Nobody downloaded yet

A Penetrating Analysis - Case Study Example

Comments (0) Cite this document
Summary
Over the past five years, my organisation suffered two security incidents, one of which was somewhat unavoidable and the other a consequence of an oversight by the network administrator. This essay, which shall describe both attacks, will attempt to clarify the extent to which the unauthorised penetration of a company's network can have consequences which extend beyond damage and impact to the potentially catastrophic.
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.7% of users find it useful
A Penetrating Analysis
Read TextPreview

Extract of sample "A Penetrating Analysis"

Download file to see previous pages The administrator had stored his admin password on his mobile phone and had left the phone unattended in his office. At that time he had not realized that his mobile had been tampered with or that anyone had retrieved the admin password and user name from it. Approximately two weeks later, a virus was uploaded to the company's server and effectively shredded all employee information. Investigations into the attack uncovered evidence from the data dump and the syslog files which indicated that the virus had been directly uploaded from within the organization by the administrator himself. At least, the username and the password the attacker had entered to access the company's server were the administrator's. Further investigations revealed the password theft incident and identified the attacker as a disgruntled IT employee, who had just been put on notice by the administrator. The employee in question was, of course, fired and legal measures were taken against him. The employee records, after the investment of considerable effort and time by the IT department, were retrieved.
The seThe security incident described in the above, comprises a malicious attack whose potential for damage was significant. The attacker limited himself to the uploaded of a virus but, alternatively, he could have retrieved company information which was of value to competitors, such as client lists and a proposal that the company was putting together, at that time, for a bid. The consequences, in other words, could have been more damaging than they ultimately were, not because the company's network security system was effective but because the attacker's goal was limited to the uploading of the virus in question.
Reflecting upon the security incident outlined in the previous, it is apparent that the network administrator was at fault. Password information should be safeguarded as keys to a vault are, insofar as they are the keys to a corporation's nerve center and misuse has the potential to wreak tremendous damage on a corporation.
The second security incident which the company confronted was much more serious and occurred as a direct consequence of a vulnerability in the Cisco router which the company had installed. Apparently, Cisco IOS had a security hole which the company was trying to resolve through a software patch. Cisco had informed its IOS users that they would need to download and install the new software but had not mentioned the security hole. Therefore, my company and the IT department were, as the case with the countless of companies which used IOS across the world, unaware of the presence of a security hole. Many criminal hackers, however, were and Cisco only admitted it at a much later date (Zetter, 2005).
Exploitation of this particular security hole did not mean, as the network administrator explained, that a hacker could enter the corporate network but that he/she could both tamper with the data and control the data flow. This is precisely what happened. The router password was changed, financial records were tampered with and two orders for financial transfers were sent by the Financial Director to an offshore bank ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“A Penetrating Analysis Case Study Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved de https://studentshare.org/miscellaneous/1530176-a-penetrating-analysis
(A Penetrating Analysis Case Study Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/miscellaneous/1530176-a-penetrating-analysis.
“A Penetrating Analysis Case Study Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1530176-a-penetrating-analysis.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF A Penetrating Analysis

Challenges of International Apparel Brands in Penetrating China

...? Challenges of International Apparel Brands in Penetrating China Purpose: The purpose of this paper is to show the relation between the consumption of international brand and the Chinese consumer. The paper’s purpose further lies in analysing the prospects for the foreign apparel brand in the Chinese market. Methodology: The methodology used in the paper is qualitative as the research is based on the observation. The research based on qualitative methodology has been given importance to have a clear picture of the China’s market scenario. The qualitative methodology has been used to define objectives of the research paper. Findings: China is the fastest growing economy and the new hotspot for the companies worldwide. The...
14 Pages(3500 words)Essay

Analysis

...?ANALYSIS: In support of Jeffrey Meeker’s Comments on Jessica Cohen's essay "Grade A: The Market for a Yale Woman's Eggs" If there is one really goodpart about Jessica Cohen’s essay, Grade A: The Market for a Yale Woman’s Eggs, is that it is really well-researched. Starting from the classified ads and the manners in which people search for egg donors to the screening and actual egg retrieval processes – Cohen did a really good job at informing herself. This factor demonstrates two points: first is that she must be very interested with donating; and, secondly, she knows all about the processes, requirements and possibilities involved from her end as an egg donor, which is important in analyzing her change of heart later...
3 Pages(750 words)Essay

Analysis

...?An Analysis of The Major Media Companies Coping With the Changing Demands of People and Time Introduction The power of the media to spread information from any part of the world has caused the emergence of many media companies, offering services that promise to satisfy one’s need for pleasure, convenience and information. It is a dominating industry nowadays earning billions from its provided services in the field of television, radio and advertising. Whatever goes out in the media is seen by the public that creates either a positive or negative effect. This is something that makes the media unique from the other industries; the spreading of information that are seen or heard by people makes them eager to know more about... . In the provided...
8 Pages(2000 words)Essay

Analysis

...?Running Head: Paragraph Analysis English: Paragraph Analysis goes here Professional Specialization of your Topic Sentences Do you have a will? (Paragraph # 1) Avoiding and managing debt is hard. (Paragraph # 5) Paragraphs Analysis Precise and coherent presentation of an idea is the essence of a paragraph. The paragraph # 5 is focused write up which follows the rules of effective writing religiously. It introduces the topic in the opening sentence emphatically. The topic sentence catches the attention of the reader and instigates his interest into further reading. Rest of the paragraph is built on the topic sentence and every sentence further builds the reader’s thought on the subject....
1 Pages(250 words)Assignment

Penetrating and Blunt Abdominal Trauma

...Penetrating and Blunt Running head: PENETRATING AND BLUNT ABDOMINAL TRAUMA "Penetrating and Blunt Abdominal Trauma A Journal Critique InAPA Style (NAME) (UNIVERSITY) Penetrating and Blunt 1 The center of this journal critique is authored by Kristine L. Eckert, BSN, RN, CEN entitled "Penetrating and Blunt Abdominal Trauma". This journal was published in Critical Care Nursing Quarterly released last January-March 2005. The focus of this journal was on proper abdominal assessment and appropriate nursing intervention for various types of abdominal trauma. The journal basically gave an overview on abdominal trauma with the use of different case studies. It dealt with the difference in penetrating vs. blunt abdominal wounds... , the...
4 Pages(1000 words)Essay

Analysis

...Management Control System of TNA – An Analysis By Devangini Mahapatra Chauhan A control system in organizations largely influences its ability to recognize the social and cultural modes of control within it so as to lay down in clear terms the role of the entrepreneur when it comes to deliberating social control over the employees concerned. This paper will first of all outline the issues that have been dealt with by Paul M Collier in his Entrepreneurial Control and the Construction of a Relevant Accounting, where he studies the case of TNA as regards its management control system. Further, I will seek to put forth an analysis of this control system through the employment of two theoretical perspectives,...
10 Pages(2500 words)Essay

Analysis

...Analysis of Scores on the Vocabulary Quiz A total of 50 multiple choice test items were used in the vocabulary quiz, to carry out an assessment on 14 candidates. An analysis of the results indicates that four students failed. Their scores ranged from 46 to 58%. This group represent approximately 29% of all candidates who completed the quiz. Two (2) candidates received had results of over 90% representing approximately 14% of the candidates tested and the average score on the quiz was 71.3%. An analysis of the results by test items and based on the difficulty of the items revealed that eight (8) of the items were far too easy, four (4) of which all candidates answered correctly. These...
3 Pages(750 words)Assignment

Analysis

...Running head: ANALYSIS OF LEARNING RESULTS Analysis of Learning Results Natalia Duhau College: This learning task, administered on 23 January 2013, aimed at tests Math facts. In this case, the focus was on the mathematics functions addition and subtraction. These functions taught relied on use of number lines, cubes and the hundreds and tens chart. The task involved seven stages each building up to a more advanced level of the task. The first stage was a pre-test where students did a short math paper without any form of instruction in view of the content tested. This paper had eight questions on a math work sheet administered to students in whole groups of three for 25 minutes. After the pretest,...
2 Pages(500 words)Essay

Analysis

...Analysis Assignment This mystery piece is beautiful and dynamic; however, it remains rather formal in its structure. This piece distinctly consists of 2 ideas. There are two major ideas in the piece. The first idea starts from the very beginning, it lasts more than a minute (0:00 – 1:43), but it is repeated throughout the piece in different variations. The second idea starts at 02:59 and lasts almost a minute till 3:54. This idea is the opposition to the first one. It also serves as a base for further variation in the piece and within its parts. These 2 ideas create the base of 4 parts within this short piece. The first part dwells on the first idea. It lasts from 0:00 to 2:59. The end of this part is obvious due to...
4 Pages(1000 words)Essay

Penetrating testing techniques

...in the server. Mitigation strategies include; use of very complicated or strong passwords, this includes those used in the Plesk, Account Center and the root passwords. Analysis has proved that the stronger the password the more secure a server is. While accessing or connecting to the services, it is recommended to use secure connections if possible. This includes, email SSL connections, and prioritizing use of SFTP over the more common FTP procedures. Regular backing up of data is also a good mitigation strategy. In that it often takes a while to notice that the domain or a server has been infiltrated, therefore in such cases restoring from the last clean backup would be more appropriate to mitigate any further damage...
6 Pages(1500 words)Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic A Penetrating Analysis for FREE!

Contact Us