Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Information system security, Computer fraud and Abuse Techniques sample questions and answers

Beoordeling
-
Verkocht
-
Pagina's
24
Cijfer
A
Geüpload op
25-10-2022
Geschreven in
2022/2023

The documents contains sample questions and answers in respect to Information System security. It involves basic definition of terms and practical case scenarios on the most tested question on the unit.

Instelling
Vak

Voorbeeld van de inhoud

Information Systems Security


COMPUTER FRAUD AND ABUSE TECHNIQUES

SUGGESTED ANSWERS TO DISCUSSION QUESTIONS

6.1 When U.S. Leasing (USL) computers began acting sluggishly, computer operators
were relieved when a software troubleshooter from IBM called. When he offered to
correct the problem they were having, he was given a log-on ID and password. The
next morning, the computers were worse. A call to IBM confirmed USL’s suspicion:
Someone had impersonated an IBM repairman to gain unauthorized access to the
system and destroy the database. USL was also concerned that the intruder had
devised a program that would let him get back into the system even after all the
passwords were changed.

What techniques might the impostor have employed to breach USL’s internal
security?

The perpetrator may have been an external hacker or he may have been an employee with
knowledge of the system.

It seems likely that the perpetrator was responsible for the sluggishness, as he called soon
after it started. To cause the sluggishness, the perpetrator may have:

 Infected the system with a virus or worm.

 Hacked into the system and hijacked the system, or a large part of its processing
capability.

To break into the system, the perpetrator may have:

 Used pretexting, which is creating and using an invented scenario (the pretext) to
increase the likelihood that a victim will divulge information or do something they
would not normally do. In this case, the perpetrator pretended to be an IBM software
troubleshooter to get a log-on ID and password.

 Used masquerading or impersonation, which is pretending to be an authorized user to
access a system. This was possible in this case once the perpetrator obtained the log-on
ID and password. Once inside the system, the perpetrator has all the privileges attached
to the user ID and password given to him.

 Infected it with a Trojan horse, trap door, logic or time bomb, or some other
malware.

 Made unauthorized use of superzap, a software utility that bypasses regular system
controls.
6-1

, Information Systems Security



What could USL do to avoid these types of incidents in the future?

 Determine how the perpetrator caused the sluggishness and implement the controls
need to prevent it from happening again.

 Conduct a complete security review to identify and rectify and security weaknesses.

 Only reveal passwords and logon numbers to authorized users whose identities have
been confirmed. When someone calls and indicates they are an IBM employee, verify
their identity by calling IBM back on their known and published service number.
Even better would be to call and talk to the IBM representative assigned to USL.

 Provide employee training aimed at helping them not fall victim to the many forms of
social engineering.

 After providing outsiders with temporary user IDs and passwords, block their use as
soon as the need for them is passed.

Other control considerations that could reduce the incidence of unauthorized access
include:

 Improved control of sensitive data.

 Alternate repair procedures.

 Increased monitoring of system activities.




6-2

, Information Systems Security


6.2 What motives do people have for hacking? Why has hacking become so popular in
recent years? Do you regard it as a crime? Explain your position.

Hacking is the unauthorized access, modification, or use of an electronic device or some
element of a computer system. Hacking represents illegal trespassing and is punishable as
a federal crime under the 1986 Computer Fraud and Abuse Act.

Hacking has increased significantly in popularity for several reasons. Perhaps the most
important is the increasing use of personal computers and the Internet and the
corresponding rise in the number and the skill level of the users. In other words, there are
more systems to break into, and there are more people capable of breaking in.

Most hackers are motivated by monetary rewards. Hackers have found many ways to
profit handsomely from their hacking activities. Others hackers seek to destroy data, to
make unauthorized copies of the data, or to damage the system in some way.

Some hackers are motivated by the challenge of breaking and entering a system and many
do so with no intent to do harm. They may feel that hacking is a "right" enjoyed by
computer users in a "free information" society. Many of these benign hackers also argue
that hacking rarely does any harm to a computer system and is acceptable behavior.




6-3

Geschreven voor

Vak

Documentinformatie

Geüpload op
25 oktober 2022
Aantal pagina's
24
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
JANYANGO

Maak kennis met de verkoper

Seller avatar
JANYANGO Exam Questions
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
3 jaar
Aantal volgers
0
Documenten
7
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen