it "works" or fails to "work." Remember, this is an exercise in theory and concept application so be sure to apply the theory or concept to the event of the relationship interaction, actually te..

  Which test has the larger value for df

A chi-square test for goodness of fit is used to examine the distribution of individuals across four categories, and a chi-square test for independence is used to examine the distribution of individuals across the six categories in a 2×3 matrix of..

  Evolutionary cognitive psychology

This is a General Psychology course question. What evolutionary cognitive psychology added to cognitive psychology in general. Please give two brief example in 200 words and simple write-up.

  Explain demands of diversities exist under same umbrella

Demands of diversities that exist under same umbrella. Write down these diversities and how do they fit into mainstream movement? Write down ways to bring these diversities into more visible space?"

  Personality type concept from freudian theory

How is this concept different from the personality type concept that comes from Freudian theory? Use specific examples.

  Revolutionary transformation

Would embracing sustainability principles represent an evolutionary reform of the marketing discipline or a revolutionary transformation?

  Descrbing adaptations of the human brain

Describe some examples of how this would be adaptive. Give any references which are employed to formulate a response to this question.

  What will be the most likely outcome of the murder charges

Three men in masks entered a bank to commit an armed robbery. A bank guard quickly pulled his gun and told the men to stand down. What will be the most likely outcome of the murder charges against the two robbers

  Find what permeability is indicated

If a liquid flow rate is recorded through a 2 cm long core that is 2 cm in diameter, with a viscosity of 1 cp, an upstream pressure. what permeability is indicated?

  How to protect trade mark internatioally

Definiation , how to protect trade mark internatioally, comparing between trade mark regulations in The kingdom of Saudi Arabia and The US and internationally.As you have an expertise in researching in several areas could you please add what you ..

  Herzberg’s motivator-hygiene theory

Conduct some basic analysis of that data applying a theory of motivation identified in the textbook reading from Chapter 9 (e.g. Herzberg’s motivator-hygiene theory)

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd