100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Case

Case Study on Data Breach and Espionage with answers - Cyber Security Management -CC7178NI

Rating
-
Sold
-
Pages
3
Grade
B
Uploaded on
02-03-2022
Written in
2020/2021

This document is about case studies on Data Breach and Espionage. The answers of the questions asked in the case study is also answered.

Institution
Course








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
March 2, 2022
Number of pages
3
Written in
2020/2021
Type
Case
Professor(s)
Jinaming cai
Grade
B

Subjects

Content preview

7.1.2 Case Study 18
The insider, a contractor, was employed by the victim organization, a high technology company
that developed and manufactured various computer components. The insider worked for the
organization for a few years before moving to the division where the incident occurred. The
insider worked in the supercomputer division (SCD), which was devoted to creating extremely
valuable supercomputers used for functions such as ensuring nuclear weapons safety. The
computers were password protected, and the highly sensitive data was stored in an encrypted
form. The division experienced a problem with its email systems, leading to a dispute between the
insider and a systems administrator. The insider became disgruntled when his suggested approach
to addressing the problem was not applied, and the systems administrator ultimately resolved the
email issue with a different approach. The insider decided to leave this division of the
organization because he felt that any decision he made would be superseded by the systems
administrator. The organization disabled the insider’s passwords to all but one of the
supercomputers (Computer X). Subsequently, the insider began working as a contractor for
another division within the victim organization. A year after the insider’s dispute with the systems
administrator, a colleague noticed that the insider was running a gate program, which enabled the
insider to remotely access the organization’s computers. The organization’s security policies
explicitly prohibited using gate programs because they breach firewall programs the organization
uses to prevent computer intrusions. The colleague confronted the insider, who responded that he
used the program to access his email while he was traveling but was aware that it violated the
organization’s security policy, and he agreed to modify the program. Five months later, the same
colleague noticed that the insider was using another gate program and confronted the insider
again. The insider requested that his account for that specific computer be closed, and transferred
his gate program to Computer X. The insider downloaded a password cracking program and ran it
on Computer X. The insider obtained a password for one of Computer X’s authorized users,
which he then used to log onto Computer X and copied its complete password file. The insider
uploaded this password file to another SCD computer and used it to obtain 35 user passwords for
those working in the SCD. The insider’s goal was to use the breach to demonstrate that the
security in the SCD had declined when the insider departed and to regain the respect he lost when
he left the SCD. The insider ran the crack program on another SCD computer and used it to obtain
additional information to demonstrate the inadequacy of the SCD’s security. A colleague noticed
that the insider was running the crack program and that the insider’s password for Computer X
had not been disabled. The colleague reported this to a network security specialist and the local
police department. The insider was arrested, convicted, ordered to pay $68,000 restitution, and
sentenced to five years of probation followed by 480 hours of community services. If the insider
did not fulfill these obligations, he was to serve 90 days in jail. The restitution order was reversed,
and an appellate court later expunged the conviction.


1. What security lapses happened and how did the organization suffered?
2. What are the factors that led to this event?
3. What should have been done in order to prevent this issue?




Solutions:
R174,30
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Erickgoose

Get to know the seller

Seller avatar
Erickgoose London Metropolitan University
Follow You need to be logged in order to follow users or courses
Sold
0
Member since
3 year
Number of followers
1
Documents
31
Last sold
-

0,0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions