Sign In
Not register? Register Now!
Pages:
1 page/≈275 words
Sources:
Check Instructions
Style:
APA
Subject:
Technology
Type:
Coursework
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 6.48
Topic:

Hacking Case Analysis. Discussion Questions. Think Critically

Coursework Instructions:

Case Analysis - Think Critically
Miller Harrison was still working his way through his attack protocol.
Nmap started out as it usually did, by giving the program identification and version number. Then it started reporting back on the first host in the SLS network. It reported all of the open ports on this server. The program moved on to a second host and began reporting back the open ports on that system, too. Once it reached the third host, however, it suddenly stopped.
Miller restarted Nmap, using the last host IP as the starting point for the next scan. No response. He opened another command window and tried to ping the first host he had just port-scanned. No luck. He tried to ping the SLS firewall. Nothing. He happened to know the IP address for the SLS edge router. He pinged that and got the same result. He had been blackholed, meaning his IP address had been put on a list of addresses from which the SLS edge router would no longer accept packets. Ironically, the list was his own doing. The IDPS he had been helping SLS configure seemed to be working just fine at the moment. His attempt to hack the SLS network was shut down cold.
Discussion Questions:
Answer the following questions thoroughly. Type your answers in the below space, with each question/answer numbered.
1. Do you think Miller is out of options as he pursues his vendetta? If you think he could take additional actions in his effort to damage the SLS network, what are they?
2.Suppose a system administrator at SLS read the details of this case. What steps should he or she take to improve the company’s information security program?
3.Consider Miller’s hacking attempt in light of the intrusion kill chain described earlier and shown in the figure below. At which phase in the kill chain has SLS countered his vendetta?

Coursework Sample Content Preview:

HACKING CASE ANALYSIS
Name:
Instructor:
Institution:
Date:
Discussion Questions
1 Do you think Miller is out of options as he pursues his vendetta? If you think he could take additional actions in his effort to damage the SLS network, what are they?
It is quite definite and clear that he is out of options in this instance. This is because, he tried the basic methods such as the use of VPN, which failed since the front was not accessible. The use of a zombie software also failed due to the presence of a firewall in the organization’s network. He had tried launching an attack from the inside. Perhaps what he should have gone for, as options, would have been to use a different system in his efforts to access the Nmap. While at it also, he could try either brute force or the use of an overflow attack.
2 Suppose a system administrator at SLS read the details of this case. What steps should he or she take to improve the company’s information security program?
First is to go through all the rules and regulations as well as procedures for managing the security systems. Secondly, to routinely and fa...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

You Might Also Like Other Topics Related to kill a mockingbird:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!