Case Study: Network Intrusion

Superior Essays
Network intrusion takes place when an outside entity gains access to a prohibited network without authorization. A secure computer or network system should provide data confidentiality, data and communication integrity and assurance from a denial of service attack (Mukherjee, Heberlein, & Levitt., 1994, p.28). Network intrusion can have huge effects on an organization as data can be stolen, modified or erased, and equipment or programming can be harmed or annihilated. Organization in the public and private sector are constantly in the media for security breach, Companies such as JP Morgan Chase, Home Depot , TJ Maxx and recently the Federal Office of Personal Management have all been breach. In a case presented by Johnston and …show more content…
This may be an indication of malware blocking the application from initiating. The server was unable to identify the Test utilities executable files. In addition, the USB and CDs that had the various test on them were tested and were intact. The second problem that was notice was the state of the remote connection from the server. A scan reported open ports that were undetected from within the operating system.
Audit Security Roles and Responsibilities.
The establishment of strong security roles and responsibilities within a corporate environment may have mitigated the events that had occurred from the case scenario above. According to the Federal Communication Commission (FCC) , department of Homeland Security, the National Cyber Security Alliance and The Chamber of Commerce recommend all companies to develop and maintain robust security policies to protect a company assets and to discourage in appropriate behavior by employees(FCC, n.d.).
Many system are designed to provide Role based access Control (RBAC). But if the procedures are not define then RBAC has little use if any. For example , in the scenario the end result showed that the intruder had gain access to the server and the desktop through weak passwords. For both systems the (IUSR_WIN and SUPPORT) account were change on January 29,
…show more content…
The first Tool used was the Helix CD ( http://www.e-fense.com/helix/contents.php) to boot the server. The file system was examine using the Unix-based utilities from Sleuth Kit. Sleuth Kit utilities is able to produce a Time stamp of the system files. Sleuth Kit provided information on the inconsistency of file activity time line. This led to a closer look at specific files. Further examination disclose file activity that was consider unseen when the server was running(Johnston & Reust, 2006, p.119). Another process was the dumping the contents of the memory to an external device provide significant amounts of evidence such as IP addresses, passwords and other data related to intrusion((Johnston & Reust,

Related Documents

  • Great Essays

    Data Communication and Net-Centric Computing (COSC 2061) Assignment 2 Student Name: Weibin Zhong Number: s3503887 Introduction This report is identifying what are FDMA, TDMA and CDMA and how to maintain the communication seamlessly and the roaming service as well as the cost of roaming service. Furthermore, the 1G, 2G, 3G and 4G generations will be discussed.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    P1 Unit 6 Business

    • 462 Words
    • 2 Pages

    The information security program can use tools to track any changes to any important data, also it can show when the file was last…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    Technology has shaped many parts of our lifestyle’s from movement from one point to another (GPS), all the way to maintaining all of our hard earned funds on a piece of plastic. The question at hand is how this is all protected and who enforces it? Network security has proven beneficial in many cases in today’s society. It continuously monitors the companies system ensuring that unauthorized access isn’t permitted, or as we like to believe keeping our information from falling into the wrong hands.…

    • 397 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    The Target breach ranks one of the worst ever security breaches in history. Not only did someone hack into Target’s security system, but it was during peak holiday months when Target stores are overrun with customers getting ready for the upcoming holiday. In this paper, the reader will learn about the history of cyber security attacks, the Target Security Breach in detail along with the future problems…

    • 853 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    The program will allow Walters Security to effectively monitor critical applications and data centers. An extra incentive of this program is its ability to monitor web applications, servers, databases, and systems. Companies that are based solely on information technology is built on the framework of support. For Walters Security to be a successful firm, it has to provide internal support for security, network issuers, and other computer associated problems. By providing each client with superior customer service, highly trained professionals, digital scrubbers, and security personnel, Walters Security will create a tremendous amount of value for their clients.…

    • 1477 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    When they do this they can obtain information about the user and his or her computer (Cunningham).…

    • 455 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    As an expert in identity theft, the author exposes a business owner’s case in which the business’ computer system is compromised.…

    • 170 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    Cybersecurity Policy Paper

    • 1062 Words
    • 5 Pages

    Introduction In today’s technological society it is very important that organizations maintain strong security policy documentation. The most important documentation that should be maintained is the cybersecurity policy. In this paper I will discuss the cybersecurity policy of the organization I have chosen (Apple INC). This paper will supply an analysis of the strategy that they use to protected themselves against fraud, hackers and theft.…

    • 1062 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Introduction Critical infrastructure is the fundamental structure of modern society. Human beings largely depend on systems for survival in the harsh economic environment. Everything around, tangible and intangible alike, has a purpose of making life easier for humanity. As time progresses, the Infrastructures continue to develop and become more sophisticated. More advanced inventions have more functionalities than the less complex ones.…

    • 3013 Words
    • 13 Pages
    Improved Essays
  • Improved Essays

    Lti Case

    • 993 Words
    • 4 Pages

    Cyber-crimes, one of the most concerning problem of every company, which leads to exposure of sensitive client data will land the company in legal proceedings and bad reputation. Loss of information due to any disaster is also potential risk to the company. Advance security monitoring systems are in place to fight the cyber-crimes in…

    • 993 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Security Life Cycle

    • 1189 Words
    • 5 Pages

    Authorization and privileges are created and granted, which will include which part of the system will be user interfaces and interaction, how to keep all security controls, and threats are identified. In the implementation phase, vulnerabilities and threats are now looked for in the code in the structural errors and input errors (Howard, 2005). Testing of the code is the best way to perform this task. In the verification phase, it will include a final security check that will review all code that interacts with all attacks surfaces found in the design phase. Lastly, a security review is done, where the security measures are explained in terms of the end client’s stances and what and how the product is setup to withstand attacks in the future (Howard, 2005).…

    • 1189 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays