Question

In: Accounting

When CQ University’s computers began acting sluggishly, computer operators were relieved when a software trouble-shooter from...

When CQ University’s computers began acting sluggishly, computer operators were relieved when a software trouble-shooter from DELL called. When he offered to correct the problem they were having, he was given a login ID and password. The next morning, the computers were worse. A call to DELL confirmed the university’s suspicion: someone had impersonated a DELL repairman to gain unauthorized access to the system and destroy the database. CQ University was also concerned that the intruder had devised a program that would let him get back into the system even after all the passwords were changed. a) What techniques could the imposter have implemented to breach the university’s internal security? ____________________

Solutions

Expert Solution

Answer:

Techniques implemented to breach the CQ University's internal security:

The following are the techniques utilized by the fraud that breach the interior security of CQ University's PCs:

  • The individual who goes about as fraud might be an outer hacker or worker with the information about the access of the framework or system.
  • The culprit can likewise infect system with an virus or worm that causes slowness of the CQ University's PCs.
  • Another way that the individuals hacks framework and take control for the huge part of the handling or processing.
  • One way that the individual uses pre-texting and this implies the data can be effectively uncovered than the normal.In this technique,the individual may acts as a "DELL programming professional" to get the framework" sign on ID" and secret "Password ".
  • "Masquerading" or Disguising is additionally one of the methods to breach the security .In which the client is envisioned as approved use and gets the "sign on ID" and secret "Password".
  • The individual may contaminate or infect framework with "Trojan horse","Trap door"," Logic bomb" or these sorts of malware.
  • Utilizing of "superzap" deactivities the ordinary function of framework controls.

Related Solutions

Mortgage-backed securities were created when ________ began buying mortgage loans from originators and bundling them into...
Mortgage-backed securities were created when ________ began buying mortgage loans from originators and bundling them into large pools that could be traded like any other financial asset. Fannie Mae and Freddie Mac Ginnie Mae Freddie Mac Fannie Mae Ginnie Mae and Fannie Mae Certificates of deposit are insured by the CFTC. FDIC. SPIC. Lloyds of London. All of the options are correct.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT