Preview

VUT2 Task 1 Memo CheckList

Better Essays
Open Document
Open Document
1884 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
VUT2 Task 1 Memo CheckList
TO:
FROM:
SUBJECT:
DATE:
CC:

METHOD OF INTRUSION

After gathering much information from the supervisor who received the original email in question, as well as events having occurred with immediate subsequence, it seems highly evident that the method of intrusion was a result of spear phishing campaign, which typically involves sending a seemingly genuine email containing a seemingly genuine link. However, the email, while pretending to be from a friendly
(“recognizable” or “valid” or “authorized”) individual, but is far from that. The link is very malicious, designed to redirect (cause the web browser to go to an unintended/unwanted/ unknown/undesired web page) a person’s web browser to a webpage that is (phony and) malicious in nature, seeking only to execute commands that are for clandestine purposes. The typical outcome involves installation of some form of malware (keylogger, virus, trojan, browser hijacker, remote access backdoor, network and password sniffer, data extractor, ransom hijacker, and so much more) on the user’s computer (keeping in mind the user clicked on the link).
In this case, it is likely that a remote access Trojan with keylogger capabilities at minimum, with possible network sniffing capabilities, was installed that captured the keystrokes of the user, thus obtaining user name and password, but also trolled through network activity to obtain potential accounts (username and password) that would have higher level administrative permissions in case this particular user did not have such robust access. Simply stated, the user was a victim of a social engineering attack whereby the user clicks on a compromised (as in malicious in nature) link that can cause serious network, data and information security intrusion to the entire organization, and not just that particular computer, for the remote access and data trolling capabilities alone will cause the attacker to access any and all desired information first and decide later the sensitivity of



References: Goodchild, J. (2009, February 16). 9 Dirty Tricks: Social Engineers ' Favorite Pick-Up Lines. In csoonline.com. Retrieved May 3, 2015, from http://www.csoonline.com/article/2123756/fraud-prevention/9-dirty-tricks--socialengineers--favorite-pick-up-lines.html 8

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Phishing is when a person tries to trick either the customer or company that the email is legit and comes from a legitimate source and try to ask the customer for their account information.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Answer: 2846338 involves privilege elevation, Vulnerability in Microsoft Malware Protection Engine Could Allow Remote Code Execution, and is a high priority.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    straight to the point and with all pertinent information. Base on the opening of the Email it could…

    • 907 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Network eavesdropping, configuration file sniffing, attacker can read sensitive data out of memory or from local files…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    We will need to run intrusion detection software anti virus and view and asses logs to check for threats.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Email worms – A worm that can attach itself to a computer system when a user open’s an unknown attachment in an email.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    logs into root they will have full access to the system and could purposely or accidently run…

    • 521 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    In trying to clear the e-mail file, a flawed computer script was created that concatenated over 800 individual e-mail messages, which contained personal identifiable. At least nineteen of the e-mails reached their intended destination (Collmann & Cooper, 2007). Two members who received the email messages reported the incident to KP. Kaiser considered the breach was a significant incident due to the number of messages sent. As a result, the company created a crisis team to find the cause of the breach. The Kaiser crisis team notified its members and issued a press release three days after the breach.…

    • 1186 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Chapter 18 WOS review

    • 590 Words
    • 3 Pages

    You should beware of a person attempting to use your computer after you step away from it, a term referred to as which of the following?…

    • 590 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    student

    • 795 Words
    • 3 Pages

    USER DOMAIN: sharing passwords. Not protecting your computer properly or sharing access with other individuals will allow threats from a user end.…

    • 795 Words
    • 3 Pages
    Good Essays
  • Good Essays

    It Infrastructure

    • 342 Words
    • 2 Pages

    The User Domain is comprised of individuals that are often not aware of the tricks of attackers. For example, networks usually have strong passwords that one must know in order to gain access to the Internet. Nevertheless, social engineers can persuade individuals to give out personal information such as passwords and other types of private information. By giving out such information can cause computer viruses and infections executed by social engineers. Another way in which the User Domain can fall susceptible to attackers is the activities carried out by individuals on the computer. Visiting dangerous websites, downloading malicious files, and installing infected programs all give invitations to attackers to hack computer systems. In addition, inserting infected jump drives into computers can cause an entire computer network to become infected.…

    • 342 Words
    • 2 Pages
    Good Essays
  • Good Essays

    caused injury to web site or owner. Being that a majority of the internet is public access, it can be…

    • 365 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    constitution

    • 401 Words
    • 2 Pages

    People that collect or share information about you Internet service providers or employers that track the pages you visit Malicious software that tracks your keystrokes in exchange for free smileys Surveillance by secret agents People standing behind you that collect or share information about you Internet service providers or employers that track the pages you visit Malicious software that tracks your keystrokes in exchange for free smileys Surveillance by secret…

    • 401 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Spam

    • 2202 Words
    • 9 Pages

    Lastly, we investigate the feasibility of applying a supervised machine learning method to identify spammers…

    • 2202 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    INTERNET SECURITY

    • 1356 Words
    • 4 Pages

    The technology age has changed since the days when I was a youth. Growing up as a poor child, living in the rural areas of an impoverished city, technology was the last thing we were worried about staying current on. I couldn’t even fathom the day that I would ever be able to afford to purchase my very first computer. As I matured into an adult, my life would lead me to joining the military and it was there that I had the opportunity to interact with computers. In this present world, it is not uncommon to see a computer in almost every household. Most Americans would be lost if you ever told them that they would have to live without the Internet. Long before we had the Internet, we still use to suffer from the attacks of outside attacks. These so called attacks to your computer can come in many different forms and wreak havoc on your system. Some of the following attacks can be grouped into categories such as viruses, botnets, worms, and Trojan horses.…

    • 1356 Words
    • 4 Pages
    Good Essays