What you have done to keep ed away so you could reconfigure

Assignment Help Other Subject
Reference no: EM131893899

Case Project

Read the following Case Study and answer the questions at the end in paragraph form.

This is a true story (with minor details changed). Microsoft had uncovered several licensing discrepancies in its software that clients were using while claiming they had purchased it from an authorized software retailer. The sale of one software package to a company in Tampa was traced back to a retailer in Pennsylvania, and yet the retailer had no record of any sales to the Tampa company. A private security consulting agency was called in, and they discovered that the network system administrator "Ed" in Pennsylvania was downloading pirated software from the Internet and selling it to customers as legitimate software behind the company's back. Ed had sold almost a half-million dollars in illegal software. The security firm also noticed a high network bandwidth usage. Upon further investigation they found that Ed was using one of the company's servers as a pornographic website with more than 50,000 images and 2500 videos. In addition, a search of Ed's desktop computer uncovered a spreadsheet with hundreds of credit card numbers from the company's e-commerce site. The security firm speculated that Ed was either selling these card numbers to attackers or using them himself.

The situation was complicated by the fact that Ed was the only person who knew certain administrative passwords for the core network router and firewall, network switches, the corporate virtual private network (VPN), the entire Human Resources system, the email server, and the Windows Active Directory. In addition, the company had recently installed a Hardware Security Module (HSM) to which only Ed had the password. The security consultant and the Pennsylvania company were worried about what Ed might do if he was confronted with the evidence, since essentially he could hold the entire organization hostage or destroy virtually every piece of useful information.

A plan was devised. The company invented a fictitious emergency situation at one of their offices in California that required Ed to fly there overnight. The long flight gave the security team a window of about five and a half hours during which Ed could not access the system (the flight that was booked for Ed did not have wireless access). Working as fast as they could, the team mapped out the network and reset all the passwords. When Ed landed in California, the chief operating officer was there to meet him and Ed was fired on the spot.

Now it's your turn to think outside of the box. What would you have done to keep Ed away so you could reconfigure the network? Or how could you have tricked Ed into giving up the passwords without revealing to him that he was under suspicion?

Reference no: EM131893899

Questions Cloud

Cash flow be under proposed capital structure of firm : What will Ms. Browns cash flow be under the proposed capital structure of the firm? Assume that she keeps all 100 of her shares.
What is the future value if money is compounded semiannually : In five years, what is the future value of $4,000 is the interest rate is 10% and money is compounded monthly? What is the future value if money is compounded
Management of risk and returns : Three major concepts you learned in this course and explain how you will utilize them in your current or a future position.
True regarding probability distributions : Which of the following is true regarding probability distributions?
What you have done to keep ed away so you could reconfigure : Now it's your turn to think outside of the box. What would you have done to keep Ed away so you could reconfigure the network?
Calculate the betas of stock x and y : Calculate the betas of stock X and Y? Also calculate the beta of the market?
Forecast the firm additional funds needed : In your internship with Lewis, Lee, & Taylor Inc. you have been asked to forecast the firm's additional funds needed (AFN) for next year.
Investments can be diversified away under right conditions : Which type of risk that is associated with investments can be diversified away under the right conditions?
What is the project payback period : Worthington Inc. is considering a project that has the following cash flow data. What is the project's payback period?

Reviews

Write a Review

Other Subject Questions & Answers

  E business and e commerce and information systems

Analysis and discussion and the case or the company that is covered in your project (400 words approximately). In addition to your opinion and critical reflections.

  Evaluate the biological theories of aging

Evaluate the biological theories of aging

  Analysis of clydes masculinity

TVF 3660 VIOLENCE, CULTURE & THE MEDIA Group Presentations. Topic-Masculinity femininity and sex in the movie Bonnie and clyde. Analysis of Clyde's masculinity

  Categories of owners have unlimited liability

Which of the following categories of owners have unlimited liability?

  Identify facts from given scenario which support decision

Identify the facts from the scenario which support your decision on whether or not a contract exists for the purchase of the automobile.

  Activities of monsanto

Explain Cooley's argument in "Genetically Modified Organisms and Business Duties." What would Cooley say about the activities of Monsanto and related in the case study "Monsanto's Round-Up Ready Wheat"?

  What the zapatista documentary

What the Zapatista documentary and write this assignment. The question is, what are you view the Zapatista movement?

  Define a subculture in childhood and adolescence

childhood and adolescence may help individuals become well-adjusted later. Using Sullivan's idea of "chumship," what does this help us understand about personal

  Explain what does it mean to teach to standards

What does it mean to teach to standards? Do all disciplines have to teach to standards? What professional associations will influence your curriculum as you develop your program of study?

  Identify the types of measures and sources data

Identify the types of measures and sources data that could help identify the cause(s) of the infections and explain the rationale for your choices.

  The toxicants do you believe most biological warfare agents

What category of toxicants do you believe most biological warfare agents fall under. Why do you think this type of toxicant is used

  What does lewis mean by civil society

What parts of the modern world does Lewis assign an origin in Western culture? What does Lewis mean by civil society? What part of the modern world developed in Islamic regions

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd