Case of a computer hack

483 views
371 views

Published on

Published in: Technology
1 Comment
0 Likes
Statistics
Notes
  • Free Download : http://gg.gg/114bb
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total views
483
On SlideShare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
14
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Case of a computer hack

  1. 1.  Stellar University  diverse urban university  multitude of different technologies in use  servers can be set up by any department or individual  everyone did not work together
  2. 2.  Several changes occurred prior to the breach  management shift in focus  department restructure  financial difficulties
  3. 3.  Suspicious folder  Upon deletion of initial folder  new folder was created  processor usage spiked  multiple DOS windows opened in succession
  4. 4.  Disconnect the system from the network  Notify security personnel  Conduct a more in depth check of system to determine scope and severity of compromise
  5. 5.  Password policy (6 characters)  1 hour lockout after 5 failed attempts to logon  All password change at next logon
  6. 6.  Post-hack exam was handled informally  Summary write-up (management)  Analysis of how to prevent in the future (system administrators)  Page or email notification  Temporary password policy made permanent  Invalid account identification
  7. 7.  Why didn’t the university implement any form of training for its personnel?
  8. 8.  Dhillon, G. (2007). Principles of information system security: Text and cases. Hoboken, NJ. John Wiley and Sons, Inc.

×