Provide background information on best bank

Assignment Help Computer Engineering
Reference no: EM133874025

IT Security

Introduction

Case Study Introduction: EITest Scam Impact on Best Bank

The following case study is created based on several Internet sources referring to the links below. The Bank name "Best Bank" is a hypothetical name created for the purpose of explaining the assignment.

"Facing Multiple Redirects to Phishing Pages. Is my website hacked?" by Sovande, February 2022,

"EITest Tech Support Scams Spread Coinhive Monero Miner", by Trendmicro, September 2022

Best Bank, a multinational banking and financial services company headquartered in Victoria, Australia, serves as a prominent institution in the global finance sector. Best Bank stands as Australia's second-largest bank by assets and the 3rd largest by market capitalization.

Established in 1990, Best Bank's current corporate entity emerged from the merger with several local banks in different countries, marking a milestone in Australian banking history. This merger propelled Best Bank's evolution into a leading financial institution.

With operations spanning across multiple countries, Best Bank caters to a diverse customer base, offering a wide range of banking and financial solutions. Best Bank oversees a global network of branches and subsidiaries, extending its services to customers in 34 countries worldwide. With a dedicated workforce of around 40,000 employees, Best Bank remains committed to delivering exceptional banking experiences and solutions to over nine million customers across the globe.

Similarly, serving nine million customers across multiple countries, Best Bank caters to a diverse customer base have users, including non- tech-savvy individuals, who may be vulnerable to fraud and manipulation by cybercriminals. Get online assignment help from Ph.D. experts!

Recently, Best Bank's customers have complained of unusual network delays in the banking system, as well as being redirected to different websites irrelevant to them. Moreover, Best Bank's customers report receiving unusual popup messages on their mobile application. Therefore, Best Bank recently hired your team as the expert cybersecurity team to assess this situation. Your team discovered evidence suggesting Best Bank's potential exposure to the EITest scam, a sophisticated cybercriminal operation notorious for its deceptive tactics in distributing malware and conducting phishing attacks.

The EITest Scam is a type of malicious campaign that utilizes hacked websites to perform malicious redirections. This campaign exploited vulnerable websites and redirected users to exploit kit landing pages, which launched Internet Explorer and Flash exploits, resulting in the download of malicious binaries onto the user's system.

Concerned about the potential risks posed by this threat, Best Bank has tasked your team with conducting a comprehensive security report to assess the vulnerabilities and potential Business Impact Analysis due to the EITest scam and to maintain their Business Continuity. Your team has been tasked to study this case and compile a comprehensive security report comprising Business Impact Analysis, and Business Continuity Plan and evaluate the potential cyber threats and risks posed by the EITest scam to Best Bank. The report should analyze the impact of the scam on Best Bank's systems, networks, and data security, as well as provide recommendations for mitigating the identified risks and enhancing the organization's cybersecurity defences to maintain the business continuity. Your recommendations should be presented in both a written report and an oral presentation.

Your report should include the below sections.

Executive Summary: Overview of EITest scam and its potential impact on Best Bank.

Introduction: Provide background information on Best Bank and its global presence, highlighting the diversity of its customer base and the potential vulnerability of non-tech-savvy users to cyber threats.

Threat Analysis: Identify and analyze the potential cyber threats posed by the EITest scam, including compromised websites, malicious redirection, and exploit kits. You have to perform a detailed analysis of the EITest Scam and then report in this section.

Vulnerability Assessment: Assess the vulnerabilities in Best Bank's systems, networks, and processes that could be exploited by the EITest scam.

Risk and business impact Analysis: Conduct a risk assessment to determine the likelihood and potential impact of EITest to Best Bank and make a BIA identifying its main functions and stakeholders.

Business Continuity plan: Provide an actionable business continuity plan to Best Bank's defences against the EITest scam. This may include implementing security controls, enhancing employee training programs, improving incident response capabilities, and fostering a culture of cybersecurity awareness across all branches.

Conclusion: Summarize the key findings and recommendations from the security report. Emphasize the importance of proactive measures to mitigate the risks posed by the EITest scam and safeguard Best Bank's systems, data, and reputation from cyber threats.

Oral Presentation: Explain your contribution of the above analysis and your conclusion about the EITest scam.

Assessments not submitted through any cloud forms are not considered. Submissions must be made by the end of session 12 and 13 respectively.

Reference no: EM133874025

Questions Cloud

Hear people begin to scream out : You are at the beach with your friends when you hear people begin to scream out. A young boy has collapsed in the water, face down.
Carriers of sickle cell trait and who desire pregnancy : Which information would the nurse provide to a couple who are both carriers of sickle cell trait and who desire pregnancy?
Describe take-aways that resonate with you from the course : Describe 3 take-aways that resonate with you from this course? How can you apply content from this course in your nursing practice and your role?
Diagnostic shoulder arthroscopy-describe bankart lesion : What are the problems that may commonly be found and treated during the diagnostic shoulder arthroscopy? Describe a Bankart lesion.
Provide background information on best bank : Provide background information on Best Bank and its global presence, highlighting the diversity of its customer base and the potential vulnerability
Describe the main points of the bankart repair : Describe the main points of the Bankart repair. Describe the condition that warrants an acromioplasty.
Most common method of reduction for colles fracture : Arm Surgery. Describe a Colles' fracture. What is the most common method of reduction for a Colles' fracture?
Significance of accurate and thorough documentation : Discuss the significance of accurate and thorough documentation in nursing practice and patient care
Keeps an asthma inhaler in their desk drawer : You are working with a co-worker who you know has asthma and keeps an asthma inhaler in their desk drawer.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd