Unit 3 Assignment 1 Network Security Plan

Improved Essays
Given the University’s many diverse systems and disparate departmental roles managing the various systems the overall information security plan was not update to date nor consistent. There were obvious holes in the security plan which allowed a hacker to infiltrate the main domain server. The hacker secured administration rights on the server and they managed to infect other systems attached to the network. Thankfully, a trail of clues were found by the administrators.
Various suspicious events were found by a network administrator while logging into the server. The first discovery was a new folder that was created on the server desktop along with multiple DOS windows that popped up during the sign in process. After researching server logs
…show more content…
A scheduled job was also found which was used to spawn the DOS windows to execute the virus application files. Further investigation revealed that a someones password was cracked, allowing the hacker to gain access and infiltrate the server, stage the files, and allow deeper access into the network.
Much can learned from this attack. First, the University had a very poor password policy, which allowed an existing user to create a password phrase that was the same as his user login name. Nor were the passwords forced expire after a certain number of days. As our text states, “it is common to see users having blank passwords, the word password, their pet’s name or children’s names, or their place of birth as a password” (Dhillon p.72). This is why it is necessary to have strong password standards and communicate them to all the users.
Also, it was found that real-time virus scanning software was turned off, allowing the hacker to install the malicious software. This change did not proactively alert (email or text) the core team of network administrators. Any major change in the base server configurations should alert the core team. Also, the antivirus software must be kept up-to-date on all machines to protect the University from future

Related Documents

  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Kaplan University IT286 Unit 8.2 Jennifer Polisano Answer 8.2: As the IT Security Professional for Web Site 101, I will be recommending adjustments for recent security issues, including data loss due to employee negligence, physical break ins, identifying employee security standards, identifying network access specifics, and the recent hacking of the home page of Web Site 101. Web Site 101 currently has 300 employees working on three levels of the office building. In the previous years, this organization has grossed 2 million dollars revenue per year. For the organization to continue to thrive, these security problems will need to be addressed immediately.…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Describe 3 ways a hacker can try to intrude a system. To protect from unwanted intrusion, viruses or hacking, we should consider the following points: Antivirus protection: This program scans our computer from any miscellaneous files or viruses and delete them or to move to quarantine. There are lot of antivirus available in market. Move rover most of ISPs also provide antivirus.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Threat Assessment of ‘Important Security Alert From Windows’ Pop-Ups: ‘Important Security Alert From Windows’ Pop-Ups has created havoc among computer users that does not allow them to usually work in the computer. Where this adware has found its own method to attack the targeted system and to make the infected computer almost useless. In order to trouble computer user, it performs several malicious activities to use the security gaps in the system and it leads to freeze the entire running programs of the computer. Firstly, this malware program affect the processing speed of the infected computer to stop the basic functions of the system so that the computer will respond very slowly when user give any instructions.…

    • 425 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The vulnerabilities identified in part 1 assignment was mitigated by recommending the right solutions. In part2, the network security analyst identified and proposed solutions for the right network devices to protect the accounting firm's network from intruders and external cyber threats. In this final assignment section, the network security analyst of the accounting firm will propose the application/end-user security recommendation to protect the company’s sensitive information. The analyst will also ensure that the proper procedure and policies are in place to take care of network security and employees should be trained and aware of those policies from possible threats including cyber-attacks.…

    • 730 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Certification Authority(CA):A certification Authority which is having private and public key pairs and trusted by sensors. The role of the CA in this process is to guarantee that the individual granted the unique certificate is in the fact who he or she claims to be. External Agent(EA):External Agent is an entity who tries communicate with the WSN.External agent agent also has a private and public key pair and the public key must be certified the CA.…

    • 637 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Security Considerations The issues with the current set up of our lab in an enterprise environment are control and exceptions. Control is an issue because with all of the computers on a different domain password policies and other security features will not be implemented. This hurts the organization because it is not prepared for an intrusion of their network. A good fix for this issue is to get the network on the same domain and keep control over all users.…

    • 604 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Another type of security event or baseline anomalie could be the increased network traffic which could indicate an unauthorized server, software, or potential malware. Shareware installed on a client device is a perfect example where network traffic could increase when downloading electric content onto a corporate network that could potentially be infected with malware. Shareware also opens up the device to sharing its data to the outside world potentially leaking propriatry and confidential data. Monitoring network bandwidth, closing firewall ports, and removing local administrator rights are a few ways to remediate shareware activity. Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Superior Essays

    In an era where some of the biggest damage is done by simple keystrokes, cyber security is an essential part of any organization, whether big or small. The purpose of this report was to gather information regarding The University of Texas Health Science Center at San Antonio (UTHSCSA). Through proper use of research, network scanning, and social engineering the team was able to obtain valuable information regarding the infrastructure, policy, intellectual properties and the security of the Health and Sciences center. The Team would be able to analyze all the findings and point out key the interfaces that may potentially be impacted as well as the key threats and vulnerabilities. These findings were to be given to executives at the Health and…

    • 1298 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Ashley Scrivner Dr. Murimi BISS 1103 A October 2, 2017 Sircam and AIDS Virus Love is like a virus. It can happen to anybody at any time. Unfortunately, I am not talking about this type of virus.…

    • 627 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Target's Hack Case Study

    • 351 Words
    • 2 Pages

    According to Bloomberg Businessweek, Target had been aware that its servers were compromised, but decided to ignore this warning. FireEye, a security firm that Target hired to monitor its servers, notified Target about the breach twelve days before the actual hack occurred. However, once the hack happened Target fixed the issue by eradicating the malware off of its network on December 15th. Target also released a statement to public regarding the hack, in order to ensure that customers would continue their holiday shopping with confidence.…

    • 351 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Dage Michael Martinez Fraud Auditing May 1, 2016 Fraud Audit Program: Hollate Assess: Fraud: Type/Scheme Control Opportunity Occurs/Fraud Scenario Concealment Red Flags Conversion Journal Entry Scheme The scheme likely occurred due to management override of controls.…

    • 1732 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Starwood is a well-known and popular chain of hotels that includes a number of brands: W Hotels, Westin, Le Meridien, Sheraton, etc. It was discovered recently that a total of 54 various Starwood hotel locations were hit with a malware designed with the purpose of stealing customer payment information. What do you need to know about the recent Starwood Hotels malware data breach? 1.…

    • 458 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    A literature review allows a researcher to present the findings and viewpoints of other researchers in order to build on existing knowledge (Onwuegbuzie, Leech, & Collins 2012). This allows the researcher to build a solid foundation in which to further sustain their work and demonstrate the credibility of sources used. By the use of Google Scholar, EBESCOhost and proQuest I reviewed the literature pertaining to cyber awareness, cyber security, cyber attacks, the economic fallout from cyber attacks and the state of businesses taking preventative measures. Furthermore, I reviewed the literature based on the need for individuals to concern themselves with cyber awareness.…

    • 2302 Words
    • 10 Pages
    Great Essays