• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
Case of a computer hack
 

Case of a computer hack

on

  • 277 views

 

Statistics

Views

Total Views
277
Views on SlideShare
277
Embed Views
0

Actions

Likes
0
Downloads
7
Comments
1

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

11 of 1 previous next

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
  • Free Download : http://gg.gg/114bb
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Case of a computer hack Case of a computer hack Presentation Transcript

    •  Stellar University  diverse urban university  multitude of different technologies in use  servers can be set up by any department or individual  everyone did not work together
    •  Several changes occurred prior to the breach  management shift in focus  department restructure  financial difficulties
    •  Suspicious folder  Upon deletion of initial folder  new folder was created  processor usage spiked  multiple DOS windows opened in succession
    •  Disconnect the system from the network  Notify security personnel  Conduct a more in depth check of system to determine scope and severity of compromise
    •  Password policy (6 characters)  1 hour lockout after 5 failed attempts to logon  All password change at next logon
    •  Post-hack exam was handled informally  Summary write-up (management)  Analysis of how to prevent in the future (system administrators)  Page or email notification  Temporary password policy made permanent  Invalid account identification
    •  Why didn’t the university implement any form of training for its personnel?
    •  Dhillon, G. (2007). Principles of information system security: Text and cases. Hoboken, NJ. John Wiley and Sons, Inc.