SlideShare a Scribd company logo
1 of 3
Case Project 2:
Read the following Case Study and answer the questions at the
end in paragraph form.
XYZ Security Auditors was hired to determine if he could gain
access to the network servers of a department store chain that
contained important proprietary information. The chief
information system officer (CISO) of the department store chain
boldly proclaimed that breaking into the servers by the auditor
would be “next to impossible” because the CISO “guarded his
secrets with his life.” The auditors were able to gather
information about the servers, such as the locations of the
servers in different areas and their IP addresses, along with
employee names and titles, their email addresses, phone
numbers, physical addresses, and other information.
The auditors also learned that the chief executive officer (CEO)
had a family member who had battled through lupus which does
not have a cure. As a result the CEO became involved in lupus
fundraising. By viewing the CEO’s entry on Facebook, he was
also able to determine his favorite restaurant and sports team.
The auditors then called the CEO and impersonated a fundraiser
from a lupus charity that the CEO had been involved with
before. They stated that those individuals who made donations
to this year’s charity event would be entered into a drawing for
prizes, which included tickets to a game played by the CEO’s
favorite sports team and gift certificates to area restaurants, one
of which was the CEO’s favorite.
The CEO was very interested in the fake charity event, the
auditors said that they would email him a PDF document that
contained more information. When the CEO received the
attachment he opened it, and a backdoor was installed on his
computer without his knowledge. Auditors were then able to
retrieve the company’s sensitive material. (When the CISO was
later informed of what happened, he called it “unfair”; the
auditors responded by saying, “A malicious hacker would not
think twice about using that information against you.”)
Now pretend that you are an employee of that company and that
it is your job to speak with the CISO and CEO about the
security breach.
What would you say to them? Why?
What recommendations would you make for training and
awareness for the company?
Write a letter to the CISO and CEO explaining the breach and
what steps are taken to prevent this from happening in the
future.
Case Project 3:
Choose one of the following threats, use the Internet to
research and answer the questions, and write a one-page paper
on your research: DoS Attacks, Arbitrary/Remote Code
Execution Attacks, Injection Attack Defenses, Zero-Day
Attacks, Buffer Overflow Attacks.
How do these attacks commonly occur?
How are the vulnerabilities discovered?
What are the defenses to protect against these attacks?
What are some of the most well-known attacks that have
occurred?

More Related Content

Similar to Case Project 2 Read the following Case Study and answer the que

10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories10 Fun Short IT Horror Stories
10 Fun Short IT Horror StoriesStu Sjouwerman
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?CBIZ, Inc.
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyRussell Publishing
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxaudeleypearl
 
The Seven Social Engineering Vices
The Seven Social Engineering VicesThe Seven Social Engineering Vices
The Seven Social Engineering VicesStu Sjouwerman
 
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxRead Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxleonorepour284
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleMike Gotta
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To IgnoreGross, Mendelsohn & Associates
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crimehomeworkping4
 
Risk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docxRisk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docxSUBHI7
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security Lokender Yadav
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacksCompany
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingmentAswani34
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docxsaivarun91
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetLexisNexis
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for studentsKandarp Shah
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceDulanja Liyanage
 

Similar to Case Project 2 Read the following Case Study and answer the que (20)

10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
 
The Seven Social Engineering Vices
The Seven Social Engineering VicesThe Seven Social Engineering Vices
The Seven Social Engineering Vices
 
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxRead Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docx
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary Tale
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Data breach
Data breachData breach
Data breach
 
Risk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docxRisk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docx
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacks
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 

More from ogglili

Changes in the Human Figure in ArtYou likely noticed that du
Changes in the Human Figure in ArtYou likely noticed that duChanges in the Human Figure in ArtYou likely noticed that du
Changes in the Human Figure in ArtYou likely noticed that duogglili
 
Changes in Health CareDescribe three important factors that co
Changes in Health CareDescribe three important factors that coChanges in Health CareDescribe three important factors that co
Changes in Health CareDescribe three important factors that coogglili
 
Change theory often centers on a communication model in which th
Change theory often centers on a communication model in which thChange theory often centers on a communication model in which th
Change theory often centers on a communication model in which thogglili
 
Changes of the Roaring TwentiesThis discussion forum has
Changes of the Roaring TwentiesThis discussion forum hasChanges of the Roaring TwentiesThis discussion forum has
Changes of the Roaring TwentiesThis discussion forum hasogglili
 
Change Management ReportItem 3Change Management ReportD
Change Management ReportItem 3Change Management ReportDChange Management ReportItem 3Change Management ReportD
Change Management ReportItem 3Change Management ReportDogglili
 
Change management plans define the process for identifying, appr
Change management plans define the process for identifying, apprChange management plans define the process for identifying, appr
Change management plans define the process for identifying, approgglili
 
Ch.11 Advertising Messages and Marketing Ch.12 Integrated Ma
Ch.11 Advertising Messages and Marketing Ch.12 Integrated MaCh.11 Advertising Messages and Marketing Ch.12 Integrated Ma
Ch.11 Advertising Messages and Marketing Ch.12 Integrated Maogglili
 
Ch. 1-Give an example of a real corporation and describe the goals o
Ch. 1-Give an example of a real corporation and describe the goals oCh. 1-Give an example of a real corporation and describe the goals o
Ch. 1-Give an example of a real corporation and describe the goals oogglili
 
Celina Furness  IntroductionIt is not a shock that st
Celina Furness  IntroductionIt is not a shock that stCelina Furness  IntroductionIt is not a shock that st
Celina Furness  IntroductionIt is not a shock that stogglili
 
Changes in the radiation balance in summer and winter We discuss
Changes in the radiation balance in summer and winter We discussChanges in the radiation balance in summer and winter We discuss
Changes in the radiation balance in summer and winter We discussogglili
 
Ceftriaxone uses, advantages and disadvantages.Yuritza Medin
Ceftriaxone uses, advantages and disadvantages.Yuritza MedinCeftriaxone uses, advantages and disadvantages.Yuritza Medin
Ceftriaxone uses, advantages and disadvantages.Yuritza Medinogglili
 
Change is considered by many as the new normal. Effective change man
Change is considered by many as the new normal. Effective change manChange is considered by many as the new normal. Effective change man
Change is considered by many as the new normal. Effective change manogglili
 
Change and Personal Reflection  Please respond to the following
Change and Personal Reflection  Please respond to the followingChange and Personal Reflection  Please respond to the following
Change and Personal Reflection  Please respond to the followingogglili
 
Change Control Management  Please respond to the following
Change Control Management  Please respond to the followingChange Control Management  Please respond to the following
Change Control Management  Please respond to the followingogglili
 
Chamberlain College of Nursing
Chamberlain College of Nursing                                    Chamberlain College of Nursing
Chamberlain College of Nursing ogglili
 
Change and Patch Management  Please respond to the following
Change and Patch Management  Please respond to the followingChange and Patch Management  Please respond to the following
Change and Patch Management  Please respond to the followingogglili
 
CAT response Locate a scholarly definition of the glass ceili
CAT response Locate a scholarly definition of the glass ceiliCAT response Locate a scholarly definition of the glass ceili
CAT response Locate a scholarly definition of the glass ceiliogglili
 
CC003 PERFORMANCE TASK ANALYSIS Please citate all information an
CC003 PERFORMANCE TASK ANALYSIS Please citate all information anCC003 PERFORMANCE TASK ANALYSIS Please citate all information an
CC003 PERFORMANCE TASK ANALYSIS Please citate all information anogglili
 
CasWhen reviewing the Healthy People 2020 objectives for Acc
CasWhen reviewing the Healthy People 2020 objectives for AccCasWhen reviewing the Healthy People 2020 objectives for Acc
CasWhen reviewing the Healthy People 2020 objectives for Accogglili
 
Catharine OwensGenetics versus Society Please respond to the
Catharine OwensGenetics versus Society Please respond to theCatharine OwensGenetics versus Society Please respond to the
Catharine OwensGenetics versus Society Please respond to theogglili
 

More from ogglili (20)

Changes in the Human Figure in ArtYou likely noticed that du
Changes in the Human Figure in ArtYou likely noticed that duChanges in the Human Figure in ArtYou likely noticed that du
Changes in the Human Figure in ArtYou likely noticed that du
 
Changes in Health CareDescribe three important factors that co
Changes in Health CareDescribe three important factors that coChanges in Health CareDescribe three important factors that co
Changes in Health CareDescribe three important factors that co
 
Change theory often centers on a communication model in which th
Change theory often centers on a communication model in which thChange theory often centers on a communication model in which th
Change theory often centers on a communication model in which th
 
Changes of the Roaring TwentiesThis discussion forum has
Changes of the Roaring TwentiesThis discussion forum hasChanges of the Roaring TwentiesThis discussion forum has
Changes of the Roaring TwentiesThis discussion forum has
 
Change Management ReportItem 3Change Management ReportD
Change Management ReportItem 3Change Management ReportDChange Management ReportItem 3Change Management ReportD
Change Management ReportItem 3Change Management ReportD
 
Change management plans define the process for identifying, appr
Change management plans define the process for identifying, apprChange management plans define the process for identifying, appr
Change management plans define the process for identifying, appr
 
Ch.11 Advertising Messages and Marketing Ch.12 Integrated Ma
Ch.11 Advertising Messages and Marketing Ch.12 Integrated MaCh.11 Advertising Messages and Marketing Ch.12 Integrated Ma
Ch.11 Advertising Messages and Marketing Ch.12 Integrated Ma
 
Ch. 1-Give an example of a real corporation and describe the goals o
Ch. 1-Give an example of a real corporation and describe the goals oCh. 1-Give an example of a real corporation and describe the goals o
Ch. 1-Give an example of a real corporation and describe the goals o
 
Celina Furness  IntroductionIt is not a shock that st
Celina Furness  IntroductionIt is not a shock that stCelina Furness  IntroductionIt is not a shock that st
Celina Furness  IntroductionIt is not a shock that st
 
Changes in the radiation balance in summer and winter We discuss
Changes in the radiation balance in summer and winter We discussChanges in the radiation balance in summer and winter We discuss
Changes in the radiation balance in summer and winter We discuss
 
Ceftriaxone uses, advantages and disadvantages.Yuritza Medin
Ceftriaxone uses, advantages and disadvantages.Yuritza MedinCeftriaxone uses, advantages and disadvantages.Yuritza Medin
Ceftriaxone uses, advantages and disadvantages.Yuritza Medin
 
Change is considered by many as the new normal. Effective change man
Change is considered by many as the new normal. Effective change manChange is considered by many as the new normal. Effective change man
Change is considered by many as the new normal. Effective change man
 
Change and Personal Reflection  Please respond to the following
Change and Personal Reflection  Please respond to the followingChange and Personal Reflection  Please respond to the following
Change and Personal Reflection  Please respond to the following
 
Change Control Management  Please respond to the following
Change Control Management  Please respond to the followingChange Control Management  Please respond to the following
Change Control Management  Please respond to the following
 
Chamberlain College of Nursing
Chamberlain College of Nursing                                    Chamberlain College of Nursing
Chamberlain College of Nursing
 
Change and Patch Management  Please respond to the following
Change and Patch Management  Please respond to the followingChange and Patch Management  Please respond to the following
Change and Patch Management  Please respond to the following
 
CAT response Locate a scholarly definition of the glass ceili
CAT response Locate a scholarly definition of the glass ceiliCAT response Locate a scholarly definition of the glass ceili
CAT response Locate a scholarly definition of the glass ceili
 
CC003 PERFORMANCE TASK ANALYSIS Please citate all information an
CC003 PERFORMANCE TASK ANALYSIS Please citate all information anCC003 PERFORMANCE TASK ANALYSIS Please citate all information an
CC003 PERFORMANCE TASK ANALYSIS Please citate all information an
 
CasWhen reviewing the Healthy People 2020 objectives for Acc
CasWhen reviewing the Healthy People 2020 objectives for AccCasWhen reviewing the Healthy People 2020 objectives for Acc
CasWhen reviewing the Healthy People 2020 objectives for Acc
 
Catharine OwensGenetics versus Society Please respond to the
Catharine OwensGenetics versus Society Please respond to theCatharine OwensGenetics versus Society Please respond to the
Catharine OwensGenetics versus Society Please respond to the
 

Recently uploaded

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 

Case Project 2 Read the following Case Study and answer the que

  • 1. Case Project 2: Read the following Case Study and answer the questions at the end in paragraph form. XYZ Security Auditors was hired to determine if he could gain access to the network servers of a department store chain that contained important proprietary information. The chief information system officer (CISO) of the department store chain boldly proclaimed that breaking into the servers by the auditor would be “next to impossible” because the CISO “guarded his secrets with his life.” The auditors were able to gather information about the servers, such as the locations of the servers in different areas and their IP addresses, along with employee names and titles, their email addresses, phone numbers, physical addresses, and other information. The auditors also learned that the chief executive officer (CEO) had a family member who had battled through lupus which does not have a cure. As a result the CEO became involved in lupus fundraising. By viewing the CEO’s entry on Facebook, he was also able to determine his favorite restaurant and sports team. The auditors then called the CEO and impersonated a fundraiser from a lupus charity that the CEO had been involved with before. They stated that those individuals who made donations to this year’s charity event would be entered into a drawing for prizes, which included tickets to a game played by the CEO’s favorite sports team and gift certificates to area restaurants, one of which was the CEO’s favorite. The CEO was very interested in the fake charity event, the auditors said that they would email him a PDF document that contained more information. When the CEO received the
  • 2. attachment he opened it, and a backdoor was installed on his computer without his knowledge. Auditors were then able to retrieve the company’s sensitive material. (When the CISO was later informed of what happened, he called it “unfair”; the auditors responded by saying, “A malicious hacker would not think twice about using that information against you.”) Now pretend that you are an employee of that company and that it is your job to speak with the CISO and CEO about the security breach. What would you say to them? Why? What recommendations would you make for training and awareness for the company? Write a letter to the CISO and CEO explaining the breach and what steps are taken to prevent this from happening in the future. Case Project 3: Choose one of the following threats, use the Internet to research and answer the questions, and write a one-page paper on your research: DoS Attacks, Arbitrary/Remote Code Execution Attacks, Injection Attack Defenses, Zero-Day Attacks, Buffer Overflow Attacks. How do these attacks commonly occur? How are the vulnerabilities discovered? What are the defenses to protect against these attacks?
  • 3. What are some of the most well-known attacks that have occurred?