Ways to prevent network intrusion

Assignment Help Basic Computer Science
Reference no: EM13829858

Problem:

Scenario:

You are the manager of a large division of your company. One of the supervisors under your leadership handles customer complaints. This supervisor recently received an e-mail addressed specifically to the supervisor from a customer complaining that one of the product listings on your website was incorrect. The e-mail contained a URL that pointed to the page with the error on it. The supervisor came to you to let you know that after clicking on the URL provided by the customer, nothing appeared to be wrong with the page. The supervisor attempted to reply to the customer's e-mail address but received a message that read, "No such e-mail address exists." Shortly after the supervisor responded to the customer complaint e-mail, you noticed that your computer was running slowly and that someone had been able to access some confidential files on your system. Normally, supervisor e-mail addresses are not public, so you are not sure how the customer obtained the supervisor's e-mail address. You also are not sure how anyone could have gotten password or access privileges to your confidential files. Your boss told you other individuals have noticed that some of their confidential files have been accessed. Your boss wants a report on his desk by the end of the week that outlines:

  • How an intruder could have gained access to the confidential files located on the network
  • What process you are going to use to ensure that the network and files are not compromised again
  • What type of training or policies need to be put in place to ensure that the network and files are secure
  • Your task will be to provide answers to the three questions given to you by your boss. Your suspicion is that your company was a victim of a social engineering attack, and you believe that this information was used to gain access into the company's computer systems.

Task:

A. Create a memo (suggested length of 1 page) discussing how you believe the intruder gained access to the company's network using social engineering.

B. Create a security recommendations list suggesting prescriptive measures that should be implemented to prevent such intrusions in the future.

C. Create a mock-up (suggested length of 1-2 pages) of how you would test your organization's vulnerability to a social engineering attack. Include the following in your mock-up:

  • What techniques you would use
  • Who you would use the techniques on
  • What questions you would ask

Additional Information:

This is a scenario analysis where company's confidential information was accessed by network intruder. This was noticed after responding to the customer's query as well as following the link provided by customer. The required actions as well as plans to secure the network and network files has been given comprehensively in the solution.

Total Word Limit: 1484 Words

Reference no: EM13829858

Questions Cloud

Explains the relationships between students and teachers : The question is an article summary that explains the relationships between students and teachers, particularly sexual relationships. The summary and the analysis clarify the implications of sexual relationship between students and teachers/.
Critical importance of it in company strategy : For this assignment you will have to prepare a paper that critically discusses how organizations apply the strategic use of IS/IT to achieve competitive advantage. Some aspects and issues you may discuss in your paper could include (but are not li..
Write one or more pages summarizing the interview : Write one or more pages summarizing the interview. Describe the background of the person you interviewed and his or her experiences as an educator working with young children, as a speech pathologist, or as a parent of a young child with a speech del..
Describe descent and alliance theory used by anthropologists : The question is related to Sociology and the question is describe the descent and alliance theory used by anthropologists to describe the terms marriage and family issues.
Ways to prevent network intrusion : You are the manager of a large division of your company. One of the supervisors under your leadership handles customer complaints. This supervisor recently received an e-mail addressed specifically to the supervisor from a customer complaining tha..
What did you learn from your observation : What did you learn from your observation and interview about the child's typical language activity? Give examples of the child's use of "language" that provide evidence of the child's stage of language development. Describe the type of interactions b..
Decision support system scenario analysis : Assumption: Your Company was able to purchase major holdings in FaceTalk. As a result of the stellar work of your committee, all of you were given big bonuses at the end of the 4th quarter.
How the relationship between narrator and zhu wenli changes : Describe how the relationship between the narrator and zhu wenli changes over the course of ha jin's short story "a decade" from his collection under the red flag
Calculate on network to be safe : You are a new IT security professional for a small police department. At first you did not see your agency as being a large target for attacks.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a java program recursively and iteratively

write a java program recursively and iteratively that reads an integer of up to five digits. Write it out individually in both forward and backward order.

  Systems analyst modifying the sales order process

Suppose that you are a systems analyst on a project that involves modifying the sales order process. How many do you need to sample if you want 95 percent certainty that you have covered all variations?

  Analysis paper on virtual team

For a variety of reasons, organizations are relying on virtual teams for product development. Take some time to research the use of virtual teams for new product development and technological innovation.

  How much electric power would be produced by these falls

Water flows over a waterfall, which is 120 m high, at a rate of 1.30E+6 kg/s. If half the potential energy of this water were converted into electric energy, how much electric power would be produced by these falls?

  Computing characters are there in encyclopedia

The text of the Encyclopedia Britannica is about 44 million words. For a sample of about 2000 words, the average word length was 6.1 characters per word. Approximately how many characters are there in the encyclopedia?

  Commands performs:a) dim raccoon(17) as string

1) Briefly describe what each of the following commands performs:a) Dim Raccoon(17) As String  b) Dim RxData() as Double

  In mips assembly language

In MIPS Assembly language

  Naming conventions are critical for properly managing files

Take a position on whether or not standardization and naming conventions are critical for properly managing files and folders in a window environment. Include example.

  Exicutive memo to the board

Submit an Executive Memo addressed to the CIO and the board of directors. Last week, the CIO reviewed your presentation and has decided to move forward with your recommendations for improvements.

  Introduce a delay between opening and closing of the flap

Introduce a delay between the opening and closing of the flap

  Write a complete interactive menu-driven program

Write a complete interactive, menu-driven program using the binary file built previously and your primary and secondary indexes in memory.

  Explain what is done in each of the risc states

Explain what is done in each of the RISC states for the 5 types of MIPS instructions represented with R, I, and J instruction formats.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd