Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask English Expert

Case Study Analysis Guidelines

Your paper should be submitted as a 4- to 5-page Microsoft Word document with double spacing, 12-point Times New Roman font, and one-inch margins. All sources must be cited in APA format

Overview: This case study will help you analyze a cybersecurity scenario and identify which tenets were violated. Each skill in this paper is an essential part of the final project and the accompanying milestones in this course.

Prompt: Use the information provided in the scenario to analyze the cybersecurity occurrence and determine which tenet(s) were violated.

The required resources for this module detail a scenario at RSA that is similar to the one you will analyze for this assignment. Review each module resource and analyze the security breach that occurred with RSA. Note similarities between this example and the provided scenario for this assignment.

Scenario: In late May of 2011, Lockheed-Martin was targeted by a cyberattack. Lockheed-Martin claimed that they discovered the attack early and reacted quickly, with the result that no real harm was done.

The basis for this breach was with two-factor authentication, where a "factor" in authentication can be something you know, something your are, or something you have. A two-factor authentication system requires you to present instances of two of these three to authenticate with a system. Lockheed-Martin employed a two-factor authentication system that combined a password (something you know) with SecurID, a system produced by RSA labs that provides the "something you have" factor.

A SecurID is a small key fob that displays a number, which changes every 60 seconds. Each key fob has a unique number called its seed, which determines what number is shown in the fob at any given point in time. The server stores your username, password hash, and the seed value for your key fob, and this allows it to determine what number is showing on your key fob (as the fob is synched with your account). When you authenticate, you enter your username and regular password, then you look at the key fob and enter in the number shown there. The authentication server knows what number should be shown at that time on the key fob, and so can verify that the key fob is indeed a thing you have. This is called a one-time password (OTP) system.

In March of 2011, someone attacked RSA with a relatively unsophisticated phishing attack with an attached Excel file with embedded code that exploited a zero- day vulnerability in Adobe Flash.

This enabled attackers to set up a "backdoor"-a way for them to get into the computer-where the attackers were able to steal from RSA the seed values of SecurID key fobs.

In late May of 2011, the attack moved to Lockheed-Martin, where attackers managed to get a keylogger onto a company system. The keylogger recorded the username, password, and SecurID OTPs used by the victim when he or she authenticated, along with the date and time of the log in.

Two-factor authentication is designed for just this kind of scenario. The attacker cannot authenticate because knowing the username, password, and an old OTP is not enough; the current OTP is required. However, these attackers stole seed values. For a given seed value and date/time, they could calculate the number the key fob with that seed value would display at that date and time. All the attackers had to do was to write a program that would compute, for every stolen seed value, the number that would have been showing at the date and time the keylogger recorded the victim's login. Once they found a match with the OTP the keylogger recorded, they would have matched a seed value with a username. This appeared as if the attackers actually had the key fobs themselves.

Critical Elements

Your paper should include these critical elements:

  • Identification of cybersecurity tenets that were violated and rationale of cause
  • Analysis of cybersecurity occurrence and data defense
  • Recommendation of best practices to prevent further recurrence

English, Academics

  • Category:- English
  • Reference No.:- M92497638
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in English

Persuasive presentationthink of a problem in your company

Persuasive Presentation Think of a problem in your company, neighborhood, schools, or community, to which you would like to offer a solution. Develop a presentation in PowerPoint, that you might use to present your argum ...

In discussion forum 1 post your response to the following

In Discussion Forum 1, post your response to the following discussion question. Reply to at least two classmates' responses by the date indicated in the Course Calendar. Chapters 7 through 10 of the section "Growing Up" ...

Assignmentanalyze and inferplease write about the following

Assignment Analyze and Infer Please write about the following video: McDonald, J., (1940). Before I'll be beaten. As you watch the video, think about the following: What do you think the song means about Being Beaten? Wh ...

Question choose one topic per chapter 100 words maximum1

Question: Choose one topic per chapter. 100 words maximum. 1. "Classic Rock" format becomes huge during the 1990s (and through today). Taking into account the Rock buying public at that time, how significant was the move ...

Write an answer to the questionis beauty in the eye of the

Write an answer to the question: Is beauty in the eye of the beholder? This essay should be about 450 words. MLA should be the format. Be sure to make any citations clear (give page numbers for any text taken from Scruto ...

As discussed in chapter 5 of our text and in the video

As discussed in Chapter 5 of our text and in the video Building Literacy Competencies in Early Childhood, exposure to stories, poetry, nursery rhymes, and songs encourages literacy development (Coats, 2013). Identify a p ...

Write a literary essay on disgrace by j m coetzee novel

Write a literary essay on Disgrace by J. M. Coetzee Novel: Disgrace by J. M. Coetzee Be aware that you will be writing about a novel, which in its broadest sense is any extended fictional narrative almost always in prose ...

Question choose one of the professional scenarios provided

Question: Choose one of the professional scenarios provided in Blackboard under the Student Center tab, or click here to view them in a new window. Write a Professional Email Message (in the form of Figure 5.1 on page 84 ...

After reading the symposium reflect on the ideas arguments

After reading the Symposium reflect on the ideas, arguments, conceptions, and perspectives Plato offers. Consider one of them that you find intriguing, compelling, or important to your understanding of the reading. In do ...

Rationalization consider frosts the road not taken a

Rationalization. Consider Frost's "The Road Not Taken." A common (mis)interpretation of the poem is that it's about taking the nontraditional path. However, it seems to be more about a poem about rationalizing one's acti ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As