SlideShare a Scribd company logo
1 of 2
This week were hired consultants working on one of the many
attacks orchestrated by the infamous hacker Kevin Mitnick.
Here’s the extract from our textbook
Group Project: Breaking into Sprint’s Backbone Network
Read the assigned Case Study at the end of Chapter 2 of the
textbook. Work with the group designated by your Instructor as
if you are hired security consultants. When you have reached
consensus as a group, create a report to document the
following:
What procedures could help prevent a similar breach of
security at your organization?
Phishing is usually associated with identity theft, but could
this tactic also be used to gain information needed to
circumvent security controls?
Many social engineering breaches involve using what is
believed to be insider information to gain the trust of
individuals in an effort to obtain confidential information.
Test your ability to obtain what some might consider
“insider information” using a search engine to find contact or
other useful information referencing your organization.
Case Study: Breaking into Sprint’s Backbone Network
Many of the technical controls put into place can be
circumvented with a simple phone call. Recently, famed hacker
Kevin Mitnick demonstrated this by breaking into Sprint’s
backbone network. Rather than mounting a buffer overrun or
DoS attack, Mitnick simply placed a call posing as a Nortel
service engineer and persuaded the staff at Sprint to provide
login names and passwords to the company’s switches under the
guise that he needed them to perform remote maintenance on the
system. Once the password information had been obtained,
Mitnick was able to dial in and manipulate Sprint’s networks at
will. Many people believe this was an isolated incident, and
they would not fall for a similar act of social engineering, but
Mitnick gained notoriety during 1980s and 1990s by applying
similar techniques to computer networks around the world.
Mitnick’s more notorious crimes included accessing computer
systems at the Pentagon and the North American Aerospace
Defense Command (NORAD), and stealing software and source-
code from major computer manufacturers. Kevin Mitnick was
arrested six times, and has been networking as a consultant
specializing in social engineering techniques, having “gone
straight” after serving a five-year sentence for his most recent
crime. He even has authored several books regarding social
engineering including
The Art of Intrusion and The Art of Deception

More Related Content

Similar to This week were hired consultants working on one of the many atta

CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdfSuleiman55
 
A Cyber Security Review
A Cyber Security ReviewA Cyber Security Review
A Cyber Security ReviewSimon Moffatt
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookMargarete McGrath
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docxhealdkathaleen
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisIRJET Journal
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdfRamya Nellutla
 
Why is cybersecurity important for the entertainment industry
Why is cybersecurity important for the entertainment industry Why is cybersecurity important for the entertainment industry
Why is cybersecurity important for the entertainment industry Lisa Stockley
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...PECB
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxasharshaikh8
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011Felipe Prado
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialogiosrjce
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering BasicsLuke Rusten
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMeg Weber
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityBryCunal
 

Similar to This week were hired consultants working on one of the many atta (20)

cyber security.pdf
cyber security.pdfcyber security.pdf
cyber security.pdf
 
Cyber security
Cyber security Cyber security
Cyber security
 
CyberSecurity.pdf
CyberSecurity.pdfCyberSecurity.pdf
CyberSecurity.pdf
 
A Cyber Security Review
A Cyber Security ReviewA Cyber Security Review
A Cyber Security Review
 
Dell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbookDell Technologies Cyber Security playbook
Dell Technologies Cyber Security playbook
 
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN                   .docxRunning head CYBERSECURITY IN FINANCIAL DOMAIN                   .docx
Running head CYBERSECURITY IN FINANCIAL DOMAIN .docx
 
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive AnalysisEmerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
Emerging Threats and Trends in Cybersecurity: A Comprehensive Analysis
 
- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf- Social Engineering Unit- II Part- I.pdf
- Social Engineering Unit- II Part- I.pdf
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Why is cybersecurity important for the entertainment industry
Why is cybersecurity important for the entertainment industry Why is cybersecurity important for the entertainment industry
Why is cybersecurity important for the entertainment industry
 
What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...What are the top Cybersecurity priorities for state and local governments in ...
What are the top Cybersecurity priorities for state and local governments in ...
 
Ashar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptxAshar Shaikh A-84 SEMINAR.pptx
Ashar Shaikh A-84 SEMINAR.pptx
 
Secureview 2q 2011
Secureview 2q 2011Secureview 2q 2011
Secureview 2q 2011
 
M017657678
M017657678M017657678
M017657678
 
Automatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using DialogAutomatic Detection of Social Engineering Attacks Using Dialog
Automatic Detection of Social Engineering Attacks Using Dialog
 
Social Engineering Basics
Social Engineering BasicsSocial Engineering Basics
Social Engineering Basics
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber Security
 
Cyber security.pptx
Cyber security.pptxCyber security.pptx
Cyber security.pptx
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 

More from rochellwa9f

Write your two editorials in the space provided at the end of the as.docx
Write your two editorials in the space provided at the end of the as.docxWrite your two editorials in the space provided at the end of the as.docx
Write your two editorials in the space provided at the end of the as.docxrochellwa9f
 
Write two obituaries (minimum 250 words each) in remembrance of Pr.docx
Write two obituaries (minimum 250 words each) in remembrance of Pr.docxWrite two obituaries (minimum 250 words each) in remembrance of Pr.docx
Write two obituaries (minimum 250 words each) in remembrance of Pr.docxrochellwa9f
 
Write the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docxWrite the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docxrochellwa9f
 
Write two 350- to 700-word essays the first about one of the read.docx
Write two 350- to 700-word essays the first about one of the read.docxWrite two 350- to 700-word essays the first about one of the read.docx
Write two 350- to 700-word essays the first about one of the read.docxrochellwa9f
 
Write several paragraphs expressing your point of view on the advant.docx
Write several paragraphs expressing your point of view on the advant.docxWrite several paragraphs expressing your point of view on the advant.docx
Write several paragraphs expressing your point of view on the advant.docxrochellwa9f
 
Write two obituaries (minimum 250 words each) in remembrance of Pres.docx
Write two obituaries (minimum 250 words each) in remembrance of Pres.docxWrite two obituaries (minimum 250 words each) in remembrance of Pres.docx
Write two obituaries (minimum 250 words each) in remembrance of Pres.docxrochellwa9f
 
Write two complete paragraphs. Each should start a topic sentence an.docx
Write two complete paragraphs. Each should start a topic sentence an.docxWrite two complete paragraphs. Each should start a topic sentence an.docx
Write two complete paragraphs. Each should start a topic sentence an.docxrochellwa9f
 
Write one paragraph for each of the prompts.(200 words each)PROM.docx
Write one paragraph for each of the prompts.(200 words each)PROM.docxWrite one paragraph for each of the prompts.(200 words each)PROM.docx
Write one paragraph for each of the prompts.(200 words each)PROM.docxrochellwa9f
 
Write one paragraph for each of the following topics (The assignment.docx
Write one paragraph for each of the following topics (The assignment.docxWrite one paragraph for each of the following topics (The assignment.docx
Write one paragraph for each of the following topics (The assignment.docxrochellwa9f
 
Write several paragraphs ( 350 - 400 words) expreesing your point of.docx
Write several paragraphs ( 350 - 400 words) expreesing your point of.docxWrite several paragraphs ( 350 - 400 words) expreesing your point of.docx
Write several paragraphs ( 350 - 400 words) expreesing your point of.docxrochellwa9f
 
write paragraphs on needs and wants of accient communities and how t.docx
write paragraphs on needs and wants of accient communities and how t.docxwrite paragraphs on needs and wants of accient communities and how t.docx
write paragraphs on needs and wants of accient communities and how t.docxrochellwa9f
 
Write Presentthreedistinct informal logical fallacies you.docx
Write Presentthreedistinct informal logical fallacies you.docxWrite Presentthreedistinct informal logical fallacies you.docx
Write Presentthreedistinct informal logical fallacies you.docxrochellwa9f
 
Write just one small paragraph only ( like your opinion, do you agre.docx
Write just one small paragraph only ( like your opinion, do you agre.docxWrite just one small paragraph only ( like your opinion, do you agre.docx
Write just one small paragraph only ( like your opinion, do you agre.docxrochellwa9f
 
write one and half page word doc Critically think of a solutio.docx
write one and half page word doc Critically think of a solutio.docxwrite one and half page word doc Critically think of a solutio.docx
write one and half page word doc Critically think of a solutio.docxrochellwa9f
 
Write many paragraphs aboutGovernments should regulate and moni.docx
Write many paragraphs aboutGovernments should regulate and moni.docxWrite many paragraphs aboutGovernments should regulate and moni.docx
Write many paragraphs aboutGovernments should regulate and moni.docxrochellwa9f
 
write on your impressions of the film and how it documents a long go.docx
write on your impressions of the film and how it documents a long go.docxwrite on your impressions of the film and how it documents a long go.docx
write on your impressions of the film and how it documents a long go.docxrochellwa9f
 
Write critiques of the following two short essays. About 3-4 sentenc.docx
Write critiques of the following two short essays. About 3-4 sentenc.docxWrite critiques of the following two short essays. About 3-4 sentenc.docx
Write critiques of the following two short essays. About 3-4 sentenc.docxrochellwa9f
 
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docx
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docxWrite between 750 – 1,250 words (approximately 3 – 5 pages) using .docx
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docxrochellwa9f
 
write half page long, APA format.1. define and describe busine.docx
write half page long, APA format.1. define and describe busine.docxwrite half page long, APA format.1. define and describe busine.docx
write half page long, APA format.1. define and describe busine.docxrochellwa9f
 
Write at least 350 words in which you consider personality. In you.docx
Write at least 350 words in which you consider personality. In you.docxWrite at least 350 words in which you consider personality. In you.docx
Write at least 350 words in which you consider personality. In you.docxrochellwa9f
 

More from rochellwa9f (20)

Write your two editorials in the space provided at the end of the as.docx
Write your two editorials in the space provided at the end of the as.docxWrite your two editorials in the space provided at the end of the as.docx
Write your two editorials in the space provided at the end of the as.docx
 
Write two obituaries (minimum 250 words each) in remembrance of Pr.docx
Write two obituaries (minimum 250 words each) in remembrance of Pr.docxWrite two obituaries (minimum 250 words each) in remembrance of Pr.docx
Write two obituaries (minimum 250 words each) in remembrance of Pr.docx
 
Write the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docxWrite the questions followed by your answers.1.Using the web.docx
Write the questions followed by your answers.1.Using the web.docx
 
Write two 350- to 700-word essays the first about one of the read.docx
Write two 350- to 700-word essays the first about one of the read.docxWrite two 350- to 700-word essays the first about one of the read.docx
Write two 350- to 700-word essays the first about one of the read.docx
 
Write several paragraphs expressing your point of view on the advant.docx
Write several paragraphs expressing your point of view on the advant.docxWrite several paragraphs expressing your point of view on the advant.docx
Write several paragraphs expressing your point of view on the advant.docx
 
Write two obituaries (minimum 250 words each) in remembrance of Pres.docx
Write two obituaries (minimum 250 words each) in remembrance of Pres.docxWrite two obituaries (minimum 250 words each) in remembrance of Pres.docx
Write two obituaries (minimum 250 words each) in remembrance of Pres.docx
 
Write two complete paragraphs. Each should start a topic sentence an.docx
Write two complete paragraphs. Each should start a topic sentence an.docxWrite two complete paragraphs. Each should start a topic sentence an.docx
Write two complete paragraphs. Each should start a topic sentence an.docx
 
Write one paragraph for each of the prompts.(200 words each)PROM.docx
Write one paragraph for each of the prompts.(200 words each)PROM.docxWrite one paragraph for each of the prompts.(200 words each)PROM.docx
Write one paragraph for each of the prompts.(200 words each)PROM.docx
 
Write one paragraph for each of the following topics (The assignment.docx
Write one paragraph for each of the following topics (The assignment.docxWrite one paragraph for each of the following topics (The assignment.docx
Write one paragraph for each of the following topics (The assignment.docx
 
Write several paragraphs ( 350 - 400 words) expreesing your point of.docx
Write several paragraphs ( 350 - 400 words) expreesing your point of.docxWrite several paragraphs ( 350 - 400 words) expreesing your point of.docx
Write several paragraphs ( 350 - 400 words) expreesing your point of.docx
 
write paragraphs on needs and wants of accient communities and how t.docx
write paragraphs on needs and wants of accient communities and how t.docxwrite paragraphs on needs and wants of accient communities and how t.docx
write paragraphs on needs and wants of accient communities and how t.docx
 
Write Presentthreedistinct informal logical fallacies you.docx
Write Presentthreedistinct informal logical fallacies you.docxWrite Presentthreedistinct informal logical fallacies you.docx
Write Presentthreedistinct informal logical fallacies you.docx
 
Write just one small paragraph only ( like your opinion, do you agre.docx
Write just one small paragraph only ( like your opinion, do you agre.docxWrite just one small paragraph only ( like your opinion, do you agre.docx
Write just one small paragraph only ( like your opinion, do you agre.docx
 
write one and half page word doc Critically think of a solutio.docx
write one and half page word doc Critically think of a solutio.docxwrite one and half page word doc Critically think of a solutio.docx
write one and half page word doc Critically think of a solutio.docx
 
Write many paragraphs aboutGovernments should regulate and moni.docx
Write many paragraphs aboutGovernments should regulate and moni.docxWrite many paragraphs aboutGovernments should regulate and moni.docx
Write many paragraphs aboutGovernments should regulate and moni.docx
 
write on your impressions of the film and how it documents a long go.docx
write on your impressions of the film and how it documents a long go.docxwrite on your impressions of the film and how it documents a long go.docx
write on your impressions of the film and how it documents a long go.docx
 
Write critiques of the following two short essays. About 3-4 sentenc.docx
Write critiques of the following two short essays. About 3-4 sentenc.docxWrite critiques of the following two short essays. About 3-4 sentenc.docx
Write critiques of the following two short essays. About 3-4 sentenc.docx
 
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docx
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docxWrite between 750 – 1,250 words (approximately 3 – 5 pages) using .docx
Write between 750 – 1,250 words (approximately 3 – 5 pages) using .docx
 
write half page long, APA format.1. define and describe busine.docx
write half page long, APA format.1. define and describe busine.docxwrite half page long, APA format.1. define and describe busine.docx
write half page long, APA format.1. define and describe busine.docx
 
Write at least 350 words in which you consider personality. In you.docx
Write at least 350 words in which you consider personality. In you.docxWrite at least 350 words in which you consider personality. In you.docx
Write at least 350 words in which you consider personality. In you.docx
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 

Recently uploaded (20)

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 

This week were hired consultants working on one of the many atta

  • 1. This week were hired consultants working on one of the many attacks orchestrated by the infamous hacker Kevin Mitnick. Here’s the extract from our textbook Group Project: Breaking into Sprint’s Backbone Network Read the assigned Case Study at the end of Chapter 2 of the textbook. Work with the group designated by your Instructor as if you are hired security consultants. When you have reached consensus as a group, create a report to document the following: What procedures could help prevent a similar breach of security at your organization? Phishing is usually associated with identity theft, but could this tactic also be used to gain information needed to circumvent security controls? Many social engineering breaches involve using what is believed to be insider information to gain the trust of individuals in an effort to obtain confidential information. Test your ability to obtain what some might consider “insider information” using a search engine to find contact or other useful information referencing your organization. Case Study: Breaking into Sprint’s Backbone Network Many of the technical controls put into place can be circumvented with a simple phone call. Recently, famed hacker Kevin Mitnick demonstrated this by breaking into Sprint’s
  • 2. backbone network. Rather than mounting a buffer overrun or DoS attack, Mitnick simply placed a call posing as a Nortel service engineer and persuaded the staff at Sprint to provide login names and passwords to the company’s switches under the guise that he needed them to perform remote maintenance on the system. Once the password information had been obtained, Mitnick was able to dial in and manipulate Sprint’s networks at will. Many people believe this was an isolated incident, and they would not fall for a similar act of social engineering, but Mitnick gained notoriety during 1980s and 1990s by applying similar techniques to computer networks around the world. Mitnick’s more notorious crimes included accessing computer systems at the Pentagon and the North American Aerospace Defense Command (NORAD), and stealing software and source- code from major computer manufacturers. Kevin Mitnick was arrested six times, and has been networking as a consultant specializing in social engineering techniques, having “gone straight” after serving a five-year sentence for his most recent crime. He even has authored several books regarding social engineering including The Art of Intrusion and The Art of Deception