Preview

FXT2 Task 2 Follow Up

Good Essays
Open Document
Open Document
799 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
FXT2 Task 2 Follow Up
FXT2 Task 2
Follow-Up re: Human Resources Data Modification
1. Identify areas that were not addressed by the IT staff’s response to the incident.
Based on the narrative, the only corrective measure the company implemented was PKI. As noted in the original evaluation, several areas need to be addressed:
Climate/culture of the organization
Employee training for social engineering attacks
Positive identification of employees when granting role-based access
Vulnerabilities within and without the network, specifically to sniffers and eavesdropping
The ease with which the employee changed his pay rate, indicating a single system used for HR profiles rather than segregated duties & systems
The PKI that was installed only addressed the HR system, rather than the entire organization
Honestly, the whole environment at this company needs a complete evaluation and overhaul!
2. Outline the other attacks mentioned in the scenario that were not noticed by the organization.
Social Engineering
Sniffing/Eavesdropping
Unauthorized Privilege Escalation
Network Penetration
Spoofing
a. Describe the nature of the attacks not noticed by the organization.
By “the nature of the attacks” I interpret this to mean the source of the attacks, or the skillset required to carry out the attacks. I believe this employee was tenured based on their ability to:
Hack into the HR system
Successfully intercept the email from audit to the other individuals
Successfully impersonate the individuals the email from audit was sent to
Successfully identify the company president and other employees whose pay records were modified
Successfully eliminate evidence of the attack, indicated by two paycheck cycles going by before audit caught the error
Knowing which access to acquire in order to modify other payroll records
Taken holistically, this indicates an employee who knew the organization and the company’s network quite well. This employee knew basic network attack tactics, and the checks and balances that

You May Also Find These Documents Helpful

  • Powerful Essays

    Jft2 Task2 Part 2

    • 6878 Words
    • 21 Pages

    I have been asked to develop an action plan for Anne Ewers as she moves forward with the ongoing merger of the Utah Opera and the Utah Symphony. A balanced scorecard has been provided for both organizations, and this document will include analysis of the strengths and weaknesses of each organization and recommendations that Ms. Ewers can take to address the weaknesses. Additionally, I will analyze the four aspects (including strengths and weaknesses) of the scorecards for each company and finally identify one highly probable issue that could arise during the merger process in the areas of finance, human resources, and customer satisfaction. Recommendations will be made for how the merged company executives can mitigate each of these issues.…

    • 6878 Words
    • 21 Pages
    Powerful Essays
  • Powerful Essays

    Jft2 Task2

    • 1878 Words
    • 6 Pages

    Financial strengths of the opera are positive cash flow, cash reserves and assets as well as fund raising.…

    • 1878 Words
    • 6 Pages
    Powerful Essays
  • Better Essays

    Jft2 Task 2

    • 1445 Words
    • 4 Pages

    In analyzing the Utah Symphony and Utah Opera merger case study, it was obvious that many factors, finances, personalities, and even the community would be involved. The wide reaching affects of a merger between these two types of organizations was eye opening. At the time of the proposed merger, the Utah Opera had a stronger financial footing and was not in danger of closing. The Utah Symphony however, was sliding down a dangerous financial slope. The organizations were structured differently in their number of employees and financial compensation packages. These differences would prove challenging in a merger and could be the basis Bill Bailey would use to oppose such a merger.…

    • 1445 Words
    • 4 Pages
    Better Essays
  • Better Essays

    3. The failure to have a “competent person” that was specifically trained in trench safety.…

    • 797 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    St. Luke Case Summary

    • 62 Words
    • 1 Page

    However,they had few IT technical issues related to the network and other security related applications.Some of the issues related as :…

    • 62 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    EFT4 Task 5

    • 431 Words
    • 1 Page

    The concept of area is one that is difficult for some. In order to introduce the concept of surface area of a cube, they must first understand the difference between 2D and 3D objects. I will have objects that they see in everyday real life. I will bring in both an inflated and a picture of a beach ball as well as a few other examples. For a cube I will bring in a small box that forms a cube and a cut out of a cube. I will start by showing them the difference between the cubes. I will label each side of the 3D cube to demonstrate that the cube has six sides. I will clarify that all sides of a cube are equal. I will demonstrate this by measuring the box to solidify this concept for the students.…

    • 431 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    A1. Bill Bailey You will want to read through the theories of motivation found in chapter 8 of your textbook and select the theory that you believe would be most appropriate for Bill Bailey to use, taking into consideration his position on the merger. Now you have the opportunity to show that you can take a theory and show, via discussion, how one would implement each of the components of a theory to successfully utilize the theory in real life. To do this you will need to discuss specifically what Bill might do to implement each of the parts of the theory.…

    • 854 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Threats can be encounter by a network administrator. One can come from the administrator because even after training is complete, they still can make errors if they do not understand what they have learned. Human error is still a factor but from a different point of view. If an administrator had the training and his expectation was just to be an administrator and not deal with security, he may not be too concerned about the security aspect of the job. New administrators must clearly understand what position they are being hire for. Matthias did know he was going to have to take basic information security training; it was a surprise to him. Another thing that will affect a new employee is if the supervisor is not engaged in the training of the new employees. This also can be one of the…

    • 621 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Week 4 Assignment

    • 815 Words
    • 3 Pages

    Cybercriminals will never stop trying to compromise systems to obtain data. Organizations need to be aware of where they may be open to attacks, how attackers can enter their environment and what to do if (and when) an attack occurs. This test should be done as a surprise attack, since a hacker…

    • 815 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Target Breach Case Study

    • 346 Words
    • 2 Pages

    Greg Steinhafel made many bad decisions during his time, whether it is a botched expansion into Canada, or the mishaps before and after the data breach in 2013 (Reisinger, 2014). Before the hack occurred, Greg displayed the managerial planning function by putting into place data security measures six months before the hacking (Riley et al., 2014). He was preparing and putting into place measures…

    • 346 Words
    • 2 Pages
    Good Essays
  • Better Essays

    References: Bishop, M., Engle, S., Frincke, D. A., Gates, C., Greitzer, F. L., Peisert, S., & Whalen, S. (2010). A risk management approach to the 'insider threat '. Advances in Information Security, 49, 115-137. doi: http://dx.doi.org/10.1007/978-1-4419-7133-3…

    • 1208 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Gregg Shafel Case Summary

    • 422 Words
    • 2 Pages

    If I had the opportunity to advise Gregg Steinhafel and Target on actions to take to better handle a crisis like the cyber attack they experienced in 2013 I would focus on policy and training development. It seemed alarming to me that a CEO and his top executives disagreed on the best strategy and moved forward without reaching a consensus (Kinicki, 2016). Discrepancies between team members, especially at such a high level, would indicate to me an inconsistent or poorly established culture. Identifying the company's actual values and goals is imperative to then detail the ethical standards, proper course of action, appropriate communications, and resulting training (LeClair, 2000). Establishing these policies would lead to standard expectations in behavior and choices, and uniform culture (LeClair, 2000).…

    • 422 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Based on what you have learned in this chapter, describe several broad principles that could be applied in helping the individuals involved understand what went wrong in the following events. What suggestions could you make for remedying the problems involved?…

    • 1284 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Kessler International (2000, January 4). Employees, Not Hackers, Greatest Computer Threat. Retrieved December 13, 2003, from http://www.investigation.com/articles/library/2000articles/articles18.htm…

    • 4047 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    hero

    • 407 Words
    • 2 Pages

    2. How could the AVC have avoided the problems? How can they prevent them in the future?…

    • 407 Words
    • 2 Pages
    Satisfactory Essays