CYB_250_Stepping_Stone_Two.docx - CYB 250 Stepping Stone Two Template Howard Threat Model Incident Bank Attacks Bluetooth Bug Attackers Undeclared

CYB_250_Stepping_Stone_Two.docx - CYB 250 Stepping Stone...

This preview shows page 1 - 3 out of 4 pages.

CYB 250 Stepping Stone Two Template Howard Threat Model Incident Bank Attacks Bluetooth Bug Attackers Undeclared Unknown Tools Man-in-the-Middle-Attack Man-in-the-middle-attack Vulnerability Implementation – users and employees were not properly trained on how to detect phishing or how to handle suspicious messages. Design – there was not sufficient detection software nor enforcement in place. Design – no security keys utilized Action Probe, Scan, Authenticate, Bypass, Spoof, Read, Steal, Modify These attackers were able to gain access to the network through spoofed emails. Once these were opened sniffers were on the network. Scan, Authenticate, Bypass, Read, Steal Any Bluetooth user within 30 feet were suspectable to unsecured login by would be attackers Target Account, Data, Network, Internetwork Any person owning a Bluetooth device Unauthorized Result Increased access, theft of resources Theft of resources, Increased Access Objective Financial Gain Unknown In the 2015 European bank attack, many things went wrong. From employees not knowing how to detect phishing emails, clients not understanding how to ensure they are on the banks’ website, to sub-par software this attack was imminent. Although we
Image of page 1
have not learned the names of the attackers, nor their reasons (other than financial gain) for the attack, or if they had any political affiliation, we can learn from the attack itself.
Image of page 2
Image of page 3

You've reached the end of your free preview.

Want to read all 4 pages?

  • Fall '19

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern

Stuck? We have tutors online 24/7 who can help you get unstuck.
A+ icon
Ask Expert Tutors You can ask You can ask ( soon) You can ask (will expire )
Answers in as fast as 15 minutes
A+ icon
Ask Expert Tutors