Unit 3 Assignment 1: Disgruntled Employer

Superior Essays
A1.
The scenario is about a disgruntled employee who felt that his salary should have been more. He also felt that while he was being under paid the president and some other employees were making too much. He then set out to change this without authority, if he could only find where and how to do this.
As an employee he already has access to the network and with his knowledge of hacking he decided to start spying and searching for inform on the human resource records system. To do this he plugs his personal computer into and extra network slot located in his office and use nmap network scanning tool to scan and gather information on all the devices on the work network, by using a spoofed local server IP address to hide his identity. After he identified all of the hosts on the network he narrowed the search to see what operating system and applications were running on each machine. This allowed him to eventually identify the human resource records system. Now he just needs to be able to access it and know how to use it. He then set out to learn how to access and use the human resource records system by using wireshark network scanning tool on his computer. He again spoofs a network server IP address and begun scanning and collecting information on everything that involves the human resource server. Eventually he was able to find the login and password in the information collected. From analyzing the packet captured he was able to see how changes were made. The then logged into the human resource records system and increased his own salary. However, he knew that the audit team would find out. So, he the Cain and Able tool on his computer to launched a man in the middle attack, in order to track and alter all traffic to and from the company’s network. The auditor did notice the anomaly with the employee’s pay change and immediately sent an email to notify various employees in the organization. However, since the employees were intercepting everything he stopped the emails and altered them before forwarding the edited version. Eventually he was able to collect critical information from the email exchanges which helped him the lower the salaries of the president and several other employees. He then added the amount he deducted from others to his pay check. The IT staff eventually found out and blamed the breach on IP spoofing. A2. This incident was pretty severe since the disgruntled employee was hurting the CIA triad of Confidentiality, Integrity and Availability. This including information that he was not authorized to see, changing salaries and emails. He also made original emails unavailable until modified. Many people in the organization should be informed about this incident by various mean like a telephone call, in person at an emergency meeting and voice mailbox greeting. The president should be informed because of the severity of the incident, plus his salary was also lowered. The head of the information Security department should be notified so that he can quickly investigate the incident and start the containment and recovery process
…show more content…
A number of attacks were overlooked by the IT staff in there evaluation. They missed the fact that a man-in-the-middle attack was used to eavesdrop on the entire network. This is how the disgruntled employee was able to stop and altered the notification email from the auditor to the president and some other employees. They missed the fact that a rouge device was used to carry out the attack. This calls for port security to stop these devices from accessing the network. They also missed that the network was had been scanned to identify various hosts and their IP address. Without these additions another employee could carry out the same attack. To do this they will send a gratuitous ARP to both the HR records system and the local certificate authority tell each that he is the other. The certificate authority will then send the man-in-the-middle a certificate. The man-in-the-middle will then use the certificate to access the HR records system and process to make changes to associates records. This would align with NIST 800-61 recommendations on post event evaluation (Cichonski, Millar, Grance and Scarfone, 2012).

Related Documents

  • Improved Essays

    Hrm/531 Week 4 Assignment

    • 481 Words
    • 2 Pages

    I was assigned as a Service Delivery Manager on a project to manage services related to QA Environment for one of the largest Retail Organization in Canada. I was very excited to get exposure to the Retail Industry. Soon after joining the project, as I started reviewing the financial, I recognized that there is huge backlog of Invoice payments from client due to the dispute. Some of the invoices were as old as 6 Months and total amount exceeded $2M. As the year was approaching to the end pressure started to mount to clear these payments to meet our revenue targets. I was not the only one facing this challenge other Service Delivery Managers in the account also had the same issue.…

    • 481 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    5. Physical Security Devices a) Employee Identification Badges / Smart Cards: The company should provide employees with picture identification badges with a smart chip and magnetic strip. The company will provide unique public-key infrastructure (PKI) certificates on the employee’s smart chip, which will allow user access to the company network. Radio Frequency Identification (RFID) capable cards should not be used. While they are more convenient for access control than swipe cards, an attacker can scan and capture the identification information provided by the RFID chip without having to have any physical contact with the ID card, and use that information to gain access [43].…

    • 617 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    1. The question provides us those following weather information of one specific place: Maximum Temperature, Minimum Temperature, Average Temperature, Dew Point, Sunrise, Sunset, and Pressure. The date has been recorded daily for six months from April 1st, 2015 to September 30th, 2015. 2.…

    • 402 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Pt1420 Unit 3 Assignment

    • 533 Words
    • 3 Pages

    Final Project For my game I am going to make 2048. The user will use the arrows keys to control the movement of the number tiles across the board. The goal of the game is for the user to create the number tile with the value of 2048. The game has servel mechanics at play. First I will have to code a tile generator that creates a two or four numbered tile in a position around the perimeter of the board.…

    • 533 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Nt1310 Unit 8.2

    • 772 Words
    • 4 Pages

    Since access has been granted previously, the network access codes will now need to be changed, to warrant away previous access to the network. An employee should be responsible for monitoring all network access to ensure that there isn’t unauthorized access or activity. Reports should be assessed by management to make any necessary…

    • 772 Words
    • 4 Pages
    Superior Essays
  • Improved Essays

    Elisha, for the month of April you scored 7.6 points per hour. Your current yearly average is 7.3 points per hour. The team average for the month of April was 9.2 points per hour and the department average for the same month was 9.2 points per hour. Elisha, you continue to perform well below the department expectations in productivity month-over-month. As stated before this cannot continue.…

    • 407 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Pt1420 Unit 6 Assignment

    • 798 Words
    • 4 Pages

    Megan Douglas Lesson Title: All Aboard! Date: March 5, 2015 Essential Question: Does a pattern exist when finding the different combinations of cars used to create different train lengths using Cuisinaire Rods? If so, what is it and how do you find it? Lesson Rational: In this lesson, the students will use Cuisinaire Rods to create different combinations while having different “car lengths” (individual rods) add up to “trains” (combinations) which are equal to the length of a larger car.…

    • 798 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Pt1420 Unit 3 Assignment

    • 3537 Words
    • 15 Pages

    There exists a game. A game older than time itself. This game is responsible for the genesis of every universe. Once a universe has reached maturity, the game will present itself to members of the species that it deems to be the most sentient and intelligent in that particular universe. Once the game presents itself to them, they will play the game.…

    • 3537 Words
    • 15 Pages
    Superior Essays
  • Great Essays

    Nt1330 Unit 3 Assignment 1

    • 1044 Words
    • 5 Pages

    Additionally, when remote workers are employed by organizations it is important to provide the employee with a secure connection to the network and server. By using a VPN, the establishment of a safe connection can ensue. For example, when buying locks to keep homes or businesses safe there is a different key for every lock. This means like keys; the VPN establishes a secure connection that does not allow for intrusions to occur by using the Internet (Stewart 19). The remote connection is established by using a tunneling protocol which adds security by encrypting data.…

    • 1044 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Remote access need to be safer. A wide open remote access to the EHR system is very dangerous. A VPN should be put in place to control which accounts have remote access to the system. You will also have to connect to a secure network to access…

    • 588 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    To combat these concerns, the team focused on four different controls. Insider Attack: The setting on the firewalls was set to maximum. The setting allowed the network reject, block, or deny potentially malicious payloads that would allow access. Authentication, RBAC, IDPS, and firewalls were used in conjunction to reduce insider threat opportunities. Additionally, these systems notified network administrators of any foreign presence within the boundary.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    At no time should the workstation be used for personal email use, (i.e. sending or receiving), or social networking sites. The company has a secondary Internet Service Provider (ISP), and that should be used for personal email and social networking via your personal devices, such as cell phones and tablets. Again, you are not permitted to send company information using personal devices or email/social media. Key Control Maintaining constant watch over who has access to what electronic and physical key access is imperative.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Pt1420 Unit 6 Assignment

    • 451 Words
    • 2 Pages

    When tackling the “Win/Win” category, I also scored high. Staff members regularly come to me with a multitude of problems and uncertainties. When this occurs, I first determine if they may be able to solve the problem on their own or if I need to help with the solution and be more hands on. I also look at the individual and their level of experience to help determine my next action. This is one way I show support to each individual.…

    • 451 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    Pt1420 Unit 2 Assignment

    • 316 Words
    • 2 Pages

    It was the year of 2014 going into 2015 and I was an eighth grader. This was my second year attending Bennett Academy charter school. My English language arts teacher, Ms. Walton, had told to my classmates and me that in mid-November we will begin to start our huge assignment. That assignment was to be completed before the graduation date of May 21st, 2015. Ms. Walton told us that we need to have at least fifty pages and no less.…

    • 316 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Hrm/531 Week 3 Assignment

    • 1540 Words
    • 7 Pages

    KSAO stands for Knowledge, Skills, Abilities, and Other Characteristics that are required for a good job because having all of the qualifications will help them reach a goal to make sure they are the right combination for the position. Most jobs will require three to five of KSAOs and it is important to address it because it will ensure the adequate information about your background and the requirements that will best suit them. KSAOs is developed and evaluated through a hiring organization that will evaluate the process of gathering, documenting, and analyzing all the information for the position. The organization will identify the different levels of who is qualified, highly qualified, and who is the best. Applicants who receive the highest…

    • 1540 Words
    • 7 Pages
    Improved Essays