Jane is a hacker intent on breaking into the XYZ Corporation. She uses a variety of passive
Question:
Jane is a hacker intent on breaking into the XYZ Corporation. She uses a variety of passive reconnaissance techniques and gathers extensive information about the company. Jane finds out from network administrator questions/comments in user groups the model of routers being used in the company. She finds a complete list of the IT staff and their phone numbers from a personnel directory on the company website. She also finds out what services are running by using a port scan.
Based on this scenario, consider the following questions:
1. What reasonable steps could the company have taken to prevent Jane from finding out router models and other company hardware?
2. What steps should the company take to prevent or at least reduce the efficacy of port scans?
Accounting Information Systems
ISBN: 978-0133428537
13th edition
Authors: Marshall B. Romney, Paul J. Steinbart