SlideShare a Scribd company logo
1 of 1
Download to read offline
Given below is an issue that you have identified as an issue in a retail company: Assume the
organization is a typical retailer with a corporate network installation. Store networks are
connected to the backend servers via the POS machines. Network administrators use Telnet to
access the network and network passwords never expire. Administrators should only access the
network internally. Complete a risk qualification for this organization and identify the following:
Vulnerability: Threats (threat actor and activity): Severity: Likelihood: Sensitivity:
Solution
According to the above corporate network infrastructure, the following risks can be found in
terms of security & Risk Management:
Vulnerability: As authentication credentials and all the commands are sent to the network device
in cleartext format, it could allow for eavesdropping or manipulation of data in transit between
the user and the network device.
Threat: It's a kind of internal abuse.A savvy insider could interpret and steal sensitive
information or credentials of an authorized administrator as it traverses the network.
Severity: Payment card information traverses these n/w devices between the point of sale system
(in the stores) and back-end servers (corporate data centers). If they can get access to the n/w
device, they can have the full control or access to view any of this sensitive data.
Likelihood: Although it is possible to view any data in a Telnet session, it is not trivial to sniff
traffic on a switched network. The attacker would need to be in the path of the communication
between the network device and the administrator, or the attacker would need to exploit a
vulnerability on another network device in the path. Additionally, the attacker would need some
knowledge of the network device technology in order to capture and view data traversing the
network device after gaining access. The probability of the attacker gaining access once the
credentials have been stolen is further reduced by the use of Access Control Lists (ACLs) on the
network device to limit Telnet connections to certain source IP addresses used by network
administrator’s workstations. Given that the password never expires and is therefore likely not
ever to be changed, the chance of interception and successful exploitation increases over time.
The attack vector with the most the highest probability of success would be from the store
network.
Sensitivity: A breach of this sort would require the organization to publicly report the incident,
costing the company over $500,000 directly in the form of fines and lawsuits and also indirectly
when approximately 10% of clients switch their business to a competitor.

More Related Content

Similar to Given below is an issue that you have identified as an issue in a ret.pdf

CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
segughana
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
Kristin Helgeson
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
edgar6wallace88877
 

Similar to Given below is an issue that you have identified as an issue in a ret.pdf (20)

Security Operation Center Fundamental
Security Operation Center FundamentalSecurity Operation Center Fundamental
Security Operation Center Fundamental
 
Wfh remote access tips
Wfh   remote access tipsWfh   remote access tips
Wfh remote access tips
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
Comptia security+ (sy0-601) exam dumps 2022
Comptia security+ (sy0-601) exam dumps 2022Comptia security+ (sy0-601) exam dumps 2022
Comptia security+ (sy0-601) exam dumps 2022
 
Top 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptxTop 25 SOC Analyst interview questions that You Should Know.pptx
Top 25 SOC Analyst interview questions that You Should Know.pptx
 
E-commerce Security
E-commerce SecurityE-commerce Security
E-commerce Security
 
Domain 4 of CEH V11 Network and Perimeter Hacking.pptx
Domain 4 of CEH V11 Network and Perimeter Hacking.pptxDomain 4 of CEH V11 Network and Perimeter Hacking.pptx
Domain 4 of CEH V11 Network and Perimeter Hacking.pptx
 
Security challenges of cloud computing
Security challenges of cloud computingSecurity challenges of cloud computing
Security challenges of cloud computing
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
CTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-BorenCTO-CyberSecurityForum-2010-Brisson-Boren
CTO-CyberSecurityForum-2010-Brisson-Boren
 
cybersecurity
cybersecuritycybersecurity
cybersecurity
 
Discover How Your Company's Firewall is Susceptible to Hacking.pdf
Discover How Your Company's Firewall is Susceptible to Hacking.pdfDiscover How Your Company's Firewall is Susceptible to Hacking.pdf
Discover How Your Company's Firewall is Susceptible to Hacking.pdf
 
Security issue in e commerce
Security issue in e commerceSecurity issue in e commerce
Security issue in e commerce
 
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary ReadingThe Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
The Cyber Kill Chain. 7 Stages of Cyber Kill Chain Supplementary Reading
 
GBS - Prevent network security fires
GBS - Prevent network security firesGBS - Prevent network security fires
GBS - Prevent network security fires
 
Physical/Network Access Control
Physical/Network Access ControlPhysical/Network Access Control
Physical/Network Access Control
 
The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking The Basics of Protecting Against Computer Hacking
The Basics of Protecting Against Computer Hacking
 
Network and web security
Network and web securityNetwork and web security
Network and web security
 
Advanced Metering Infrastructure Security Test.pptx
Advanced Metering Infrastructure Security Test.pptxAdvanced Metering Infrastructure Security Test.pptx
Advanced Metering Infrastructure Security Test.pptx
 
Security and Ethical Challenges Contributors Kim Wanders.docx
Security and Ethical Challenges  Contributors Kim Wanders.docxSecurity and Ethical Challenges  Contributors Kim Wanders.docx
Security and Ethical Challenges Contributors Kim Wanders.docx
 

More from birajdar2

javaFix in the program belowhandle incomplete data for text fil.pdf
javaFix in the program belowhandle incomplete data for text fil.pdfjavaFix in the program belowhandle incomplete data for text fil.pdf
javaFix in the program belowhandle incomplete data for text fil.pdf
birajdar2
 
In the class we extensively discussed a generic singly linked list i.pdf
In the class we extensively discussed a generic singly linked list i.pdfIn the class we extensively discussed a generic singly linked list i.pdf
In the class we extensively discussed a generic singly linked list i.pdf
birajdar2
 
How do hydrophobic and hydrophilic hormones differ in their speeds a.pdf
How do hydrophobic and hydrophilic hormones differ in their speeds a.pdfHow do hydrophobic and hydrophilic hormones differ in their speeds a.pdf
How do hydrophobic and hydrophilic hormones differ in their speeds a.pdf
birajdar2
 
21. What is the relationship between the maximum size of aggregates a.pdf
21. What is the relationship between the maximum size of aggregates a.pdf21. What is the relationship between the maximum size of aggregates a.pdf
21. What is the relationship between the maximum size of aggregates a.pdf
birajdar2
 
What are the five stages of team development Describe each stage an.pdf
What are the five stages of team development Describe each stage an.pdfWhat are the five stages of team development Describe each stage an.pdf
What are the five stages of team development Describe each stage an.pdf
birajdar2
 

More from birajdar2 (20)

public static ArrayListInteger doArrayListSearchSmallest(int nu.pdf
public static ArrayListInteger doArrayListSearchSmallest(int nu.pdfpublic static ArrayListInteger doArrayListSearchSmallest(int nu.pdf
public static ArrayListInteger doArrayListSearchSmallest(int nu.pdf
 
Project selection methods and the project portfolio play an importan.pdf
Project selection methods and the project portfolio play an importan.pdfProject selection methods and the project portfolio play an importan.pdf
Project selection methods and the project portfolio play an importan.pdf
 
javaFix in the program belowhandle incomplete data for text fil.pdf
javaFix in the program belowhandle incomplete data for text fil.pdfjavaFix in the program belowhandle incomplete data for text fil.pdf
javaFix in the program belowhandle incomplete data for text fil.pdf
 
James can row 14 km downstream in a river in 2 hours. He takes 7 hou.pdf
James can row 14 km downstream in a river in 2 hours. He takes 7 hou.pdfJames can row 14 km downstream in a river in 2 hours. He takes 7 hou.pdf
James can row 14 km downstream in a river in 2 hours. He takes 7 hou.pdf
 
In the class we extensively discussed a generic singly linked list i.pdf
In the class we extensively discussed a generic singly linked list i.pdfIn the class we extensively discussed a generic singly linked list i.pdf
In the class we extensively discussed a generic singly linked list i.pdf
 
How do hydrophobic and hydrophilic hormones differ in their speeds a.pdf
How do hydrophobic and hydrophilic hormones differ in their speeds a.pdfHow do hydrophobic and hydrophilic hormones differ in their speeds a.pdf
How do hydrophobic and hydrophilic hormones differ in their speeds a.pdf
 
Explain Aquinas 5 proofs of God, being sure to identify the Aris.pdf
Explain Aquinas 5 proofs of God, being sure to identify the Aris.pdfExplain Aquinas 5 proofs of God, being sure to identify the Aris.pdf
Explain Aquinas 5 proofs of God, being sure to identify the Aris.pdf
 
Exercise 7. Show that if C(0) (the punctured plane) and U C are conf.pdf
Exercise 7. Show that if C(0) (the punctured plane) and U C are conf.pdfExercise 7. Show that if C(0) (the punctured plane) and U C are conf.pdf
Exercise 7. Show that if C(0) (the punctured plane) and U C are conf.pdf
 
Consider the following segment table What are the physical addresse.pdf
Consider the following segment table  What are the physical addresse.pdfConsider the following segment table  What are the physical addresse.pdf
Consider the following segment table What are the physical addresse.pdf
 
Can you explain the movement of ions and ion channel activity during.pdf
Can you explain the movement of ions and ion channel activity during.pdfCan you explain the movement of ions and ion channel activity during.pdf
Can you explain the movement of ions and ion channel activity during.pdf
 
Calculate the implied stock price assuming an EBITDA multiple of 11..pdf
Calculate the implied stock price assuming an EBITDA multiple of 11..pdfCalculate the implied stock price assuming an EBITDA multiple of 11..pdf
Calculate the implied stock price assuming an EBITDA multiple of 11..pdf
 
Below is the graph of a polynomial function f with real coefficients.pdf
Below is the graph of a polynomial function f with real coefficients.pdfBelow is the graph of a polynomial function f with real coefficients.pdf
Below is the graph of a polynomial function f with real coefficients.pdf
 
Are higher than average sea surface temperatures associated with a g.pdf
Are higher than average sea surface temperatures associated with a g.pdfAre higher than average sea surface temperatures associated with a g.pdf
Are higher than average sea surface temperatures associated with a g.pdf
 
A table of values of an increasing function F is shown. Use the table.pdf
A table of values of an increasing function F is shown. Use the table.pdfA table of values of an increasing function F is shown. Use the table.pdf
A table of values of an increasing function F is shown. Use the table.pdf
 
A polygenic trait is determined by a single gene with many different.pdf
A polygenic trait is determined by a single gene with many different.pdfA polygenic trait is determined by a single gene with many different.pdf
A polygenic trait is determined by a single gene with many different.pdf
 
4. Phil is conducting a seed germination experiment. He places 3 gro.pdf
4. Phil is conducting a seed germination experiment. He places 3 gro.pdf4. Phil is conducting a seed germination experiment. He places 3 gro.pdf
4. Phil is conducting a seed germination experiment. He places 3 gro.pdf
 
21. What is the relationship between the maximum size of aggregates a.pdf
21. What is the relationship between the maximum size of aggregates a.pdf21. What is the relationship between the maximum size of aggregates a.pdf
21. What is the relationship between the maximum size of aggregates a.pdf
 
Which of the following are organizer molecules in the avian PMZ is a.pdf
Which of the following are organizer molecules in the avian PMZ is a.pdfWhich of the following are organizer molecules in the avian PMZ is a.pdf
Which of the following are organizer molecules in the avian PMZ is a.pdf
 
What are the five stages of team development Describe each stage an.pdf
What are the five stages of team development Describe each stage an.pdfWhat are the five stages of team development Describe each stage an.pdf
What are the five stages of team development Describe each stage an.pdf
 
What kinds of molecules can be used as metabolic fuel to produce ATP.pdf
What kinds of molecules can be used as metabolic fuel to produce ATP.pdfWhat kinds of molecules can be used as metabolic fuel to produce ATP.pdf
What kinds of molecules can be used as metabolic fuel to produce ATP.pdf
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 

Given below is an issue that you have identified as an issue in a ret.pdf

  • 1. Given below is an issue that you have identified as an issue in a retail company: Assume the organization is a typical retailer with a corporate network installation. Store networks are connected to the backend servers via the POS machines. Network administrators use Telnet to access the network and network passwords never expire. Administrators should only access the network internally. Complete a risk qualification for this organization and identify the following: Vulnerability: Threats (threat actor and activity): Severity: Likelihood: Sensitivity: Solution According to the above corporate network infrastructure, the following risks can be found in terms of security & Risk Management: Vulnerability: As authentication credentials and all the commands are sent to the network device in cleartext format, it could allow for eavesdropping or manipulation of data in transit between the user and the network device. Threat: It's a kind of internal abuse.A savvy insider could interpret and steal sensitive information or credentials of an authorized administrator as it traverses the network. Severity: Payment card information traverses these n/w devices between the point of sale system (in the stores) and back-end servers (corporate data centers). If they can get access to the n/w device, they can have the full control or access to view any of this sensitive data. Likelihood: Although it is possible to view any data in a Telnet session, it is not trivial to sniff traffic on a switched network. The attacker would need to be in the path of the communication between the network device and the administrator, or the attacker would need to exploit a vulnerability on another network device in the path. Additionally, the attacker would need some knowledge of the network device technology in order to capture and view data traversing the network device after gaining access. The probability of the attacker gaining access once the credentials have been stolen is further reduced by the use of Access Control Lists (ACLs) on the network device to limit Telnet connections to certain source IP addresses used by network administrator’s workstations. Given that the password never expires and is therefore likely not ever to be changed, the chance of interception and successful exploitation increases over time. The attack vector with the most the highest probability of success would be from the store network. Sensitivity: A breach of this sort would require the organization to publicly report the incident, costing the company over $500,000 directly in the form of fines and lawsuits and also indirectly when approximately 10% of clients switch their business to a competitor.