Preview

Man-In-Middle Attack Auditing

Better Essays
Open Document
Open Document
1680 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Man-In-Middle Attack Auditing
An auditor happen to discover an error in the human resource system that allowed an employee to hack into the company human resources record systems and change their base salary rate an received a pay raise on two paycheck. The employee was able to eavesdrop on the network using IP spoofing technique to hijack a trusted host on the network and hide their identity in the process. The technique allowed the hijacker to steal and alter sensitive data such as payroll records . The employee also monitor the email traffic about the incident, to use the man-in-middle attack an intercept the auditor email to several individuals at the company explaining what had happen. During the man-in-middle attack, he was able to impersonate the individuals the auditor had email and gain additional access to the financial records from the auditor. With the new permission from the auditor, the employee was able to lower the salaries of the company president and several other employees and transfer those differences into his paycheck.
Once the incident was discover, the auditor should follow the incident response plan and inform the incident response team of the breached in person
…show more content…
The hacker was able to intercept the email communication between the auditor and several individuals and create fake response with the auditor until he was able to gain additional permission to the financial records systems using the man-in-the-middle attack. The social engineering allows the hacker to persuade the auditor to give him the permission he did not originally have to the financial records by impersonating the other individuals, which allowed him to change the lower the salary of the company president and several other employees. Because the email system did not include any authentication protocol, the hacker was able to send the fake emails to the

You May Also Find These Documents Helpful

  • Powerful Essays

    mdaniels IS3110 week5quiz

    • 1535 Words
    • 6 Pages

    Develop incident response procedures – Procedures of how they will respond to any types of incidents.…

    • 1535 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Week 1 Acc556

    • 1151 Words
    • 5 Pages

    * U.S. governmental oversight of accounting fraud and abuse and its effect on the company Potential corruption schemes to be aware of in the company…

    • 1151 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    The theft of the records was caused by installing malware on the orgaznization's point of sales systems. These systems were used via third party vendors and had various security issues. This was the reason the hackers were able to break into their systems. The file that contained all the records started taking rounds in the market and was being sold in black. These records were then used to steal money from customer's accounts. There were several fake cards made and identity theft took place. The details were stolen from Faziio Mechanical. The malware was then sent to all the employees in an email. There was a possibility that Citadel malware, a program that steals passwords, was involved.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Bsbohs302B

    • 759 Words
    • 4 Pages

    11. Getting told by the HSR or by getting told of the incident from other workers and by inspecting the workplace regularly for issues…

    • 759 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    * Report incidents of security breaches in relation to incidents of malware and malicious code infection and any unusual related behavior to their immediate supervisor.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Clarity Project Paper

    • 546 Words
    • 3 Pages

    Second, the Audit Planning standards provide audit planning requirements for audit practitioners and firms; the auditor is required to device an appropriate mechanism for audit strategy and audit planning. Third, the Audit Engagement Supervision requirements have also been placed on the auditor that ensures the supervision of the audit work assigned to engagement teams. Fourth, auditors are also required to consider the materiality audit planning and performance. Fifth, auditors are also required to identify and assess any potential risks of material misstatement noted in financial statements, and include information gathering and assessment of risks through analysis of the gathered information, based on AS 12. Sixth, on the basis of AS 13, auditors are required to respond to any risks of potential material misstatement in financial statements via the general performance of the audit and conducting audit processes…

    • 546 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    chic paints limited

    • 10813 Words
    • 38 Pages

    6) Instances of misconduct will be investigated by AAT and appropriate action will be taken.…

    • 10813 Words
    • 38 Pages
    Powerful Essays
  • Powerful Essays

    trueblood

    • 874 Words
    • 4 Pages

    • If those charged with governance or management fail to give this matter the appropriate level of consideration or take the steps necessary under the circumstances, what considerations should the audit engagement team give to the implications of possible fraud or illegal acts on the conduct of the audit?…

    • 874 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Reporting, recording are the steps needed to ensure that any form of safeguarding or protection issues are dealt with immediately and correctly.…

    • 968 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Ambitious Payroll Manager

    • 610 Words
    • 3 Pages

    In this case, Dena Brenner used payroll schemes to be successful of committing fraud against International Agricultural Seed (IAS). Dena used a former employee, by reactivating this employee in the company’s payroll system and changing the account number to direct the payroll funds to go to. The bank account number she used was her own bank account and once the funds arrived she deactivated the employee in the company’s payroll system. According to our textbook on page 156, the employee that she used was a ghost employee, “referring to someone on the payroll who does not actually work for the victim company.”…

    • 610 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Safe Guarding 333

    • 2213 Words
    • 8 Pages

    Gather information to determine whether a criminal investigation should take place or immediate action is required.…

    • 2213 Words
    • 8 Pages
    Good Essays
  • Powerful Essays

    Ww1 Social Media Analysis

    • 1869 Words
    • 8 Pages

    • Making an initial assessment when an incident is reported and involving appropriate staff and external agencies as required…

    • 1869 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    These incidents must be reported immediately to the person in charge followed by communication to…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Dena Brenner Case Summary

    • 882 Words
    • 4 Pages

    In this case, Dena Brenner, a young woman uses her position as Payroll Manager of the International Agricultural Seed Company, to commit fraud by paying the company's payroll. What is interesting about this case is that the fraud was performed through of the use of a phantom employee that in this case was a former employee of the company. Another interesting thing is that she did not even know that person at all, she just chose him perhaps, because the company had terminated him long time ago. According to our textbook, the employee that she used was a ghost employee, “referring to someone on the payroll who does not actually work for the victim company.” The way to commit fraud was reactivating the personal information of the former employee in the payroll system and then, change the account number from personal bank of the employee by the number of personal account…

    • 882 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The test data technique is primarily designed to test the effectiveness of the internal control procedures which are incorporated in the client’s computer program. The objective of the test data technique is to determine whether the client’s computer programs can correctly handle valid and invalid conditions as they arise.…

    • 418 Words
    • 2 Pages
    Good Essays