Question: PLEASE SOLVE THIS ASSIGNMENT!! Security Technology Miller Harrison was going to make them sorry and make them pay. Earlier today, his contract with SLS had

PLEASE SOLVE THIS ASSIGNMENT!!

PLEASE SOLVE THIS ASSIGNMENT!! Security Technology Miller Harrison was going to make

them sorry and make them pay. Earlier today, his contract with SLS

Security Technology Miller Harrison was going to make them sorry and make them pay. Earlier today, his contract with SLS had been terminated, and he'd been sent home. Oh sure, the big shot manager, Charlie Moody, had said Miller would still get paid for the two weeks remaining in his contract, and that the decision was based on "changes in the project and evolving needs as project work continued," but Miller knew better. He knew he'd been let go because of that know-nothing Kelvin and his simpering lapdog Laverne Nguyen. And now he was going to show them and everyone else at SLS who knew more about security. Miller knew that the secret to hacking into a network successfully was to apply the same patience, attention to detail, and dogged determination that defending a network required. He also knew that the first step in a typical hacking protocol was footprinting - that is, getting a fully annotated diagram of the network. Miller already had one of these-in a violation of company policy, he had brought a copy home last week when Laverne first started trying to tell him how to do his job. When they terminated his contract today, Miller's supervisors made him turn in his company laptop and then actually had the nerve to search his briefcase. By then, however, Miller had already stashed all the files and access codes he needed to wage an attack. To begin, he activated his VPN client to connect to the SLS network from his rented connection at an Internet cafe. He realized almost immediately that Charlie Moody had also confiscated the crypto-token that enabled him to use the VPN for remote access. No problem, Miller thought. If the front door was locked, he would try the back door. He cabled his laptop to the analog phone line, opened up a modem dialing program and typed in the dialup number for SLS he had gotten from the network administrator last week. After the dialer established the connection, Miller positioned his hands on the keyboard, and then he read the prompt on his monitor: SLS Inc. Company Use Only. Unauthorized use is prohibited and subject to prosecution. Enter Passphrase: IS486 - Managing Cyber Security Operations Case Study Lab Assignment \#4

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related General Management Questions!