Vut2 Task 1

In: Business and Management

Submitted By saltywounds
Words 1020
Pages 5
To: Boss
From: Tiffany Valdes
Date: August 1, 2014
Subject: Recent Security Breach
Our company has recently been the victim of a social engineering attack that has resulted in a virus spreading through the corporate system. I believe this was accomplished by an advanced social engineering technique known as voice phishing or phishing, which usually utilizes email. An attacker contacted our offices in an attempt to gain sensitive data; this was done either by phone or email. However since company email is not known to the public it was more than likely done by phone. After contacting someone in our offices the attacker convinced that person to divulge one of our supervisors’ email addresses.
After the attacker gained this knowledge he or she had all the information needed to launch this attack. After creating a virus and injecting it into the email using a seemingly harmless looking link, to our corporate website no less. The attacker sent this to the supervisors email address. Once the supervisor opened the email and clicked on the link a virus was unleashed on the computer and spread through our system. This virus is causing all of our devices on the network to run terribly slow and has also recorded administrative usernames and passwords and passed this information on to the attacker. This information was used by the attacker to access confidential files on our system.
Furthermore, the email was sent from a fabricated address. So if we were to try to reply to the email to trace the email back to the owner to prosecute the offender it would be unsuccessful.
Ultimately I have concluded the following has taken place:
· An attacker mislead an employee and convinced him or her to release a supervisor’s email address.
· Using that address the attacker sent a malicious virus as an email attachment to said supervisor.
· After which the supervisor innocently…...

Similar Documents

Task 1

...Task 2 Financial and Leadership Strengths and Weaknesses of the Utah Symphony The financial strengths of the Utah Symphony will now be addressed. One financial strength of the Symphony is the amount of endowments it receives. There are two groups, I and II, which receive endowments. The Utah symphony is in group II and that group gets an average of $8.8 Million per year (Delong & Ager, 2005, p. 4). Another major strength would be the amount of revenue brought in by performances. The 2000-2001 season saw revenue at over $3 million and the projected amount for the next season is over $4 million. The total amount between contribution, endowments, and revenue is over $12 million for the 2000-2001 season and is projected to be over $13 million for the next (Delong & Ager, 2005, p. 15). The financial weaknesses for the Symphony are almost as much as the strengths however. The major weakness in this organization is the salaries and benefits for the musicians. Because they are under contract, the musicians have a set salary with periodic increases. The expense for this is over $10 million (Delong & Ager, 2005, p. 15). This ends up being a huge expense and leaves very little in the way of profit. Another item that adds to the financial weakness is the fact that ticket prices are projected to only increase by 1% while expenses are expected to increase by at least 2.5% (Delong & Ager, 2005). With expenses increasing by a greater rate than income, this will have a detrimental effect...

Words: 3121 - Pages: 13

Task 1

...The main thing to consider in all of these aspects would be the trends in healthcare. What are other organizations doing? This summary will take a look at the advantages and disadvantages of building, leasing or renting a new facility for the orthopedic line at Trinity Community Hospital. Hospital construction, like most other construction, continues to struggle to recover from the years of economic hardship. Advantages 1. Building- 5,000 sq. feet PT center- $120 per sq. foot- $600,000 The facility would be new and the hospital would have complete control over the design of the expansion. This would give us access the also make modification without approval from any outside parties. With this process the hospital would be able to make energy efficient modifications that might be present in the current facility. These processes would be able to save the hospital on operating cost and set a leading role for healthcare facilities that are going “green”. Building a new facility would help increase in value which would also in turn increase the equity of the hospital. The hospital will also have the ability of leasing any extra space which would build revenue. 2. Leasing- 5000 sq. foot MOB adjacent to hospital-$20 per sq. foot With leasing, the hospital would not have to risk any investment losses that might occur when building or buying a facility. ***One major advantage to this is that there is not as much cash needed up front in order to occupy the space. ......

Words: 773 - Pages: 4

Vut2 Task 1

...To: Boss From: Brandon Moore Date: August 1, 2011 Subject: Social Engineering Attack on the Company Recently several of our user's have reported slowness of their computers. Not coincidentally, each of these users had also received a suspicious email reporting a problem with a particular item on the company website. This email contained a URL which, upon clicking, directed the user to a page in which nothing appeared out of the ordinary. It is my conclusion that both these events are intertwined and the users have contracted a computer virus, specifically a Trojan virus, which allows this attacker to gain access to the computer systems it infects. The attacker was able to accomplish this by manipulating our employees into believing they had a legitimate issue to raise with the company. Once they clicked on the link in the email, they were likely directed to a site that appeared to look the same as the company’s website, or they were sent to another site which downloaded the virus and were quickly redirected to a legitimate page before the user would ever notice. Additionally, the email address that contained the malicious URL had a “made-up” email address configured as the “Reply-To” so that when a user attempted to reply the email would not get anywhere. In conclusion, the actions that ultimately took place are as follows: ← User's received an email that appeared to be legitimate, but instead came from an attacker looking to gain access......

Words: 1096 - Pages: 5

Vut2-Rtft Task 1

...UVT2-RTFT Task 1 Competency 427.2.4: Advanced Social Engineering William J. Lawson MS Information Security & Assurance - 5/1/13 Student ID:000311942 My Mentor: Mary Gordon c: 317-448-3045 Indianapolis, IN - Eastern Time wlawson@my.wgu.edu[->0] A. Create a memo discussing how you believe the intruder gained access to the company's network using social engineering. Incident Memo to Management Recently The Company was a victim of a Social Engineering (SE) attack, perpetrated by an unknown entity. Social Engineering is a method used by confidence men (con-men) to acquire information through human interaction that will be used to support a cyber attack. It often involves some form of trickery. In this case a supervisor assigned to handle customer complaints received an email from a suspected customer claiming that one of the products listed on the website was incorrect. The email also included a URL to the web page in question. I suspect that the attacker acquired the Supervisor's email address by first contacting the customer support desk and posing as disgruntled customer. Once the customer (attacker) stated his/her complaint to the employee and the employee responded the customer pretended that he was not satisfied and stated to the employee that his complaint was not completely satisfied. He then asked the employee for the supervisor's name, and contact information. In order to satisfy the customer the employee provides......

Words: 1996 - Pages: 8

Task 1

...Business Research Report Title Presented to: Assessment Code: RWT1 Student Name: Student ID: Date: Mentor Name: Table of Contents Executive Summary 3 Introduction 4 Research Findings 4 Finding Number 1 4 Finding Number 2 5 Finding Number 3 5 Recommendations 5 Conclusion 6 References 7 Executive Summary Task instruction: Prepare a business report based on your research findings that includes: 3. Executive summary (suggested length of 1 page) that overviews the purpose of this report. The executive summary should be the last section you write after the remainder of the report is completed. The executive summary is a mini-version of your paper and should not exceed one page. For information about executive summaries, please refer to the study materials. Please note that your executive summary, and your paper, should be written using single spaced text. Introduction Task instruction: Prepare a business report based on your research findings that includes: 4. Introduction (suggested length of 1 page) that will: a. Introduce the subject and purpose of the report; b. Preview the main ideas of the report; c. Establish your relationship to the audience. It is recommended that you use single spaced text as you see here. Regarding item 4c, please keep in mind that your relationship with the audience will come from the scenario you selected from the topic list. In some cases your position is specified. In others you will need to define......

Words: 1226 - Pages: 5

Task 1

...A. Profit maximization is the act of seeking 1. Total revenue = income generated by business Total cost = fixed costs + marginal costs Accounting profit from this standpoint is total revenue – the total cost = profit. Profit maximization from this standpoint is quite simply increasing your profit to as high a level as possible. 2. Marginal cost is the extra cost incurred per additional unit of product Marginal revenue is the extra revenue generated per additional unit of product A firm looking for profit maximization from the marginal revenue to marginal cost perspective is going to find the intersecting point between marginal revenue and marginal cost. Profit maximization occurs when marginal revenue equals zero but never below. B. Marginal revenue is the extra revenue that is added for every unit of output that is added. For Company A, marginal revenue follows a steady decrease as additional units are added. C. Marginal cost is calculated as additional costs that are incurred for each additional unit of output that is added. For Company A, marginal cost follows a steady increase as additional units are added. D. Company A can reach profit maximization when they produce 8 units of product. It is at this point that marginal cost and marginal revenue intersect and they are able to attain the highest level of profit. E. If marginal revenue is greater than marginal cost then output should be increased until they are equal F. Subsequently, if marginal cost is...

Words: 271 - Pages: 2

Task 1

...JDT2 Task 2 | The Business of Ethics | | | | JDT2 Task 2 The Business of Ethics * Metal whistle contains small traces of lead. * Primary market: Elementary schools. * Large shipment to be shipped to South America by week’s end. * Cost to reproduce and repackage toy collection, $100,000. The Business of Ethics * Metal whistle contains small traces of lead. * Primary market: Elementary schools. * Large shipment to be shipped to South America by week’s end. * Cost to reproduce and repackage toy collection, $100,000. The Business of Ethics Metal Whistles in Elementary School Toy Collection Recently, it has been discovered that the toy collection that is planned to be sent at week’s end to elementary schools in South America, did not pass U.S. satisfactory limits for children ages 7 and younger due to the metal whistle included in the toy collection containing small traces of lead. Listed below are three possible alternatives that have been identified to address the whistle problem. 1. Replace the metal whistle with a plastic whistle. 2. Find an alternative toy, i.e. flash cards, rubber ball, stickers to replace the metal whistle. 3. Remove the metal whistle from the toy collection. The Utilitarian Method was used for selecting the alternatives, as this method evaluates an act in the nomenclatures of consequences or outcomes. It endeavors to accomplish the maximum good for the maximum amount while......

Words: 1623 - Pages: 7

Qlt 1 Task 1

...Mike Henkle QLT1 Task 5 Western Governors University A. Create a story problem using one of the above real-world scenarios as a basis, including realistic numeric values, by doing the following: 1. Describe the real-world problem. I was looking into phone plans and stumbled upon T-Mobile, and I decided that I needed a cell-phone and took a look at the plans. T-mobile had one plan that was 50 dollars a month and is unlimited talk, text and web, T-Mobile also has a plan for 30 dollars a month for 1,500 talk and text minutes. After you go through your allotted 1,500 talk and text time was up, the cost skyrockets up to 10 cents a minute. 10 cents a minute comes out to 6.00 per hour, I thought in my head. I decided that instead of jumping into a decision about phone plans, that I should first go home and do the math. I wanted to figure out which plan was going to be the most cost effective, and which plan would suite my needs the best. 2. Explain all needs (e.g., financial, non-financial, situational) of the hypothetical consumer. The needs include many different factors: • The first and most important factor how much do you use your phone? The breaking point on the problem today is 200 talk or text above the 1500 minute plan and I will be paying less up front but more on the back end which is no good. If I chose the 1500 minute plan, I will not want to be going over the 1500 minutes as then the cost would go up to 10......

Words: 1163 - Pages: 5

Edp 1 Task 1

...Running Head: Children's Literature Task 1 1 Children;s Literature Task 1 Arthur Carroll Western Governor's University Children's Literature Task 1 2 Children's Literature Task 1 It is well known that the world is filled to the brim with a rich history in athletics, education, science, politics, and the arts. What is not common knowledge is the history and richness of children's literature and how it eventually became what it is today. Just like most things, what we now know as children's literature is nothing like what it was originally, it has transformed into something else entirely. Nonetheless, it has as colorful a history as it does some of it's own books. Before children's literature was ever even written down it was given to children in a less tangible way; orally. Prior to publishers like Scholastic and Golden Books existence, the technology to write books was long and tedious, especially if the author was trying to make many copies. So instead, children's literature was told out loud where many could hear it at once and the time factor for preparation was at a minimum. Once authors had better technology to help simplify the process of physical writing, oral literature transformed into written literature. It wasn't always computers or even typewriters though, written used to literally mean written. Like the transformation from mouth to pen, pen evolved to......

Words: 882 - Pages: 4

Task 1 a

...Risk Management: Task 1A Dave Christian Western Governors University Author Note Research conducted by Dave Christian, College of Business, Western Governors University. Dave Christian is now founder at Helpology. This paper is referenced as an American Psychological Association (APA) research paper template available for free, worldwide use at Helpology (helpology.org) categorized under: Helpology Lifelist/Respect/Writing/FREE Helpology APA. Correspondence concerning this paper should be addressed to Dave Christian, Founder, Helpology, 2340 E. University Dr., Lot 85, Tempe, AZ 85281; Phone: (480) 331-9631; Email: Mr.Dave.Christian@gmail.com; Web site: helpology.org. Risk Management: Task 1A One of the world's wealthiest investors of all time, Warren Buffett (n.d.), said, "Risk comes from not knowing what you're doing." Furthermore, "Denial is a common tactic that substitutes deliberate ignorance for thoughtful planning," said risk management author Charles Tremper (n.d.). As a newly hired consultant, we have been tasked with the duties of creating and presenting a risk management/business contingency plan for our first client. The legal department and the IT department have both expressed concerns regarding the ethical use and protection of sensitive data, customer records, and other information systems content. In the interest of creating confidence and job satisfaction in this new position, our new employer has decided to let us select our first......

Words: 3363 - Pages: 14

Vut2 Task 1 Memo Checklist

...to a web page that rendered seamlessly without any obvious error, that is the clue that the supervisor 1 was redirected to a web page that merely appeared to be the truly valid web page, but actually a malicious copy of such. As a result, malware was then installed which allowed the unknown evil-doer to have access to that computer by installation of a remote access trojan and data crawler, which offered 24 hour administrative (the highest of permissions) access (as in especially while that user was sleeping) to that computer and, ultimately the entire network infrastructure. Being that supervisor emails are not made public, it is possible that an individual corresponded by email with a supposed customer, perhaps pretending to be irate and unsatisfied, who was able to obtain the supervisor’s email by causing anxiety upon the unsuspecting employee over an “escalated” situation. Another possible method is that one received a call from a supposed frustrated customer who requested the contact info of the supervisor, perhaps along with name and work phone number, demanding only to communicate with such. Additionally, one can pretend to be from the state attorney’s office or better business bureau, without actually identifying oneself, and suggesting investigation of unresolved customer complaints and/or disputes. 2 SECURITY RECOMMENDATIONS CHECKLIST 1. Remove Admin level permissions from all user accounts, changing them to only user level permissions,......

Words: 1895 - Pages: 8

Task 1

...is over 75k people (Walmart, 2014). Walmart and Sam’s club have been able to produce large warehouse type stores in 4203 locations in the US alone and 6107 outside the US in countries like: Brazil, Argentina, Canada, Chile, China, India, Japan and Mexico. (Walmart 10-K) They have truly become a worldwide company. But what about those people who aren’t near a Walmart…there is an online store that a person can access. Most of Walmart’s products are available on their online store and they offer free shipping on orders over $50 (Alaska and Hawaii excluded). One of the things that are often overlooked when discussing Place, is how that place will be ran. Walmart and Sam’s Club employs over 2.1 Million people throughout their company and 1% of the total workforce in the US (Business Insider, 2014) Price Here is the number one topic that people immediately think about when they go shopping…what is it going to cost me? When a business sells a product they have to think, “What is the product worth to their customers?” Walmart has successfully come up with a great marketing strategy that would have put all the other businesses out of work if they didn’t do the same, they even implemented in into their Sam’s club stores. In 2004, Walmart introduced “Price match guarantee”. Walmart and Sam’s would match any advertised price from their competitors. This completely changed the way that they had to price their products. Instead of having a research team research each......

Words: 3131 - Pages: 13

Task 1

...sources, such as focus groups with older adults and/or youth, epidemiological data from the health department or department of vital statistics, investigations of community resources from stakeholders or faith-based organizations, and/or surveys. You do not have to answer every question listed in the assessment tools. Each of these tools can be found either in the web links section or as an attachment to this task.  •   Population Economic Status Assessment•   Neighborhood/Community Safety Inventory•   Cultural Assessment Tool•   Disaster Assessment and Planning Guide•   Windshield Survey•   Population Health Scavenger Hunt Note: The name of each of the six tools should be identified in the needs assessment summary, along with a brief summary of how each of the six tools was used in the needs assessment. 1.  Interpret the collected data using concepts of epidemiology and health determinants (e.g., birth rate, death rate, rates of disease, morbidity). C.  Formulate an appropriate community diagnosis for the selected community by doing the following (suggested length of 4–6 pages):1.  Identify the top three problems for the selected community based on the Healthy People 2020 goals.a.  Discuss the problems in relation to the Healthy People 2020 goals.2.  Select one of the problems identified in part C1 that you would like to investigate further, and do the following:a.  Discuss community resources (e.g., Public Health Department, American Red Cross, American Heart) that are......

Words: 648 - Pages: 3

Task 1

...1. Bill Bailey could use Maslow’s theory of motivation in order to show support of the merger by appealing to people’s most pressing needs within the Utah Opera Organization. (Krietner, 2010) People ultimately react in a way that serves their own needs and aspirations. Bill Bailey would need to tap into those needs in order to make sure the merger goes as smoothly as possible. The first need that would have to be satisfied would be the physiological which would include hunger and sleep. In this setting Bill Bailey would need to make sure that these people had sufficient wages to live on and would continue to be working in acceptable conditions. Once this need has been met an individual would then be concerned with their safety and security. The staff of the Utah Opera Organization would need to know that their jobs were safe and would not be lost in the merger. If there is a constant threat of job loss the staff is under a lot of stress to try and maintain their position in the company. The next concern would be an individual’s sense of belonging. They would want to know that they will still belong to the group and were accepted in the group. If the merger were to take place I believe it would be important to let the staff know about the merger and all what would be taking place as the merger progressed. After the staff has a feeling of belonging they will be motivated by a desire for esteem. They would need to feel and be recognized that they have some value. ......

Words: 1396 - Pages: 6

Task 1

...Utah Opera & Symphony Merger JFT2 Organizational Management ~ Task 1 Western Governors University January 22, 2012 THEORY OF MOTIVATION In order to support the merger, Bill Bailey needs to address his subordinates with the merger in a supportive way. The Utah Opera Organization and the Utah Symphony are both dealing with surmountable obstacles in regards to the survival of the arts. It would be beneficial in the long run, for the future of the arts to stand as one mighty organization rather than two separate entities. There has always been strength in numbers. Bill Bailey can support the merger using McClellard’s Need Theory. The merger will give the Opera a chance to overcome their current issues with finances and production. The need for achievement which indicates a desire to accomplish something difficult is a prime example of why the merger should be supported. (Kreitner, 2008). The Opera is under pending stress and without the merger the Opera may not survive in the long run. With the merger the Opera will have a better chance of success and achievement. The merger will also increase the affiliations the Opera currently has. Social relationships are fundamental for the success of the merge. These relationships will help ensure the future success of the merge. The merger also brings the opportunity to teach and encourage each member from the other company. The merge will bring new goals to help achieve optimal success. ......

Words: 1340 - Pages: 6

Bigg.Boss.Season.12.(Day.30).720p.WEB-DL.x264.AAC.-.Hon3yHD | Beyblade Burst God | Capítulo Anterior