Cis 502 Case Study 2 Social Engineering Attacks and Counterintelligence

In: Other Topics

Submitted By lillianblackwell
Words 431
Pages 2
CIS 502 Case Study 2 Social Engineering Attacks and Counterintelligence

Purchase here

http://homeworkonestop.com/CIS%20502/cis-502-case-study-2-social-engineering-attacks-and-counterintelligence

Product Description

Case Study 2: Social Engineering Attacks and Counterintelligence
Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense.
Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”.
Write a five to eight (5-8) page paper in which you:
Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and risk management procedures. Propose two (2) methods to thwart this type of intelligence leak in the future and explain why each would be effective. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size…...

Similar Documents

Social Engineering Attacks and Counterintelligence

...Table of Contents Ethical and Social Issues In Information System 1 Chapter one 3 Introduction to the Study 3 Context of the Problem 4 Statement of the Problem 5 Research Questions 6 Introduction 6 Research Question 6 Research Question 7 Research Question 7 Significance of the Study 8 Research Design and Methodology 9 Organization of the study 9 Literature Review 10 Introduction 10 References 14 Chapter one Introduction to the Study Ethical and social issues in information system is a combination of the benefits and disadvantages of using computer and computer related devices, social networks versus our ethics, morals and beliefs. The importance and reliability of computer in our day to day running of human life cannot be over emphasized. Social networking platforms may allow organizations to improve communication and productivity by disseminating information among different groups of employees in a more efficient manner, resulting in increased productivity. While it is not meant to be all-inclusive, there are a lot of problems faced by its usage in younger generations, businesses use, and the even medical field. The social media comes with risks as it opens up the possibility for hackers to commit fraud, launch spam and virus attacks, and also increases the......

Words: 3249 - Pages: 13

Social Engineering Attacks and Counterintelligence

...Case Study 2: Social Engineering Attacks and Counterintelligence Marilyn Washington Dr. Gideon U. Nwatu CIS 502 November 3, 2013 Abstract The topic of this paper is “Social Engineering Attacks and Counterintelligence.” Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Social Engineering Attacks and Counterintelligence Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and Iraq War Logs. WikiLeaks is an open website that reveals classified documents to the general public. Voice of America stated that “WikiLeaks releases 400,000 classified US Military files (Pessin, 2010). WikiLeaks is a serious threat to national security. WikiLeaks is a threat for three reasons: reveals the identities of operatives, defaces the name of the USA to foreign countries, and threatens the safety of the USA. A danger of WikiLeaks is it reveals the identities of operatives both foreign and domestic. WikiLeaks allows the names of many allies and operative missions to be posted on a public website. This type of exposure endangers many......

Words: 1115 - Pages: 5

Cis 502 Week 3 Case Study

...Tokens McQuinda Johnson Dr. Al Oluyomi CIS 502 January 27, 2014 Advanced Persistent Threats Against RSA Tokens 2 An evolution in the goals and sophistication of computer network intrusions has rendered these approaches insufficient for the threats facing many modern networked organizations. A new class of adversaries, appropriately dubbed the “Advanced Persistent Threat” (APT), represents well-resourced and trained adversaries that conduct multi-year intrusion campaigns targeting highly sensitive and valuable data in an attempt to gain a competitive edge, particularly in international business and law, or nation-state political and military affairs. These adversaries accomplish their goals using advanced tools and techniques designed to circumvent most conventional computer network defense mechanisms and remain undetected in their intrusion efforts or presence on networks over long periods of time. Network defense techniques which leverage knowledge about these adversaries can enable defenders to establish a state of information superiority which decreases the adversary’s likelihood of success with each subsequent intrusion attempt. Threat intelligence can be a force multiplier as organizations look to update their security programs and defenses to deal with increasingly sophisticated advanced persistent threats. Security managers need accurate, timely and detailed information to continuously monitor new and evolving attacks, and methods to exploit this......

Words: 1313 - Pages: 6

Cis 502 Case Study 2 Social Engineering Attacks and Counterintelligence

...CIS 502 Case Study 2 Social Engineering Attacks and Counterintelligence Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-2-social-engineering-attacks-and-counterintelligence Product Description Case Study 2: Social Engineering Attacks and Counterintelligence Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”. Write a five to eight (5-8) page paper in which you: Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and risk......

Words: 1293 - Pages: 6

Cis 502 Case Study 2 Social Engineering Attacks and Counterintelligence

...CIS 502 Case Study 2 Social Engineering Attacks and Counterintelligence Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-2-social-engineering-attacks-and-counterintelligence Product Description Case Study 2: Social Engineering Attacks and Counterintelligence Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”. Write a five to eight (5-8) page paper in which you: Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and risk......

Words: 862 - Pages: 4

Cis 502 Case Study 2 Social Engineering Attacks and Counterintelligence

...CIS 502 Case Study 2 Social Engineering Attacks and Counterintelligence Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-2-social-engineering-attacks-and-counterintelligence Product Description Case Study 2: Social Engineering Attacks and Counterintelligence Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”. Write a five to eight (5-8) page paper in which you: Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and risk......

Words: 431 - Pages: 2

Cis 502 Case Study 2 Social Engineering Attacks and Counterintelligence

...CIS 502 Case Study 2 Social Engineering Attacks and Counterintelligence Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-2-social-engineering-attacks-and-counterintelligence Product Description Case Study 2: Social Engineering Attacks and Counterintelligence Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”. Write a five to eight (5-8) page paper in which you: Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and......

Words: 3017 - Pages: 13

Cis 502 Case Study 2 Social Engineering Attacks and Counterintelligence

...CIS 502 Case Study 2 Social Engineering Attacks and Counterintelligence Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-2-social-engineering-attacks-and-counterintelligence Product Description Case Study 2: Social Engineering Attacks and Counterintelligence Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”. Write a five to eight (5-8) page paper in which you: Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and......

Words: 1293 - Pages: 6

Cis 502 Case Study 4 Remote Access Attacks Quick Finance Inc.

...CIS 502 Case Study 4 Remote Access Attacks Quick Finance Inc. Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-4-remote-access-attacks-quick-finance-inc Product Description Case Study 4: Remote Access Attacks Due Week 8 and worth 100 points Above is the Quick Finance Company network diagram. The company is a small business and does not invest much in security protection. System 1000 hosts a customer database as well as employee payroll systems. The company Web server has been defaced twice this month and the VPN server has suffered from session hijacking and Denial-of-Service (DOS) attacks twice last year. The company does not enforce a password policy and does not have a dedicated security professional. Write a five to eight (5-8) page paper in which you: Analyze the Quick Finance Company Network Diagram and describe the assumptions you will need to make in order to identify vulnerabilities and recommend mitigation techniques as there is no further information from this company. The company does not wish to release any security related information per company policy. Analyze the above case and network diagram, and describe how each access point is protected or unprotected. Evaluate and describe the vulnerabilities of the Quick Finance Company’s network based on the network design. Rank the top three (3) most likely network-based attacks in the order they are likely to occur and suggest countermeasures for each. Recommend mitigation......

Words: 2604 - Pages: 11

Cis 502 Case Study 2 Social Engineering Attacks and Counterintelligence

...CIS 502 Case Study 2 Social Engineering Attacks and Counterintelligence Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-2-social-engineering-attacks-and-counterintelligence Product Description Case Study 2: Social Engineering Attacks and Counterintelligence Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”. Write a five to eight (5-8) page paper in which you: Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and risk......

Words: 431 - Pages: 2

Cis 502 Case Study 2 Social Engineering Attacks and Counterintelligence

...CIS 502 Case Study 2 Social Engineering Attacks and Counterintelligence Purchase here http://homeworkonestop.com/CIS%20502/cis-502-case-study-2-social-engineering-attacks-and-counterintelligence Product Description Case Study 2: Social Engineering Attacks and Counterintelligence Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”. Write a five to eight (5-8) page paper in which you: Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in doing this as evidenced by the articles about the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks. Predict how the Afghan War Diary and the Iraq War Logs that were released in WikiLeaks could influence organizations in regard to their security policies and......

Words: 431 - Pages: 2

Cis 502 Week 4 Case Study 2 Strayer Latest

...CIS 502 WEEK 4 CASE STUDY 2 STRAYER LATEST To purchase this visit following link: http://coursehomework.com/product/cis-502-week-4-case-study-2-strayer-latest/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 502 WEEK 4 CASE STUDY 2 STRAYER LATEST Case Study 2: Social Engineering Attacks and Counterintelligence Due Week 4 and worth 100 points Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, located at http://www.voanews.com/english/news/WikiLeaks-Releases-400000-Classified-US-Military-Files- 105568738.html, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”, located at http://abcnews.go.com/Politics/wikileaks-109000-deaths-iraq- war/story?id=11949670#.TyicXlxrOQo. Write a five to eight (5-8) page paper in which you: 1. Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. 2. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations......

Words: 521 - Pages: 3

Cis 502 Week 4 Case Study 2 Strayer Latest

...CIS 502 WEEK 4 CASE STUDY 2 STRAYER LATEST To purchase this visit following link: http://coursehomework.com/product/cis-502-week-4-case-study-2-strayer-latest/ Contact us at: HELP@COURSEHOMEWORK.COM CIS 502 WEEK 4 CASE STUDY 2 STRAYER LATEST Case Study 2: Social Engineering Attacks and Counterintelligence Due Week 4 and worth 100 points Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, located at http://www.voanews.com/english/news/WikiLeaks-Releases-400000-Classified-US-Military-Files- 105568738.html, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”, located at http://abcnews.go.com/Politics/wikileaks-109000-deaths-iraq- war/story?id=11949670#.TyicXlxrOQo. Write a five to eight (5-8) page paper in which you: 1. Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. 2. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations......

Words: 521 - Pages: 3

Cis 502 Week 4 Case Study 2 Strayer New

...CIS 502 WEEK 4 CASE STUDY 2 STRAYER NEW To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-4-case-study-2-strayer-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 502 WEEK 4 CASE STUDY 2 STRAYER NEW Case Study 2: Social Engineering Attacks and Counterintelligence Due Week 4 and worth 100 points Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, located at http://www.voanews.com/english/news/WikiLeaks-Releases-400000-Classified-US-Military-Files- 105568738.html, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”, located at http://abcnews.go.com/Politics/wikileaks-109000-deaths-iraq- war/story?id=11949670#.TyicXlxrOQo. Write a five to eight (5-8) page paper in which you: 1. Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. 2. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in......

Words: 983 - Pages: 4

Cis 502 Week 4 Case Study 2 Strayer New

...CIS 502 WEEK 4 CASE STUDY 2 STRAYER NEW To purchase this visit following link: http://www.activitymode.com/product/cis-502-week-4-case-study-2-strayer-new/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 502 WEEK 4 CASE STUDY 2 STRAYER NEW Case Study 2: Social Engineering Attacks and Counterintelligence Due Week 4 and worth 100 points Social engineering attacks and counterintelligence have major impacts to our national security. In July 2010, the Afghan War Diary was released in WikiLeaks. In October 2010, WikiLeaks also released the largest military leak in history – the Iraq War Logs revealing the war occupation in Iraq. This type of information is considered as classified data by the Department of Defense. Read the article titled, “WikiLeaks Releases 400,000 Classified US Military Files”, located at http://www.voanews.com/english/news/WikiLeaks-Releases-400000-Classified-US-Military-Files- 105568738.html, and then read the article titled, “WikiLeaks: At Least 109,000 Killed During Iraq War”, located at http://abcnews.go.com/Politics/wikileaks-109000-deaths-iraq- war/story?id=11949670#.TyicXlxrOQo. Write a five to eight (5-8) page paper in which you: 1. Describe what social engineering and counterintelligence are and their potential implications to our national security in regard to the leaked Afghan War Diary and the Iraq War Logs. 2. Examine the importance of forming a sound information security workforce and describe the challenges faced by organizations in......

Words: 1474 - Pages: 6