Ask Computer Engineering Expert

Read the following Case Study then answer problems: 
MILLER HARRISON WAS GOING TO MAKE THEM SORRY, and make them pay. Earlier today, his contract at SLS had been terminated, and he'd been sent home. Oh sure, the big shot manager, Charlie Moody, had said Miller would still get paid for the two weeks remaining in his contract, and that the decision was based on "changes in the project and evolving needs as project work continued," but Miller knew better. He knew he'd been let go because of that know-nothing Kelvin and his simpering lapdog Laverne Nguyen. And now he was going to show them and everyone else at SLS who knew more about security.
Miller remembered that the secret to hacking into network successfully was applying the same patience, attention to detail, and dogged determination that defending a network required. He also remembered that the first step in a typical hacking protocol was footprinting-that is, getting a fully annotated diagram of network. Miller already had one of these-in a violation of company policy, he had brought a copy home last week when Laverne first started trying to tell him how to do his job. 
As they terminated his contract today, Miller's supervisors made him turn in his company laptop and then actually had the never to search his briefcase. By then, however, Miller had already stashed all the files and access codes he needed to wage an attack.
To begin, he activated his VPN client to connect to the SLS network from his rented connection at an internet café. He realized almost immediately that Charlie moody had also confiscated the crypto-token that enabled him to use the VPN for remote access. No problem, Miller decided. If the front door was locked, he would try the back door. He cabled his laptop to the analog phone line, opened up a modem dialing program and typed in the dial-up number for SLS he had gotten from the network administrator last week. After the dialer established the connection, Miller positioned his hands on the keyboard, and then he read the prompt on his monitor.
SLS inc. Company Use Only. Unauthorized use is prohibited and subject to prosecution.
Enter passphrase:
Apparently the SLS security team had rerouted all dial-up requests to the same RADIUS authentication server that the VPN used. So, he was locked out of the back door too. Miller moved to his next option, which was to use another back door of his very own. The back door consisted of a zombie program he'd installed on the company's extranet Quality Assurance server. No one at SLS took the QA server seriously since it did not store any production date. In fact, the server wasn't even subject to all the change control procedures that were applied to other system on extranet. Miller activated the program he used to remotely control the zombie program and typed in the IP address of the computer running the zombie.no response. He opened up a command window and pinged the zombie. The computer at that address answered each ping promptly, which meant the computer itself was alive and well. Miller checked the UDP port number the zombie used and run an Nmap scan against that single computer for the port. The UDP port the zombie control dialogue used was closed tight. He cursed the firewall, the policy that controlled it, and the technicians that kept it up date.
With all of his pre-planned payback cut off at the edge of SLS's network, he decided to continue his hack by going back to the first step in his usual hacking protocol-specifically, to perform a detailed fingerprinting of all SLS internet addresses. Since the front and both back doors were locked, it was time to get a new floor plan. He launched a simple network port scanner on his Linux laptop. He restarted Nmap and configured it to scan the entire IP address range for SLS's extranet. With a single keystroke, he unleashed the port scanner on the SLS network.

Case Exercise
Miller was still working his way down his attack protocol.
Nmap started out as it usually did: giving the program identification and version number. Then it started reporting back on the first host in the SLS network. It reported all of the open ports on this server. Then the program moved on to a second host and began reporting back the open ports on that system, too. Once it reached the third host, however, it suddenly stopped.
Miller restarted Nmap, using the last host IP as the starting point for the next scan. No response. He opened up another command window and tried to ping the first host he had just port-scanned. No luck. He tried to ping SLS firewall. Nothing. He happened to know the IP address for the SLS edge router. He pinged that and got the same result. He had been blackholed-meaning his IP address had been put on a list of addresses from which the SLS edge router would no longer accept packets. This was, ironically, his own doing the IDPS he had been helping SLS configure seemed to be working just fine at the moment. His attempt to hack the SLS network was shut down cold.

problems:
1-Do you think Miller is out of options as he pursues his vendetta? Why or why not? 
2- If you think there are additional actions he could take in his effort to damage the SLS network, what are they? Why? 
3-Suppose a system administrator at SLS happened to read the details of this case. What steps should he or she take to improve the company's information security program? Why?  

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M9106245

Have any Question?


Related Questions in Computer Engineering

Does bmw have a guided missile corporate culture and

Does BMW have a guided missile corporate culture, and incubator corporate culture, a family corporate culture, or an Eiffel tower corporate culture?

Rebecca borrows 10000 at 18 compounded annually she pays

Rebecca borrows $10,000 at 18% compounded annually. She pays off the loan over a 5-year period with annual payments, starting at year 1. Each successive payment is $700 greater than the previous payment. (a) How much was ...

Jeff decides to start saving some money from this upcoming

Jeff decides to start saving some money from this upcoming month onwards. He decides to save only $500 at first, but each month he will increase the amount invested by $100. He will do it for 60 months (including the fir ...

Suppose you make 30 annual investments in a fund that pays

Suppose you make 30 annual investments in a fund that pays 6% compounded annually. If your first deposit is $7,500 and each successive deposit is 6% greater than the preceding deposit, how much will be in the fund immedi ...

Question -under what circumstances is it ethical if ever to

Question :- Under what circumstances is it ethical, if ever, to use consumer information in marketing research? Explain why you consider it ethical or unethical.

What are the differences between four types of economics

What are the differences between four types of economics evaluations and their differences with other two (budget impact analysis (BIA) and cost of illness (COI) studies)?

What type of economic system does norway have explain some

What type of economic system does Norway have? Explain some of the benefits of this system to the country and some of the drawbacks,

Among the who imf and wto which of these governmental

Among the WHO, IMF, and WTO, which of these governmental institutions do you feel has most profoundly shaped healthcare outcomes in low-income countries and why? Please support your reasons with examples and research/doc ...

A real estate developer will build two different types of

A real estate developer will build two different types of apartments in a residential area: one- bedroom apartments and two-bedroom apartments. In addition, the developer will build either a swimming pool or a tennis cou ...

Question what some of the reasons that evolutionary models

Question : What some of the reasons that evolutionary models are considered by many to be the best approach to software development. The response must be typed, single spaced, must be in times new roman font (size 12) an ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As