Security Analyst Issues

Improved Essays
You’re sitting at your desk. Typing furiously. Trying to crack a password so you can gain access to that network you’ve been sniffing all day. You’ve tried every command you know and you think you finally found a way in. This is it your about to gain access when suddenly your boss walks over and tells you funding’s been cut and your internal penetration test has been canceled. This is a common story you hear about, but the most common ones are even better. When someone thinks they are conducting a legal penetration test and they are accidently committing a cybercrime. In this paper we will discuss what a security analyst does for a company and some of the ways pen testing can go wrong, and how they are ethically wrong and could have been …show more content…
This person can hold many positions in an organization. This person could do incident response that consists of preventing and fixing issues cause by breaches in systems. A security analyst could also do monitoring of the network to make sure users are not breaching codes of conduct. The biggest thing most security analysts do however is penetration testing. This is where the security analyst scans the organization to find weaknesses in cyber defense that can be taken advantage of if a breach were to happen. The way they do this is by actually breaching the systems and trying to take advantage just as an unethical hacker would. The security analyst would than fix these issues or report them to the proper management to see that they would get fixed.

One really common mistake in penetration testing is that there may be a miscommunication on the authorization of said penetration test. If this were to happen to a penetration tester, it could lead to a significant legal issue. If a white hat tester gets mistaken for a black hat tester the legal ramifications could include massive fines and jail time. The fix to this scenario is way too easy. All a pentation tester needs to do is make sure they have a signed legal agreement from the organization that is being tested. However there is a small twist to
…show more content…
If the tester accidently goes into the internet service provider’s router without their permission the tester could face the same legal ramifications as stated above. Therefore in order to make sure you are covered before conducting a penetration test the tester needs to assembly a map of what devices could possibly be on the network and get a written signed copy of approval from the owners of all the devices on the network. This can cause issues because a lot of company’s don’t want to sign anything. If they don’t sign, do not test. This signed agreement is a penetration testers get out of jail free card. If the federal bureau of investigation breaks down your door you better grab that paper and scream don’t shoot I’m innocent.

The crucial point I want to cover is scope and coverage. If a company hires a penetration tester they normally give a written outline of what they want and need tested. This also comes with a piece of information stating where the tester is not allowed to go. This allows the tester to know what his coverage of the test should be and allows the organization being tested the peace of mind to know their systems aren’t being tampered with in a way they are not expecting. If a penetration tester accidently goes out of the scope or coverage of his test this could be very

Related Documents

  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Every business owner should consider the below points before setting up a network and also businesses might get expanded or changed in future. Long term investments should be considered here for future growth as well. So we should have a proper planning before we establish. Number of Users – Number of network users, printers, scanners, servers, data centers and security measures. Types of Equipment – Highly sophisticated equipment that should be capable of handling large networks and flexibility for expanding the networks for future purpose.…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    Based on the findings obtained from the analysis of security information then compiled recommendations for improvement of the condition of the company. Some recommendations are: 1. Describe in detail the confidentiality agreement and specifically including maintaining the confidentiality of the password 2. Reexamination of the access rights of each and updating access rights in case of transfer of part or advancement in accordance with their respective access rights. 3.…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Verifies and validates current in place security controls and information programs from weaknesses Penetration test types There are various approaches to Pen testing Black – in Black pen test, the tester typically has no knowledge of the organization’s infrastructure Grey – in a grey pen test, the tester has some knowledge of the infrastructure White – in the white pen test, the tester is typically in collaboration with the IT…

    • 460 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hacker access, activist access, an insider attack. Hacker access involves an outside entity gaining access to the network via unpatched systems, vulnerability, or by any other technical means. Activist access consists of a hacker affecting the network maliciously with a political or moral agenda in mind. Insider attack can be the most dangerous of the three. This involves someone within the organization do harm to the network using the credential or access they were granted to perform their regular duties.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    This explanation will be confidentially done between the testing laboratory and the individual employees. In cases where it will be deemed necessary, the policy allows for the reviewing of the documents and data appertaining the tests. This is to verify the reliability and true nature of the said results. The confidentiality aspect will be highly considered in the testing process. The results of the conducted test will be confidentially kept in the records of the laboratory.…

    • 1006 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Throughout the insightful article, The Criminal Indictment That Could Finally Hit Spyware Makers Hard, written by Kim Zetter refers to incidents and consequences of on-line threats. This article displays the legal case against Hammad Akbar, CEO of the firm InvoCode designed StealthGenie, a spy app for Android phones, iPhones and Blackberry devices (Zetter 1). Within the beginning portion of the article, Zetter explains how the cellular device app had the capability to “secretly record phone calls and siphoned text messages and other data from a target’s phone, all of which customers of the software could view online” (Zetter 1). Not only did the threat of having phone calls and text message privacy invaded, the threat of the app also “allowed…

    • 442 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    When developing a security policy framework for XYZ Health Care Organization it’s important to understand guidelines needed to establish an effective policy. Such guidelines like Health Insurance Portability and Accountability Act (HIPPA), and The Sarbanes–Oxley Act (SOX) must be included and followed to the letter. This will eliminate nearly all guesswork and fill in the blanks where HIPAA and SOX do not. Finally, while following these set ground rules it is also important to understand that this framework must fit the description laid out by the Confidentiality, integrity and availability CIA triad. There is a growing need to fill gaps which are left by the guidelines from HIPAA, SOX and the CIA triad.…

    • 410 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Security Threat Groups, also referred to as gangs are either an formal or informal group of prison inmates who set up either by race or by their beliefs. The evolution of gangs have developed a threat to the safety of prison officials and other inmates. Some of the major security threat groups include the Aryan Brotherhood, The Klu Klux Klan, The Folks, The Nation of Islam, and MS13. Groups within the correctional facilities are categorized as STGs depending upon parameters such as gang history, purpose, involvement in illegal activities, propensity for violence, and its structure and composition.…

    • 2127 Words
    • 9 Pages
    Great Essays
  • Great Essays

    C. Common Causes of Data Breach The four common causes of data breaches includes the absence of policy, unencrypted dives, lack of security defenses and insider negligence [22]. Insider negligence of private information is one of the top reasons for a data breach. This includes an employee accident that leads to a data breach, and the use of a third-party that is negligent. For example, in 2009 an unencrypted laptop was stolen from the car of an Oregon Health & Science University employee which exposed the information of about 1,000 patients.…

    • 1541 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    This is a job announcement for the following position.... Security Officers are an integral part of our team! The Security Officer provides a safe and secure environment for all patients, associates, and visitors; protects Medical Center buildings, assets and property. Our Security Officers will exemplify our standards of service excellence, including a commitment to consistently demonstrate "Always Behaviors" of caring for each other, caring compassionately for our patients and their families, communicating with a positive attitude, growing professionally, and maintaining a healing and safe environment. Essential Functions…

    • 427 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    How does the agency ensure diversity in the recruiting process? The FBI has a serious commitment to ensure diversity and inclusiveness of all races, genders, and cultures. To ensure that the agency commitment is being fulfilled, the agency track the successes of their diversity initiatives (Hartmann,2002). The particular initiatives includes; providing EEO-related training, such as cultural diversity, to every employees.…

    • 1402 Words
    • 6 Pages
    Superior Essays
  • Great Essays

    National Security Analysis

    • 1888 Words
    • 8 Pages

    Under what circumstances should national security hold greater importance than human rights? In order to mitigate the direct threat of terrorist acts, what policies should democratic nations enact? Both civil society and political leaders seek to answer these philosophical questions – especially during times of war – in an effort to reach moral clarity. Issues surrounding torture are controversial and extremely emotional, therefore most individuals may avoid taking a position. American-born film director, Alex Gibney, utilizes his skill in the visual arts as a tool to engage auditors.…

    • 1888 Words
    • 8 Pages
    Great Essays
  • Improved Essays

    Rummaging through rubbish for personal information (dumpster diving) Retrieving personal data from redundant IT equipment and storage media including PCs, servers, PDAs, mobile phones, USB memory sticks and hard drives that have been disposed of carelessly at public dump sites, given away or sold on without having been properly sanitized Using public records about individual citizens, published in official registers such as electoral rolls Stealing bank or credit cards, identification cards, passports, authentication tokens ... typically by pickpocketing, housebreaking or mail theft Skimming information from bank or credit cards using compromised or hand-held card readers, and creating clone cards Using 'contactless' credit card readers to…

    • 459 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    My Future Career The future career that I choose is a Cyber security expert. The interest that I developed in this career was due to a lot of what I’ve saw in the news over the years and from what I’ve personally experienced over the years. A large majority of companies and government agencies hire these experts to help strengthen networks, safeguard information, or prevent cyber-attacks. That’s the part that really interested me.…

    • 754 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    As modern lifestyles become increasingly intertwined with technology, criminal investigations have done so as well. The new field of cyber forensics has arisen to meet the need to gather information that has been increasingly hidden from investigators through the criminal use of technology. While businesses often have difficulties implementing effective information security policies, new challenges arise when they are confronted with the potential for cyber investigations which may jeopardize the security of corporate information. This report will examine the situation regarding cyber forensics as it stands, detailing why the circumstances of these investigations may be concerning for firms in regards to the security of their private information.…

    • 1554 Words
    • 7 Pages
    Great Essays