Free

Week 1 CYB - Assignment Example

Comments (0) Cite this document
Summary
As an independent group whose objective was to challenge and eventually improve the effectiveness of the security system of Symbolic Motors, the Tiger Team applied the penetration testing aspect of red teaming. This was achieved by viewing the security problems from the point of…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful
Week 1 CYB
Read TextPreview

Extract of sample "Week 1 CYB"

Week CYB Week CYB Tiger Team As an independent group whose objective was to challenge and eventually improve the effectiveness of the security system of Symbolic Motors, the Tiger Team applied the penetration testing aspect of red teaming. This was achieved by viewing the security problems from the point of view of an adversary.
The actions of the team are mainly based on wireless and wired hacking, social engineering and entering buildings without being granted legal access by breaking into them. It is through such means that the Tiger Team is able to establish that a skylight on the roof is one of the organisation’s security weaknesses as it will provide them with discrete access into the car dealer’s premises.
They challenged the assumption that every potential buyer who walks in the showroom is genuinely interested in buying a car and photographed motion sensors and cameras in the building. They then used a rogue wireless access point and carried out social engineering to gain access to sensitive information on customers.
This means that security at the organisation was highly compromised because, apart from the customer information, the collection of the expensive, luxury vehicles was also easily accessible to potential thieves, and the Tiger Team actually made away with one.
The security at the organisation is not yet perfect, and ways in which it could be defeated include the ability of intruders to gain physical access into the premises unless the building’s design is improved. Then, since the Tiger Team was able to install a rogue camera that filmed the alarm keypad without being noticed, it means the organisation does not carry out regular inspections of its installed devices.
Challenging Assumptions
It is often assumed that computer systems can best be protected by practicing cyber hygiene. However, this assumption can be challenged because most devices’ default settings are configured by the manufacturers to facilitate their ease of use at the expense of security. The result is usually vulnerabilities that do not require experienced hackers to exploit.
Essentially, this means that any user of a system, and not necessarily a hacker, is a potential threat to its security. The Internet has grown into a concept that relies on an interwoven system of trust for its security. However, guest users of a system may stumble upon administrator accounts which grant them higher degrees of control of other computers’ settings and programs (Pelgrin, 2013).
Approaching such a situation from a red teamer’s perspective, it is easy to see that a user can breach the assumed trust and develop malicious intentions the moment he discovers he has stumbled upon such administrator rights.
Therefore, the ease-of-use standards to which computers are set are not only convenient for genuine users but also compromise the purpose of cyber hygiene and make systems vulnerable to cyber crimes.
While cyber attackers will routinely search for and exploit possible flaws and programming errors, cyber hygiene often tends to be structured and the attackers will easily know how to circumvent most of the security measures put in place (Pelgrin, 2013). Further, the technical team that installs and implements the cyber hygiene protocols can give away the information to an adversary at a price.
References
Pelgrin, W. (2013). Cyber hygiene with the top 20 critical security controls. Cyber Security Newsletter, 8(12), 1. Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Week 1 CYB Assignment Example | Topics and Well Written Essays - 500 words”, n.d.)
Week 1 CYB Assignment Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1652264-week-1-cyb
(Week 1 CYB Assignment Example | Topics and Well Written Essays - 500 Words)
Week 1 CYB Assignment Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1652264-week-1-cyb.
“Week 1 CYB Assignment Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1652264-week-1-cyb.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Week 1 CYB

WEEK 1

...Week A Foundation for Understanding Constitutional Law Few people could live together and not have laws. Why? Peoplewho want to live together must let go of a few personal liberties to arrive at some concessions and laws that must be followed. Laws can be considered as generally accepted contracts among members of a society. These laws ensure that everyone, governments and individuals, will act according to these “contracts.” Once these contracts are set, these people trying to live together will be bound by these rules, and restrictions normally occur. Behavior of the people living in a society is governed by these rules, and this concept ensures the functionality of the society. Laws are necessary because it is almost...
3 Pages(750 words)Coursework

Week 1

...or secondary source. Primary collection of data involves the use of questionnaire or interviews. This in turn gives first hand information required for the analysis. Statistical analysis may be misused in cases where secondary data is used. This refers to a situation in which data is obtained from either reference books or the internet. Secondary data is prone to alteration thus leading to wrong interpretation if data. Poorly analyzed data due to wrong information in turn lead to wrong formulation of policies which would cost the entire system. Week 1 Assignment 1. For each of the following, indicate which a variable is and which a constant is: a. Patients’ diastolic blood pressure -...
1 Pages(250 words)Assignment

WEEK 1 APPLICATION 1

...Soo, K. (2006). “Why Workers Share or Do Not Share Knowledge: A Case Study.” Indiana ProQuest Dissertations and Theses, 280-280, retrieved from http://search.proquest.com/docview/305309550?accountid=45049. (305309550). Why Workers Share or Do Not Share Knowledge: A Case Study Why workers share or do not share knowledge: a case study is a doctorial thesis by Keng-soon Soo submitted in partial fulfilment of the requirements for the degree Doctor of philosophy. The reasons why workers are willing to share knowledge vary depending on whom the question is posed to. Different departments believe that they have put in place necessary tools to enable distribution of knowledge, For instance, by putting various incentives and performance... K. (2006)....
2 Pages(500 words)Essay

Week 1:

...approximately $10,995 per student in all states. This figure was more than 35% the estimate the government intended to use. Given, the relevant bodies are working to fix these discrepancies but the rate at which change is taking effect is alarmingly slow. The diversity of students in Oregon State is a reflection of the situation in the nation. Therefore, Oregon state officials develop and continuously revise culturally competent policies to meet the rising needs of the students. The Oregon department of Education ensures the availability of a culturally competent education workforce by setting training requirement standards tailored for this purpose. Other factors include ensuring a bias free environment and provisions to integrate the...
2 Pages(500 words)Essay

Week 1

...Individual Selected Textbook Exercises Directions Use the e book to see examples, ebook user is salvatore2 & password is salvatore80 Ch. 1of Discrete and Combinatorial Mathematics Supplementary Exercises 1. In the manufacture of a certain type of automobile, four kinds of major defects and seven kinds of minor defects can occur. For those situations in which defects do occur, in how many ways can there be twice as many minor defects as there are major ones? Answer: For the ratio of 1:2 to occur, there are a total of 3 situations as follows: a. 1 major defect : 2 minor defect For 1 major defect: 4!/(4-1)! = 4 For 2 minor defect: 7!/(7-2)! = 7x6...
2 Pages(500 words)Speech or Presentation

CYB Week 2 Discussion

...CYB Week 2 Discussion due: The word reconnaissance is originated from military, where it is used to denote to a mission into the enemy area to gain information. In computer security, reconnaissance is usually an initial step toward a further attack pursuing to exploit a computer system. The attacker regularly uses port scanning to discover any vulnerable ports. Importance of Reconnaissance 1. Network reconnaissance is an important process as it helps to identify security threats to the system and services provided. 2. Facilitates solution to Cyber-security which is an area in which much course development is taking place and of much interest, Cyber-security training is important and necessities to be extended. 3. Help network... ...
1 Pages(250 words)Assignment

Week 1

... Critical Analysis Even though ic film noir is generally associated with films that are from the 1930’s and 1940’s, Polanski’s Chinatown stands out to one of the contemporary works that can be associated with the noir form as well as style. This masterpiece, however, breaks some rules of the classical film noir films as it is modeled around more formal and modern elements of the noir style like the inclusion of a sexy femme- fatale (Miller, Vandome and McBrewster 10). In addition to that, this artwork was shot in 1974 and unlike the traditional noir style of black and white, China town is in color. Chinatown first noticeable thematic device is the presence of an anti-hero protagonist who, although is basically a good guy, makes... Critical...
3 Pages(750 words)Essay

Week one CYB 634

...Cyber Competition Date Cyber Competition Cyber competition has become a normal daily phenomenon of the education system. Cyber competition is where individuals compete through the internet and results are instantly shown and ranked. Most are timed to ensure the learner is cautious of the time factor. Some have trained professionals who personal check result where others are automated programs that mark and grade students results. Cyber competition provides a forum where learners can test themselves, even before the real exam by taking online exams, hence, making it good value to them. However, it is subject to cheating where some may cheat their way through so that they can win prizes or ranked top. This causes unfairness... Competition Date...
1 Pages(250 words)Assignment

Week 1

...Law Introduction In a recent article, d October 6, the US government is investigating the Ford Motor Company for a possible liability for the failure of the steering system of its Ford Sedans (Jensen, 2014). The National Highway Traffic Safety Administration has received several claims that the steering wheel of these cars, which were released in 2010 and 2011 have problems, thus resulting in abrupt failures that hinders effective car control, resulting in car crashes (Jensen, 2014). Legal topics that apply to the company Product liability Product liability is a legal issue that has to do with the liability of the producer of a product for its functional failures to the consumers. According to ‘Appendix F: Federal Prosecution... Introduction...
1 Pages(250 words)Assignment

Week 1

...Network Analysers Network Analysers A Network analyser is a combination of programming and hardware, or an independent hardware device that upon installation onto a network or computer enhances protection against any malware. Network analysers are supplements for programs that detect spyware, antivirus applications, or firewalls (Choudhary et al., 2013). Network analysers, also known as packet analysers, traffic analysers or packet sniffers, understand network behaviour for diagnosis and troubleshooting of particular problems. Network analysers provide reliable statistics for recent and current activities in the network. The tool has automatic detection programs that keep history of a network system. In addition... Analysers...
1 Pages(250 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Assignment on topic Week 1 CYB for FREE!

Contact Us