StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Week 1 CYB - Assignment Example

Cite this document
Summary
As an independent group whose objective was to challenge and eventually improve the effectiveness of the security system of Symbolic Motors, the Tiger Team applied the penetration testing aspect of red teaming. This was achieved by viewing the security problems from the point of…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.6% of users find it useful
Week 1 CYB
Read Text Preview

Extract of sample "Week 1 CYB"

Week CYB Week CYB Tiger Team As an independent group whose objective was to challenge and eventually improve the effectiveness of the security system of Symbolic Motors, the Tiger Team applied the penetration testing aspect of red teaming. This was achieved by viewing the security problems from the point of view of an adversary. The actions of the team are mainly based on wireless and wired hacking, social engineering and entering buildings without being granted legal access by breaking into them.

It is through such means that the Tiger Team is able to establish that a skylight on the roof is one of the organisation’s security weaknesses as it will provide them with discrete access into the car dealer’s premises. They challenged the assumption that every potential buyer who walks in the showroom is genuinely interested in buying a car and photographed motion sensors and cameras in the building. They then used a rogue wireless access point and carried out social engineering to gain access to sensitive information on customers.

This means that security at the organisation was highly compromised because, apart from the customer information, the collection of the expensive, luxury vehicles was also easily accessible to potential thieves, and the Tiger Team actually made away with one. The security at the organisation is not yet perfect, and ways in which it could be defeated include the ability of intruders to gain physical access into the premises unless the building’s design is improved. Then, since the Tiger Team was able to install a rogue camera that filmed the alarm keypad without being noticed, it means the organisation does not carry out regular inspections of its installed devices.

Challenging Assumptions It is often assumed that computer systems can best be protected by practicing cyber hygiene. However, this assumption can be challenged because most devices’ default settings are configured by the manufacturers to facilitate their ease of use at the expense of security. The result is usually vulnerabilities that do not require experienced hackers to exploit. Essentially, this means that any user of a system, and not necessarily a hacker, is a potential threat to its security.

The Internet has grown into a concept that relies on an interwoven system of trust for its security. However, guest users of a system may stumble upon administrator accounts which grant them higher degrees of control of other computers’ settings and programs (Pelgrin, 2013). Approaching such a situation from a red teamer’s perspective, it is easy to see that a user can breach the assumed trust and develop malicious intentions the moment he discovers he has stumbled upon such administrator rights.

Therefore, the ease-of-use standards to which computers are set are not only convenient for genuine users but also compromise the purpose of cyber hygiene and make systems vulnerable to cyber crimes. While cyber attackers will routinely search for and exploit possible flaws and programming errors, cyber hygiene often tends to be structured and the attackers will easily know how to circumvent most of the security measures put in place (Pelgrin, 2013). Further, the technical team that installs and implements the cyber hygiene protocols can give away the information to an adversary at a price.

ReferencesPelgrin, W. (2013). Cyber hygiene with the top 20 critical security controls. Cyber Security Newsletter, 8(12), 1.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 1 CYB Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Week 1 CYB Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1652264-week-1-cyb
(Week 1 CYB Assignment Example | Topics and Well Written Essays - 500 Words)
Week 1 CYB Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1652264-week-1-cyb.
“Week 1 CYB Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1652264-week-1-cyb.
  • Cited: 0 times

CHECK THESE SAMPLES OF Week 1 CYB

Unit 3/7: Management Research Project Stage 1 -Written Proposal-

We produce the business case for the creation of the class of a new product by CBM, namely, CNC grinding products.... We identify the research question whether CBM can improve turnover and profit by… Using the research method of regression and survey research, we develop the business case for CBM to make both CNC milling and grinding products....
6 Pages (1500 words) Essay

Positivism and Interpretive Roles with Regard to Knowledge

CAL Report- week 3 Reflecting upon my experience as we have neared the end of our third week together I have found the time very informative.... As I took part in the week 3 learning group I began to discover how my the structure of my company fits into the various models of management research and how to use that knowledge in order to create the most applicable knowledge.... The main aim this week was to be able to turn theories into practice....
1 Pages (250 words) Essay

Public Leadership and Action Learning

The literature synthesis of week six's module involved an examination of the different Topic: CAL week 6 During week 6, I have managed to cover a module on organizational responsibility with a focus on stakeholders.... The literature synthesis of week six's module involved an examination of the different ideas regarding the concept of stakeholder management.... This activity was carried out throughout the week and there was also a discussion of the strengths and limitations of the use of the stakeholder management approach within organizations during the process of strategic management and decision making (Marquardt and Marquardt, 2011, p....
2 Pages (500 words) Essay

Literature and Laboratory Skills

They have known toxicological properties and cause several illnesses.... Recent studies reveal that cylindrospermopsin alkaloids are present in large quantities in nearly all regions globally… Consumption of affected water is the key route through which exposure to the toxins arises.... Traditional water treatment techniques are effective against cyanobacterial cells, but useless for removal of dissolved cyanobacterial toxins....
5 Pages (1250 words) Thesis

CYB Week 2 Discussion

You will use cross-site scripting attacks to cyb Week 2 Discussion due: The word reconnaissance is originated from military, where it is used to denote to a mission into the enemy area to gain information.... In computer security, reconnaissance is usually an initial step toward a further attack pursuing to exploit a computer system....
1 Pages (250 words) Assignment

Investment Report Issues

This section of the report seeks to provide details meriting my investment strategies in purchasing stocks of Hyperdynamics Corp (HDY), CNET, SinoCoking & Coke Chemical Industries Inc.... (SCOK), Charles Voegele Holding AG (DE:VCH), and CyberArk Software Limited.... The merits of my… 1.... As a pure investor, my duty is to balance off the risks and benefits associated with any type of stock purchased....
6 Pages (1500 words) Essay

Accelerating Change Management at CEB

The paper argues that among the most important drivers for change at CEB is the recognition that the traditional structure of… Moreover, CEB has operations in a world where it has become adapted to different market environments because of globalization, because change has become a necessary aspect of survival....
10 Pages (2500 words) Case Study

The Concept of Alcohol and Alcoholism

The two children are in foster care and therefore she does not have contact with them.... The oneness caused by the absence of her kids causes psychological torture.... She may, therefore, end using the substance in order to forget the… The material transforms ones brain changing how it works....
4 Pages (1000 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us