Tuesday, October 8, 2019
Week 1 CYB Assignment Example | Topics and Well Written Essays - 500 words
Week 1 CYB - Assignment Example They challenged the assumption that every potential buyer who walks in the showroom is genuinely interested in buying a car and photographed motion sensors and cameras in the building. They then used a rogue wireless access point and carried out social engineering to gain access to sensitive information on customers. This means that security at the organisation was highly compromised because, apart from the customer information, the collection of the expensive, luxury vehicles was also easily accessible to potential thieves, and the Tiger Team actually made away with one. The security at the organisation is not yet perfect, and ways in which it could be defeated include the ability of intruders to gain physical access into the premises unless the buildingââ¬â¢s design is improved. Then, since the Tiger Team was able to install a rogue camera that filmed the alarm keypad without being noticed, it means the organisation does not carry out regular inspections of its installed devices. It is often assumed that computer systems can best be protected by practicing cyber hygiene. However, this assumption can be challenged because most devicesââ¬â¢ default settings are configured by the manufacturers to facilitate their ease of use at the expense of security. The result is usually vulnerabilities that do not require experienced hackers to exploit. Essentially, this means that any user of a system, and not necessarily a hacker, is a potential threat to its security. The Internet has grown into a concept that relies on an interwoven system of trust for its security. However, guest users of a system may stumble upon administrator accounts which grant them higher degrees of control of other computersââ¬â¢ settings and programs (Pelgrin, 2013). Approaching such a situation from a red teamerââ¬â¢s perspective, it is easy to see that a user can
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.