Principles of Information Security (MindTap Course List)
Principles of Information Security (MindTap Course List)
6th Edition
ISBN: 9781337102063
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
Expert Solution & Answer
Book Icon
Chapter 7, Problem 1CEDQ

Explanation of Solution

Trial made to hack the network:

Yes”, from the case discussed it is clear that Miller is left with no option to pursue the vendetta.

Reason:

  • Miller is required to attach tools such as fully explained network diagram of the SLS company with all the required files along with the access code that are required in attacking the network.
  • The attack is made to the network using client VPN (Virtual Private Network) and was identified that front door was closed.
  • Since, it is found closed doors at the front, the connection was tried to establish using a dial-up connection and it was again redirected to same authentication server that is used by the Virtual Private Network which made first attempt failure...

Blurred answer
Students have asked these similar questions
After reading the case presented in the module, write a short response to the following discussion questions and ethical decision making scenario. Discussion Questions Before the discussion at the start of this chapter, how do Fred, Gladys, and Charlie each perceive the scope and scale of the new information security effort? Did Fred’s perception change after that? How should Fred measure success when he evaluates Gladys’ performance for this project? How should he evaluate Charlie’s performance? Which of the threats discussed in this chapter should receive Charlie’s attention early in his planning process?
Discussion Questions Do you think Miller is out of options as he pursues his vendetta? If you think he could take additional actions in his effort to damage the SLS network, what are they? Suppose a system administrator at SLS read the details of this case. What steps should he or she take to improve the company's information security program? Consider Miller's hacking attempt in light of the intrusion kill chain described earlier and shown in Figure 7-1. At which phase in the kill chain has SLS countered his vendetta? Ethical Decision Making It seems obvious that Miller is breaking at least a few laws in his attempt at revenge. Suppose that when his scanning efforts had been detected, SLS not only added his IP address to the list of sites banned from connecting to the SLS network, the system also triggered a response to seek out his computer and delete key files on it to disable his operating system. Would such action by SLS be ethical? Do you think action would be legal? Suppose…
Based on what you what heard on the media and your readings and multimedia about the SolarWinds attack please discuss the following: What did the attack consist of? How did it originated? What are your thoughts about what government officials are saying about attribution? Could this type of attack have been avoided? How? If not what else can be done to prevent these attacks in the future? Based on your reading, what do you think was Kevin Mitnick’s motivation? What was his favorite method for hacking? Why do we need to understand the attacker’s kill chain process? Address each one in your response: Reconnaissance, Weaponization, Delivery, Exploitation, Installation, Command and Control, Actions on the target, and Impact. How can the MITRE ATT&CK Matrix help you not only understand the kill chain used by hackers to compromise an organization but also how it will help you stop attacks? Describe how it will help you with your job as a defender.
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning