preview

Mim Attack Essay

Better Essays

What series of malicious events led up to the incident?
The following events led up to the reported incident. First, an attacker spoofed his IP address to eavesdrop on the network to find the finance and HR information systems. Second, the employee hacked into the HR database and increased his salary in the records system. This resulted in the employee receiving two paychecks with the altered amounts. Third, the employee sniffed the network to intercept and alter emails about the checks between an auditor and management. Fourth, the employee impersonated a person who has access to financial records to gain more access to other financial records. Finally, the employee decreased the company President’s paycheck while increasing his paycheck by …show more content…

Account hijacking - again, this attack’s severity is high because the attacker had access to finance record accounts on the finance information systems.
Email spoofing attack - email spoofing is a medium severity attack because it is an easily mitigated attack; it is mostly a nuisance to most organizations.
MITM attack - the severity of an MITM attack is medium since the attacker used it to intercept messages between the auditor and the finance department; it can be easily mitigated with network and VLAN segmentation accompanied by access control lists; often times, using a layer two switch mitigates the issue.
Describe how these additional attacks can be prevented in the future.
Mitigate the attacks by using the following techniques:
Encryption - apply encryption to the network with software and hardware solutions. For instance, software can be used to encrypt the financial records for anyone unauthorized to see the information, and a hardware solution can be used to build a VPN from any remote

Get Access