Premium Essay

Spear Phish Case Study

Submitted By
Words 329
Pages 2
10-8. Why did the attackers spear-phish a contractor to Target? It’s an easier way to access their information. Attackers have the knowledge and resources to execute schemes over a period of time with spear-phish. They targeted Target during the holidays because it would be less noticeable. Targets system was not up to date and the attackers found them to be an easy target. Now Target has upgraded their system to chip-and PIN enabled cards.
10-9. Explain how a third-party contractor could weaken an organization’s overall security. They do not have the same security as the main business. Once attackers gain access they can activate a virus on the third-party and that gives them the ability to do as they wish.
10-10. Describe how data was stolen

Similar Documents

Free Essay

Antiphishing

...A Structured Analysis of PHISHING By Prasath Manimaran ID: 20038303 Table of Contents Chapter One – Introduction 1. Research Questions and Objectives……………….…………………………………………….5 Chapter Two – Literature Review & Definition of Phishing 2.1. Literature Review…………………………………………………………………………………………..8 2.1.2. Definitions of Phishing……………………………………………………………………..8 2.1.3. Outcomes of this Study…………………………………………………………………….16 2.2. Research Details 2.2.1. Scope of the Research……………………………………………………………………….17 2.2.2. Research Methodology……………………………………………………………………..17 2.2.3Inductive versus Deductive Study……..………………………………………………..20 2.2.4. Qualitative versus Quantative……………………………………………………..20 Chapter Three – Phishing in a Banking Context 3.1. Confidence in Internet Banking……………………………………………………………………22 3.1.1. Security Requirements………………………………………………………………………23 3.2. Threat Models……………………………………………………………………………………………….25 3.2.1. The Internet Threat Model……………………………………………………..25 3.2.2. Thompson Threat Model……………………………………………………….26 3.2.3. Viral Threaet Model………………………………………………………………26 3.3. The Phishing Threat Model…………………………………………………………………………..26 3.3.1. Identification of Internet Banking Components………………………………..27 3.3.2. Identification of Phishing Threats………………………………………………29 Chapter 4 – Analysis of Current Phishing Techniques 4.1. Modus Operandi………………………………………………………………………………………….…36 4.2. Roles of Adversary in Phishing………………………………………………………………………...

Words: 15039 - Pages: 61

Premium Essay

Critical Thinking

...fourth EDItION fourth EDItION This clear, learner-friendly text helps today’s students bridge the gap between Its comprehensiveness allows instructors to tailor the material to their individual teaching styles, resulting in an exceptionally versatile text. Highlights of the Fourth Edition: Additional readings and essays in a new Appendix as well as in Chapters 7 and 8 nearly double the number of readings available for critical analysis and classroom discussion. An online chapter, available on the instructor portion of the book’s Web site, addresses critical reading, a vital skill for success in college and beyond. Visit www.mhhe.com/bassham4e for a wealth of additional student and instructor resources. Bassham I Irwin Nardone I Wallace New and updated exercises and examples throughout the text allow students to practice and apply what they learn. MD DALIM #1062017 12/13/09 CYAN MAG YELO BLK Chapter 12 features an expanded and reorganized discussion of evaluating Internet sources. Critical Thinking thinking, using real-world examples and a proven step-by-step approach. A student ' s Introduction A student's Introduction everyday culture and critical thinking. It covers all the basics of critical Critical Thinking Ba ssha m I Irwin I Nardone I Wall ace CRITICAL THINKING A STUDENT’S INTRODUCTION FOURTH EDITION Gregory Bassham William Irwin Henry Nardone James M. Wallace King’s College TM bas07437_fm_i-xvi.indd i 11/24/09 9:53:56 AM TM Published by McGraw-Hill...

Words: 246535 - Pages: 987

Premium Essay

Marketing

...fourth EDItION Critical Thinking A student ' s Introduction Ba ssha m I I rwi n I N ardon e I Wal l ac e CRITICAL THINKING A STUDENT’S INTRODUCTION FOURTH EDITION Gregory Bassham William Irwin Henry Nardone James M. Wallace King’s College TM TM Published by McGraw-Hill, an imprint of The McGraw-Hill Companies, Inc., 1221 Avenue of the Americas, New York, NY 10020. Copyright © 2011, 2008, 2005, 2002. All rights reserved. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written consent of The McGraw-Hill Companies, Inc., including, but not limited to, in any network or other electronic storage or transmission, or broadcast for distance learning. This book is printed on acid-free paper. 1 2 3 4 5 6 7 8 9 0 DOC/DOC 0 ISBN: 978-0-07-340743-2 MHID: 0-07-340743-7 Vice President, Editorial: Michael Ryan Director, Editorial: Beth Mejia Sponsoring Editor: Mark Georgiev Marketing Manager: Pam Cooper Managing Editor: Nicole Bridge Developmental Editor: Phil Butcher Project Manager: Lindsay Burt Manuscript Editor: Maura P. Brown Design Manager: Margarite Reynolds Cover Designer: Laurie Entringer Production Supervisor: Louis Swaim Composition: 11/12.5 Bembo by MPS Limited, A Macmillan Company Printing: 45# New Era Matte, R. R. Donnelley & Sons Cover Image: © Brand X/JupiterImages Credits: The credits section for this book begins on page C-1 and is considered...

Words: 240232 - Pages: 961

Premium Essay

Management Information Systems

...Technology in Theory • Aksoy, DeNardis Office Applications in Business Problem-Solving Cases in Microsoft Access & Excel, Sixth Annual Edition • Brady, Monk Succeeding in Business Applications with Microsoft Office 2007 • Bast, Gross, Akaiwa, Flynn, et.al Succeeding in Business with Microsoft Office Excel 2007 • Gross, Akaiwa, Nordquist Succeeding in Business with Microsoft Office Access 2007 • Bast, Cygman, Flynn, Tidwell Databases Database Systems, Eighth Edition • Rob, Coronel Concepts of Database Management, Sixth Edition • Pratt, Adamski Data Modeling and Database Design • Umanath, Scamell A Guide to SQL, Seventh Edition • Pratt A Guide to MySQL • Pratt, Last Guide to Oracle 10g • Morrison, Morrison, Conrad Oracle 10g Titles Oracle9i Titles Enterprise Resource Planning Concepts in Enterprise Resource Planning, Third Edition • Monk, Wagner Data Communications Data Communications and Computer Networks: A Business User’s Approach, Fourth Edition • White Systems Analysis and Design Systems Analysis and Design in a Changing World, Fifth Edition • Satzinger, Jackson, Burd Object-Oriented Analysis and Design with the Unified Process • Satzinger, Jackson, Burd Systems Analysis and Design for the Small Enterprise, Third Edition • Harris Security Management of Information Security, Second Edition • Whitman, Mattord Principles of Information Security, Third Edition • Whitman, Mattord Readings and Cases in the Management of Information Security • Whitman, Mattord Hands-On Information Security...

Words: 223685 - Pages: 895