SlideShare a Scribd company logo
Case Project 2:
Read the following Case Study and answer the questions at the
end in paragraph form.
XYZ Security Auditors was hired to determine if he could gain
access to the network servers of a department store chain that
contained important proprietary information. The chief
information system officer (CISO) of the department store chain
boldly proclaimed that breaking into the servers by the auditor
would be “next to impossible” because the CISO “guarded his
secrets with his life.” The auditors were able to gather
information about the servers, such as the locations of the
servers in different areas and their IP addresses, along with
employee names and titles, their email addresses, phone
numbers, physical addresses, and other information.
The auditors also learned that the chief executive officer (CEO)
had a family member who had battled through lupus which does
not have a cure. As a result the CEO became involved in lupus
fundraising. By viewing the CEO’s entry on Facebook, he was
also able to determine his favorite restaurant and sports team.
The auditors then called the CEO and impersonated a fundraiser
from a lupus charity that the CEO had been involved with
before. They stated that those individuals who made donations
to this year’s charity event would be entered into a drawing for
prizes, which included tickets to a game played by the CEO’s
favorite sports team and gift certificates to area restaurants, one
of which was the CEO’s favorite.
The CEO was very interested in the fake charity event, the
auditors said that they would email him a PDF document that
contained more information. When the CEO received the
attachment he opened it, and a backdoor was installed on his
computer without his knowledge. Auditors were then able to
retrieve the company’s sensitive material. (When the CISO was
later informed of what happened, he called it “unfair”; the
auditors responded by saying, “A malicious hacker would not
think twice about using that information against you.”)
Now pretend that you are an employee of that company and that
it is your job to speak with the CISO and CEO about the
security breach.
What would you say to them? Why?
What recommendations would you make for training and
awareness for the company?
Write a letter to the CISO and CEO explaining the breach and
what steps are taken to prevent this from happening in the
future.
Case Project 3:
Choose one of the following threats, use the Internet to
research and answer the questions, and write a one-page paper
on your research: DoS Attacks, Arbitrary/Remote Code
Execution Attacks, Injection Attack Defenses, Zero-Day
Attacks, Buffer Overflow Attacks.
How do these attacks commonly occur?
How are the vulnerabilities discovered?
What are the defenses to protect against these attacks?
What are some of the most well-known attacks that have
occurred?

More Related Content

Similar to Case Project 2 Read the following Case Study and answer the que

Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
Russell Publishing
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
audeleypearl
 
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxRead Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docx
leonorepour284
 
Risk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docxRisk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docx
SUBHI7
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
ssuser454af01
 

Similar to Case Project 2 Read the following Case Study and answer the que (20)

10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories10 Fun Short IT Horror Stories
10 Fun Short IT Horror Stories
 
Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?Cybersecurity: How Safe Is Your Organization?
Cybersecurity: How Safe Is Your Organization?
 
Airport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthyAirport IT&T 2013 John McCarthy
Airport IT&T 2013 John McCarthy
 
Research Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docxResearch Paper Sentence OutlineResearch Question How e-commer.docx
Research Paper Sentence OutlineResearch Question How e-commer.docx
 
The Seven Social Engineering Vices
The Seven Social Engineering VicesThe Seven Social Engineering Vices
The Seven Social Engineering Vices
 
Read Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docxRead Ethics in IT. Information technology is the engine that make.docx
Read Ethics in IT. Information technology is the engine that make.docx
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary Tale
 
5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore5 Technology Trends Construction Contractors Can't Afford To Ignore
5 Technology Trends Construction Contractors Can't Afford To Ignore
 
87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime87161911 selected-case-studies-on-cyber-crime
87161911 selected-case-studies-on-cyber-crime
 
Data breach
Data breachData breach
Data breach
 
Risk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docxRisk Analysis PaperMilestone1.docx
Risk Analysis PaperMilestone1.docx
 
Exploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docxExploring new mobile and cloud platforms without a governance .docx
Exploring new mobile and cloud platforms without a governance .docx
 
Ethical Hacking & Network Security
Ethical Hacking & Network Security Ethical Hacking & Network Security
Ethical Hacking & Network Security
 
How to protect your company from cyber attacks
How to protect your company from cyber attacksHow to protect your company from cyber attacks
How to protect your company from cyber attacks
 
Edu 03 assingment
Edu 03 assingmentEdu 03 assingment
Edu 03 assingment
 
Cyber security.docx
Cyber security.docxCyber security.docx
Cyber security.docx
 
Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013
 
Hacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder TargetHacker Defense: How to Make Your Law Firm a Harder Target
Hacker Defense: How to Make Your Law Firm a Harder Target
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 

More from ogglili

Changes in the Human Figure in ArtYou likely noticed that du
Changes in the Human Figure in ArtYou likely noticed that duChanges in the Human Figure in ArtYou likely noticed that du
Changes in the Human Figure in ArtYou likely noticed that du
ogglili
 
Change Management ReportItem 3Change Management ReportD
Change Management ReportItem 3Change Management ReportDChange Management ReportItem 3Change Management ReportD
Change Management ReportItem 3Change Management ReportD
ogglili
 
Celina Furness  IntroductionIt is not a shock that st
Celina Furness  IntroductionIt is not a shock that stCelina Furness  IntroductionIt is not a shock that st
Celina Furness  IntroductionIt is not a shock that st
ogglili
 
Changes in the radiation balance in summer and winter We discuss
Changes in the radiation balance in summer and winter We discussChanges in the radiation balance in summer and winter We discuss
Changes in the radiation balance in summer and winter We discuss
ogglili
 
Ceftriaxone uses, advantages and disadvantages.Yuritza Medin
Ceftriaxone uses, advantages and disadvantages.Yuritza MedinCeftriaxone uses, advantages and disadvantages.Yuritza Medin
Ceftriaxone uses, advantages and disadvantages.Yuritza Medin
ogglili
 
Change is considered by many as the new normal. Effective change man
Change is considered by many as the new normal. Effective change manChange is considered by many as the new normal. Effective change man
Change is considered by many as the new normal. Effective change man
ogglili
 
CAT response Locate a scholarly definition of the glass ceili
CAT response Locate a scholarly definition of the glass ceiliCAT response Locate a scholarly definition of the glass ceili
CAT response Locate a scholarly definition of the glass ceili
ogglili
 
CC003 PERFORMANCE TASK ANALYSIS Please citate all information an
CC003 PERFORMANCE TASK ANALYSIS Please citate all information anCC003 PERFORMANCE TASK ANALYSIS Please citate all information an
CC003 PERFORMANCE TASK ANALYSIS Please citate all information an
ogglili
 
CasWhen reviewing the Healthy People 2020 objectives for Acc
CasWhen reviewing the Healthy People 2020 objectives for AccCasWhen reviewing the Healthy People 2020 objectives for Acc
CasWhen reviewing the Healthy People 2020 objectives for Acc
ogglili
 

More from ogglili (20)

Changes in the Human Figure in ArtYou likely noticed that du
Changes in the Human Figure in ArtYou likely noticed that duChanges in the Human Figure in ArtYou likely noticed that du
Changes in the Human Figure in ArtYou likely noticed that du
 
Changes in Health CareDescribe three important factors that co
Changes in Health CareDescribe three important factors that coChanges in Health CareDescribe three important factors that co
Changes in Health CareDescribe three important factors that co
 
Change theory often centers on a communication model in which th
Change theory often centers on a communication model in which thChange theory often centers on a communication model in which th
Change theory often centers on a communication model in which th
 
Changes of the Roaring TwentiesThis discussion forum has
Changes of the Roaring TwentiesThis discussion forum hasChanges of the Roaring TwentiesThis discussion forum has
Changes of the Roaring TwentiesThis discussion forum has
 
Change Management ReportItem 3Change Management ReportD
Change Management ReportItem 3Change Management ReportDChange Management ReportItem 3Change Management ReportD
Change Management ReportItem 3Change Management ReportD
 
Change management plans define the process for identifying, appr
Change management plans define the process for identifying, apprChange management plans define the process for identifying, appr
Change management plans define the process for identifying, appr
 
Ch.11 Advertising Messages and Marketing Ch.12 Integrated Ma
Ch.11 Advertising Messages and Marketing Ch.12 Integrated MaCh.11 Advertising Messages and Marketing Ch.12 Integrated Ma
Ch.11 Advertising Messages and Marketing Ch.12 Integrated Ma
 
Ch. 1-Give an example of a real corporation and describe the goals o
Ch. 1-Give an example of a real corporation and describe the goals oCh. 1-Give an example of a real corporation and describe the goals o
Ch. 1-Give an example of a real corporation and describe the goals o
 
Celina Furness  IntroductionIt is not a shock that st
Celina Furness  IntroductionIt is not a shock that stCelina Furness  IntroductionIt is not a shock that st
Celina Furness  IntroductionIt is not a shock that st
 
Changes in the radiation balance in summer and winter We discuss
Changes in the radiation balance in summer and winter We discussChanges in the radiation balance in summer and winter We discuss
Changes in the radiation balance in summer and winter We discuss
 
Ceftriaxone uses, advantages and disadvantages.Yuritza Medin
Ceftriaxone uses, advantages and disadvantages.Yuritza MedinCeftriaxone uses, advantages and disadvantages.Yuritza Medin
Ceftriaxone uses, advantages and disadvantages.Yuritza Medin
 
Change is considered by many as the new normal. Effective change man
Change is considered by many as the new normal. Effective change manChange is considered by many as the new normal. Effective change man
Change is considered by many as the new normal. Effective change man
 
Change and Personal Reflection  Please respond to the following
Change and Personal Reflection  Please respond to the followingChange and Personal Reflection  Please respond to the following
Change and Personal Reflection  Please respond to the following
 
Change Control Management  Please respond to the following
Change Control Management  Please respond to the followingChange Control Management  Please respond to the following
Change Control Management  Please respond to the following
 
Chamberlain College of Nursing
Chamberlain College of Nursing                                    Chamberlain College of Nursing
Chamberlain College of Nursing
 
Change and Patch Management  Please respond to the following
Change and Patch Management  Please respond to the followingChange and Patch Management  Please respond to the following
Change and Patch Management  Please respond to the following
 
CAT response Locate a scholarly definition of the glass ceili
CAT response Locate a scholarly definition of the glass ceiliCAT response Locate a scholarly definition of the glass ceili
CAT response Locate a scholarly definition of the glass ceili
 
CC003 PERFORMANCE TASK ANALYSIS Please citate all information an
CC003 PERFORMANCE TASK ANALYSIS Please citate all information anCC003 PERFORMANCE TASK ANALYSIS Please citate all information an
CC003 PERFORMANCE TASK ANALYSIS Please citate all information an
 
CasWhen reviewing the Healthy People 2020 objectives for Acc
CasWhen reviewing the Healthy People 2020 objectives for AccCasWhen reviewing the Healthy People 2020 objectives for Acc
CasWhen reviewing the Healthy People 2020 objectives for Acc
 
Catharine OwensGenetics versus Society Please respond to the
Catharine OwensGenetics versus Society Please respond to theCatharine OwensGenetics versus Society Please respond to the
Catharine OwensGenetics versus Society Please respond to the
 

Recently uploaded

678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
CarlosHernanMontoyab2
 

Recently uploaded (20)

GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
GIÁO ÁN DẠY THÊM (KẾ HOẠCH BÀI BUỔI 2) - TIẾNG ANH 8 GLOBAL SUCCESS (2 CỘT) N...
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Salient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptxSalient features of Environment protection Act 1986.pptx
Salient features of Environment protection Act 1986.pptx
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf678020731-Sumas-y-Restas-Para-Colorear.pdf
678020731-Sumas-y-Restas-Para-Colorear.pdf
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 

Case Project 2 Read the following Case Study and answer the que

  • 1. Case Project 2: Read the following Case Study and answer the questions at the end in paragraph form. XYZ Security Auditors was hired to determine if he could gain access to the network servers of a department store chain that contained important proprietary information. The chief information system officer (CISO) of the department store chain boldly proclaimed that breaking into the servers by the auditor would be “next to impossible” because the CISO “guarded his secrets with his life.” The auditors were able to gather information about the servers, such as the locations of the servers in different areas and their IP addresses, along with employee names and titles, their email addresses, phone numbers, physical addresses, and other information. The auditors also learned that the chief executive officer (CEO) had a family member who had battled through lupus which does not have a cure. As a result the CEO became involved in lupus fundraising. By viewing the CEO’s entry on Facebook, he was also able to determine his favorite restaurant and sports team. The auditors then called the CEO and impersonated a fundraiser from a lupus charity that the CEO had been involved with before. They stated that those individuals who made donations to this year’s charity event would be entered into a drawing for prizes, which included tickets to a game played by the CEO’s favorite sports team and gift certificates to area restaurants, one of which was the CEO’s favorite. The CEO was very interested in the fake charity event, the auditors said that they would email him a PDF document that contained more information. When the CEO received the
  • 2. attachment he opened it, and a backdoor was installed on his computer without his knowledge. Auditors were then able to retrieve the company’s sensitive material. (When the CISO was later informed of what happened, he called it “unfair”; the auditors responded by saying, “A malicious hacker would not think twice about using that information against you.”) Now pretend that you are an employee of that company and that it is your job to speak with the CISO and CEO about the security breach. What would you say to them? Why? What recommendations would you make for training and awareness for the company? Write a letter to the CISO and CEO explaining the breach and what steps are taken to prevent this from happening in the future. Case Project 3: Choose one of the following threats, use the Internet to research and answer the questions, and write a one-page paper on your research: DoS Attacks, Arbitrary/Remote Code Execution Attacks, Injection Attack Defenses, Zero-Day Attacks, Buffer Overflow Attacks. How do these attacks commonly occur? How are the vulnerabilities discovered? What are the defenses to protect against these attacks?
  • 3. What are some of the most well-known attacks that have occurred?