Security breach discussion

Assignment Help Basic Computer Science
Reference no: EM131660305

Security Breach Discussion

Read the following scenario below. Once finished reading, follow the discussion question instructions.

An auditor was hired to determine if he could gain access to the network servers of a printing company that contained important proprietary information. The chief executive officer (CEO) of the printing company boldly proclaimed that breaking into the servers by the auditor would be "next to impossible" because the CEO "guarded his secrets with his life." The auditor was able to gather information about the servers, such as the locations of the servers in different printing plants and their IP addresses, along with employee names and titles, their e-mail addresses, phone numbers, physical addresses, and other information.

The auditor also learned that the CEO had a family member who had battled through cancer and lived. As a result the CEO became involved in cancer fundraising. By viewing the CEO's entry on Facebook, he was also able to determine his favorite restaurant and sports team.

The auditor then called the CEO and impersonated a fundraiser from a cancer charity that the CEO had been involved with before. The auditor said that those individuals who made donations to this year's charity event would be entered into a drawing for prizes, which included tickets to a game played by the CEO's favorite sports team and gift certificates to area restaurants, one of which was the CEO's favorite.

After stoking the interest of the CEO in the fake charity event, the auditor said that he would e-mail him a PDF document that contained more information. When the CEO received the attachment he opened it, and a backdoor was installed on his computer without his knowledge. The auditor was then able to retrieve the company's sensitive material. (When the CEO was later informed of what happened, he called it "unfair"; the auditor responded by saying, "A malicious hacker would not think twice about using that information against you")

Answer These Questions:

  • Now pretend that you are an employee of that company and that it is your job to speak with the CEO about the security breach. 
  • What would you say to him? Why? 
  • What recommendations would you make for training and awareness for the company?

Reference no: EM131660305

Questions Cloud

How to filed a petition in bankruptcy : James Stout, a professor of economics and business at Cornell College in Mount Vernon, Iowa, filed a petition in bankruptcy, seeking to discharge about $95,000.
Network architecture that allows users : Design a "Simple" network architecture that allows users in the untrusted domain to communicate with systems in the trusted domain employing
Computes and returns the sum of all numbers : Write static recursive function named "sum" that computes and returns the sum of all numbers from 1 to n (where n can be assumed to be is positive).
Discuss the problem-exceptions to discharge : Exceptions to Discharge. Between 1988 and 1992, Lorna Nys took out thirteen student loans, totaling about $30,000, to finance an associate of arts degree.
Security breach discussion : Read the following scenario below. Once finished reading, follow the discussion question instructions.
Aims to explore standardized terminology : This week aims to explore standardized terminology, While NANDA, NIC, and NOC are among the 13 approved terminologies by the ANA
Compare the three study designs-exploratory : What biases are built into these three research study designs? Provide specific examples to illustrate your points, building on the material covered to date.
Application to customers over the internet : A cloud consumer of a PaaS service who delivers an application on the PaaS and sells access to application to customers over the Internet is acting
Discuss what leadership strategies use to reawaken : What leadership strategies would you use to reawaken the passion for practice

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Are all securities stored in a bank safe deposit vault

Internal Control Questionnaire for Equity Investments. Cassandra Corporation, a manufacturing company, periodically invests large sums in marketable equity.

  Visual effects and mobile websites

Imagine that you add Internet Explorer filters to a Website containing fixed images to enhance the images with a shadow. After adding the filters, it fails to work. Explain why this may have happened. Propose another solution that you can use to g..

  How do the conditions for dk/nf correspond to the conditions

How do the conditions for DK/NF correspond to the conditions for BCNF?

  Show that a giant strongly connected component exists

In the World Wide Web the in- and out-degrees of the vertices have a measured covariance of about ρ = 180. The mean degree is around c = 4.6. On the basis of these numbers, do we expect the Web to have a giant strongly connected component?

  Online productivity applications

Describe the function of each application of Microsoft productivity apps and how it can be used to be more productive in the work environment.

  Explain forms-based-authentication

Discuss authorization and authentication and explain forms-based-authentication. Describe the use of the ControlToValidate, Validation expression, ErrorMessage, and Enabled properties of a validation control.

  Agent based e-learning solution

Q. Do a datailed study of the Case Study - Chapter 10 "Agent Based E-Learning Solution" and prepare a group report considering the groups created during lecture. Submit your report in A4 printed paper.

  Which exceptions can each of these instructions trigger

If there is a separate handler address for each exception, show how the pipeline organization must be changed to be able to handle this exception. You can assume that the addresses of these handlers are known when the processor is designed.

  Risk management in the cybersecurity

1. What role does innovation play in the cybersecurity industry? 2. Who are the major developers of cybersecurity related inventions? 3. How can technology innovations impact risk and risk management in the cybersecurity and/or cyber defense domains?

  List at least three independent software houses

List at least three independent software houses (not associated with a computer vendor) that are major players in the software component of the information systems industry. List any software products that you regularly use and indicate the firm t..

  Con of the common size analysis

The Con's of the Common Size Analysis are: no standard ratio, does not recognize the change in price level, and seasonal fluctuations.

  Dentist-patient appointment data

The table shown below lists dentist-patient appointment data. A patient is given an appointment at a specific time and date with a dentist located at a particular surgery. On each day of patient appointments, a dentist is allocated to a specific..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd