StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

A Penetrating Analysis - Case Study Example

Cite this document
Summary
Over the past five years, my organisation suffered two security incidents, one of which was somewhat unavoidable and the other a consequence of an oversight by the network administrator. This essay, which shall describe both attacks, will attempt to clarify the extent to which the unauthorised penetration of a company's network can have consequences which extend beyond damage and impact to the potentially catastrophic.
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
A Penetrating Analysis
Read Text Preview

Extract of sample "A Penetrating Analysis"

Download file to see previous pages

The administrator had stored his admin password on his mobile phone and had left the phone unattended in his office. At that time he had not realized that his mobile had been tampered with or that anyone had retrieved the admin password and user name from it. Approximately two weeks later, a virus was uploaded to the company's server and effectively shredded all employee information. Investigations into the attack uncovered evidence from the data dump and the syslog files which indicated that the virus had been directly uploaded from within the organization by the administrator himself.

At least, the username and the password the attacker had entered to access the company's server were the administrator's. Further investigations revealed the password theft incident and identified the attacker as a disgruntled IT employee, who had just been put on notice by the administrator. The employee in question was, of course, fired and legal measures were taken against him. The employee records, after the investment of considerable effort and time by the IT department, were retrieved.

The seThe security incident described in the above, comprises a malicious attack whose potential for damage was significant. The attacker limited himself to the uploaded of a virus but, alternatively, he could have retrieved company information which was of value to competitors, such as client lists and a proposal that the company was putting together, at that time, for a bid. The consequences, in other words, could have been more damaging than they ultimately were, not because the company's network security system was effective but because the attacker's goal was limited to the uploading of the virus in question.

Reflecting upon the security incident outlined in the previous, it is apparent that the network administrator was at fault. Password information should be safeguarded as keys to a vault are, insofar as they are the keys to a corporation's nerve center and misuse has the potential to wreak tremendous damage on a corporation. The second security incident which the company confronted was much more serious and occurred as a direct consequence of a vulnerability in the Cisco router which the company had installed.

Apparently, Cisco IOS had a security hole which the company was trying to resolve through a software patch. Cisco had informed its IOS users that they would need to download and install the new software but had not mentioned the security hole. Therefore, my company and the IT department were, as the case with the countless of companies which used IOS across the world, unaware of the presence of a security hole. Many criminal hackers, however, were and Cisco only admitted it at a much later date (Zetter, 2005).

Exploitation of this particular security hole did not mean, as the network administrator explained, that a hacker could enter the corporate network but that he/she could both tamper with the data and control the data flow. This is precisely what happened. The router password was changed, financial records were tampered with and two orders for financial transfers were sent by the Financial Director to an offshore bank

...Download file to see next pages Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“A Penetrating Analysis Case Study Example | Topics and Well Written Essays - 1000 words”, n.d.)
Retrieved de https://studentshare.org/miscellaneous/1530176-a-penetrating-analysis
(A Penetrating Analysis Case Study Example | Topics and Well Written Essays - 1000 Words)
https://studentshare.org/miscellaneous/1530176-a-penetrating-analysis.
“A Penetrating Analysis Case Study Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1530176-a-penetrating-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF A Penetrating Analysis

Business Strategy Company Analysis

This report will present an external and internal analysis of Foster's Group besides identifying three important strategic issues faced by the firm.... External analysis Two of the most important tools for performing external analysis include PESTLE and Porter's Five Forces analysis....
8 Pages (2000 words) Assignment

NEWS CORPORATION CASE STUDY

This essay is based on the case study analysis regarding the overall expansion strategies of NC.... For the purpose, strategy matrixes of Ansoff product and market development matrix and corporate parenting matrix have been applied; analysis and suggestion for improvement has also been provided.... analysis for the criticism on Ansoff product development has also been made part of the essay....
9 Pages (2250 words) Essay

How Does a Transnational Approach Modify New Zealands Cultural History

“How does a transnational approach modify New Zealand's cultural history?... Is it useful?... ?? Introduction New Zealand (hither after will be referred as NZ) can be called as a country of immigrants where indigenous tribal communities namely Maori and Pakeha are living there traditionally.... hellip; The NZs first immigration policy can be revealed from the Treaty of Waitangi/ Te Tiriti o Waitangi,which was signed as early as 1840....
8 Pages (2000 words) Essay

Financial Analysis Uniliver PLC

This case study "Financial analysis Uniliver PLC" provides an overview of the company as well as financial analysis of Unilever for the fiscal year 2011 in order to determine whether the company is worth investing in £1 million.... One of the main analytic tools used in the paper is ratio analysis.... Financial analysis – Unilever In 2011 Unilever generate revenues of €46,467 million.... Ratio analysis of the company is illustrated below: Financial Ratios 2011 Net margin 9....
4 Pages (1000 words) Case Study

Employee Empowerment Culture and Penetration Pricing

According to the market analysis, Microsoft has been able to increase its customer base to a certain extent as compared to the past after implementing the penetration pricing strategy (Perez, 2012).... In relation to penetrating pricing, Microsoft implemented the pricing strategy into their business process in order to compete with the rivals through increasing customer demand for their products and services.... Moreover, in relation to penetrating pricing, the company can provide more quality services along with reducing the price of the products....
3 Pages (750 words) Essay

Fast Moving Consumer Goods

Through this analysis zeal offers not only current but future solutions to FMCG companies on their approaches to market penetration in UK.... Due to the dynamic changes that FMCG companies operate in, penetrating UK, and their supermarket have been a challenge.... This essay discusses that Fast Moving Consumer Goods (FMCG) companies also referred to as Consumer Packaged Goods companies can today be considered as one of the biggest segments in the world of business UK included....
2 Pages (500 words) Essay

Market Penetration Strategy and Balance Scorecard Practice: SWOT Analysis of Southwest Airlines

The paper discusses Southwest Airlines that is already pursuing this strategy by adding two to three more cities in its traveling routes every year.... Southwest Airlines is not pursuing strategy and since the company has enough margin to penetrate in its own market.... hellip; At this stage diversification strategies are not recommended to Southwest airlines because it will divert the attention of the company from its core operations and the competition in the airline is very tough, which could be harmful to the company....
8 Pages (2000 words) Research Paper

The Discovery and Benefits of Munroe Effect

This paper ''The Discovery and Benefits of Munroe Effect'' tells that The concept of Munroe effect has to do with a form of the shaped charge, which is a volatile component used to break through thick targets by use of high-velocity jets.... A regular shaped payment is made up of a conical hole that contains highly explosive materials....
8 Pages (2000 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us