Vut2-Rtft Task 1 Essay

2002 Words Nov 7th, 2013 9 Pages
UVT2-RTFT Task 1
Competency 427.2.4: Advanced Social Engineering

William J. Lawson

MS Information Security & Assurance - 5/1/13
Student ID:000311942
My Mentor: Mary Gordon c: 317-448-3045
Indianapolis, IN - Eastern Time[->0] A. Create a memo discussing how you believe the intruder gained access to the company's network using social engineering.
Incident Memo to Management Recently The Company was a victim of a Social Engineering (SE) attack, perpetrated by an unknown entity. Social Engineering is a method used by confidence men (con-men) to acquire information through human interaction that will be used to support a cyber attack. It often involves some form of trickery.
…show more content…
If this was limited to only the supervisor's computer then the likely suspect would be that the URL launched what is known as a Trojan horse. Whereby the backdoor to the supervisor's computer was created for the purpose of sending data to the attacker via the Internet. However, incidents of access to confidential files on other computers have been reported. I suspect that a Blended Threat has been used. A Blended Threat is a more sophisticated multi-layered type of attack that combines elements of viruses, worms, Trojan horses, encapsulated by malicious code developed by the hacker into a single method of attack (Beal, 2013). Blended threats can cause harm to systems or networks, they can spread from computer to computer using the company network. They can be designed to exploit common vulnerabilities, install a backdoor, and even damage a local system in one shot. Additionally, blended threats are designed to use multiple modes of transport. Blended threats are considered to be the worst risk to security since the inception of viruses, as most blended threats also require no human intervention to propagate (Beal, 2013).

B. Create a security recommendations list suggesting prescriptive measures that should be implemented to prevent such intrusions in the future.
List of recommendations with Justification Social Engineering attacks are difficult to defend against

More about Vut2-Rtft Task 1 Essay

Open Document