Assume that you are in charge of access control in your organization as security administrator. Your Job is to assure security to the organization. Although, there has been several Data breaches to the organization as a result of bad security policies. Therefore, to assure security to the organization, you have been tasked to create a proposal on the steps that could be taken to mitigate the risk of infiltration into organizational IT infrastructure.
Your Task
Create a proposal that will be present to the functional manager of your organization detailing the steps that could be taking to mitigate the risk of data breach.
Proposal Guidelines:
1. Create the proposal using the Request for Proposal form as attached.
2. The proposal should not be more than 3 pages excluding the titled page.
3. The proposal must conform to APA 6th edition writing style.
Attached template
1
Application Security: Request for Proposal (RFP) Form
Table of Contents
Introduction
Access control Problem Statement:
Purpose Statement
Scope Statement:
Impact assessment
Budget /Financial Assessment
High-Level Functional Requirements:
Business Benefits: (Tangible and Intangible)
Special Issues or Constraints:
Summary
Conclusion
References
1
Q. Perform a search on the Web for articles and stories about social engineering attacks or reverse social engineering attacks. Find an attack that was successful and describe how it could have been prevented.
Social engineering, in the field of cyber-attacks and security systems being referred as psychological manipulation of people into performing actions or misuse of confidential information. It largely involves human interaction and manipulating people into breaking security procedures and company practices/rules in order to breach the security networks, computer
system, obtain financial documents when not supposed.
To discuss it at large, the recent social engineering attack I found where victim is the giant retail company in United States called Target corporation. Target is the 8th largest retailer company in North America. The incident happened at target’s point of sale systems in the year 2013. The result of incident has enabled hackers to gain access to a sum of 40million user credit and debit card information. So, it is pretty huge.
The incident happened because for target has given remote access to its network including payment (which should be secure and isolated from other networks) to its Air conditioning vendor Fazio mechanical services. The hackers tried with phishing email that installed malware type of citadel Trojan on the victim’s machine, through which got access credentials to target network. And installed malware on target’s network which extracted the user payment information from the infected machine.
So, from the above details target corporation was attacked by cyber attackers. Through one of the common method of attacking which is phishing. If we go back to what is phishing – phishing is a technique of fraudulently obtaining private information from a user by sending a fraudulent email or text which seems as original message from the bank or a credit card company or any service provider. The link contains a dark web link which then collects all the user info as input it and then uses it to gain access to victim’s accounts and cause financial or security issues.
The above phishing attack happened with Target corporation might have been successfully prevented if:
1. Target should have kept its payment network isolated and secured it with some extra authorization tokens.
2. Target should have its own cyber security team to tackle any breaches, or any security issues because gaining access to such huge data is time taking process, so they had enough time to retrieve it, which is only possible if the system is not under surveillance for any unusual activities.
3. vendor should have had a security for all its employees access to its customer’s database.
4. More scrutiny before allotting contracts to any third-party vendor.
5. Give access to only for what is needed, in this case for vendor who is to support AC absolutely doesn’t need access to payment systems.
Reference :
I. Ghafir, V. Prenosil, A. Alhejailan and M. Hammoudeh, “Social Engineering Attack Strategies and Defence Approaches,” 2016 IEEE 4th International Conference on Future Internet of Things and Cloud (FiCloud), Vienna, 2016, pp. 145-149.
doi: 10.1109/FiCloud.2016.28
Mann, Ian. (2008). Hacking the Human: Social Engineering Techniques and Security Countermeasures Published by Gower Publishing Ltd.
ISBN
0-566-08773-1
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.