Question

Final Project You work as a security administrator of a large department store chain or choose...

Final Project

You work as a security administrator of a large department store chain or choose another large corporation of your choosing. You believe that there has been a breach in the VPN where an employee has stolen data using a personal laptop along with using the company assignment computer. You review the logs from the IDS, remote access systems, and, file servers and confirm this belief. Your employer wishes to gain access to the personal laptop used for the breach to determine the full extent of the data stolen. The guilty employee’s lawyer claims that the laptop is not identifiable.

·                     Create a formal document to the CEO of the company to account for your findings, tools used to solve the breach and what steps will be taken to prevent this type of breach from happening again. You will also need to create a press release to the Public regarding this breach. Create a disaster recovery plan for the employees and vendors in case of a breach.

·                     Things to consider: What would best be used to identify the specific laptop used for the theft? How would you acquire the identifying information? List some items that would NOT be useful to identify the specific computer used by the insider.

·                     All documents will be turned as a part of the Final Project

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Solution: -

Finding a data breach:

  • Appointing a cyber security expert: - A cyber security expect can easily figure out the source of data breach and they know how to figure out the loopholes.
  • Using data breach detection tool: Maintaining systems, applications and need to have modern detection tool. The detection tool can easily figure out from where the data has been leaked.

Tools used to find data breach:

  • NetStumbler: - it is a wireless network discovery tool which helps to detect unauthorized traffic entering into the network.
  • nMap Security Scanner: - it is another open source platform tool which is effective in security auditing and network discovery.

Ways to prevent data breaches:

  • Protect the information: it is important that you protect the sensitive information which should be protected whenever the data is stored somewhere.
  • Using a complex password: - this is mandatory that every account must be configured with complex password so that it is hard for the hackers to decode the password.

Disaster recovery plan for the organization:

  • Proper data security: The information security must have a direct tie-in towards the incident response. Incident response must respond to data breaches or even malware attacks.
  • Technologies are often used in data recovery security and it may vary from business to business and even application to application. In case of disaster, proper backup should be there so that the data is restored as soon as possible and it must not hamper the company’s data.

What would best be used to identify device involved in data breach and how to acquire identifying information:

Ans) Spotting a data breach involved device: there are several tools are there through which a data breach involved device can be identified. Through back tracking, you need to check for the logs so that the involved IP of the device can be figured out. File indicator can be used to evaluate the root cause of data breach.

So, it is important that you should look for patterns through which the external device connected to the network. The user account is identified and the involved device is spotted.

Things that are not used to detect the Computer:

  • Files: - What kinds of files are breached will not at all help in detecting the device.
  • Network: Network will not help in detecting the device that involved in the breaching.
Add a comment
Know the answer?
Add Answer to:
Final Project You work as a security administrator of a large department store chain or choose...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • The purpose of security policies is to help mitigate identified risks. Writing these policies is easier...

    The purpose of security policies is to help mitigate identified risks. Writing these policies is easier once you have created an asset inventory list, prioritized that list, and identified the major risk exposures found in those assets. The task of identifying your IT assets begins with recognizing that your IT infrastructure and supporting resources can be divided into the seven IT domains. The benefit of identifying the assets and prioritizing them across those domains is being able to document policies...

  • Choose a product/service (not the same one you are using for the final project (marketing plan)....

    Choose a product/service (not the same one you are using for the final project (marketing plan). Answer the following questions: Considering direct, online, social media and mobile marketing options, which 2 options do you feel would be the best to use in relation to the product/service you have chosen? Why? Describe the options you justified above and outline specific methods you would adopt in using those 2 options. Discuss specific uses, platforms, and messages you would ensure are marketed through...

  • Please help Network Security Fundamentals You are reviewing logs and notice that a large amount of...

    Please help Network Security Fundamentals You are reviewing logs and notice that a large amount of outbound traffic from 1:00am - 4:00am. Your company works a traditional 8:00am - 5:00pm and uses an in house backup solution. What could this be a sign of? Cloud backup Bad login information Aliens Data Exfiltration Which of the following can help protect against an insider threat? Select all that apply DLP Seperation of duties Aliens Job/Position rotation Social media can introduce considerable risk...

  • ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired...

    ***I only need the High Level Project Plan (Time to Implement)****** You have recently been hired by a new Japanese accounting firm, headquarter in Tokyo, as the director ofInformation Systems and Telecommunications. Your assignment is to assist security posture of the firm anddevelop a security structure for this new company. Write your recommendations and reasons to the firm’s CEO. The firm has 600 employees in Tokyo, 50 in Houston, and is planning to open two branch offices in India andCalifornia....

  • Final Project: Part I For Part I of your final project, you will design your plan for the scenari...

    Final Project: Part I For Part I of your final project, you will design your plan for the scenario provided below. Your project plan should include the entity relationship diagram (ERD). Scenario Imagine that you just started a new job at ABC Car Sales. You’ve been given the task of adding all the new and used car inventory to a new database management system (DBMS). You would like to manage the new and used car sales in the new DBMS....

  • Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a...

    Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. You have been informed that an employee may have been using corporate email to send confidential corporate information to one or more personal email accounts, which may or may not belong to him. You have been told that this action has been happening each business day for the last 13 days and the employee is unaware...

  • A local hospital asks you to help improve its networks fault tolerance. The hospitals network carries...

    A local hospital asks you to help improve its networks fault tolerance. The hospitals network carries critical patient care data in real time from both a mainframe host and several servers to workstations in operating rooms, doctors offices, the billing office, teaching labs, and remote clinics across the region. Of course, all of the data transferred is highly confidential and must not be lost or accessed by unauthorized personnel. Specifically, the network is configured as follows: Six hundred workstations are...

  • MGMT SS STATS, an umbrella body that facilitates and serves various Social Security Organizations...

    MGMT SS STATS, an umbrella body that facilitates and serves various Social Security Organizations/Departments within the Caribbean territories, stood poised to meet the needs of its stakeholders by launching an online database, located at www.SSDCI.gov. The database will provide members and the public with access to the full set of services that can (also) be initiated face to face; and it will provide managed, private, secure access to a repository of public and/or personal information. For example, insured persons accumulate...

  • By the time the New York identity theft fraud case was solved, over 30,000 people had...

    By the time the New York identity theft fraud case was solved, over 30,000 people had suffered a total combined loss of over $2.7 million. This money had been stolen by a ring of New York residents who had accessed the victims’ credit information and exploited that information to steal the victims’ identity. The fraud began when Linus Baptiste approached Philip Cummings about a plan to steal and sell people’s personal information. Philip Cummings had begun to work at Teledata...

  • In this assignment, you will be creating a Work Breakout Structure (WBS) for your project using the software applicatio...

    In this assignment, you will be creating a Work Breakout Structure (WBS) for your project using the software application that you have selected. Prepare the WBS, and submit the file to your instructor. This assignment is due Sunday at 11:59 p.m. All assignments should be uploaded in the Assignment area. Project Software Options There are many project management software applications that are designed to help develop project plans and schedules as well as keeping track of these plans and creating...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT