Question

In: Computer Science

Stealing the Examination As part of your preparation for the upcoming examination, you have the goal...

Stealing the Examination

As part of your preparation for the upcoming examination, you have the goal of stealing a copy of the examination.

*Note that this is a thought experiment that is you should not try it out in real life.

When preparing the exam, the files are stored on the IT servers in a private directory only accessible to academic and examination admin staff (e.g., Julian and Hooman). All staff use their Massey username and passwords to authenticate themselves and gain access. A physical copy of the examination is also stored in the School office in a locked file cabinet and in the Science Faculty office in a locked room. Neither Julian nor Hooman has copies of the examination stored in their offices.

If you are permitted to only use publicly available information when building your profile, describe a scenario explaining how you use the social engineering techniques, e.g., phishing, pre-texting, baiting, quid pro quo and tailgating, —as described in the lecture— to achieve your goal.

Note that you do not need to include filenames or directory name but you should be as specific as possible in your answer.

Question 2.1: Name the human target or target(s) for the scenario.

Question 2.2: Identify ONLY the information necessary for the attack, the reason why each piece of information is required and the source of the information (provide URLs where appropriate).

Question 2.3: What are the steps describing how you will carry out the attack? These should be written such that you could provide these steps plus the previous information to a third party to carry out the attack.

Question 2.4: Describe which of the concepts from the course that have been applied in your attack (you should use at least one!).

Solutions

Expert Solution

2.1:-
Answer:-  
The human target for this scenario will be Hooman which is the examination admin staff.

2.2:-
Answer:-
The only information necessary will be his email id and password because the faculties who are making the examination paper mush have send Hooman a copy of the paper to him for confirmation.

2.3:-
Answer:-
To hack the users email one can use Keylogging.

Seemingly, this is the least demanding alternative for the vast majority who need to figure out how to hack email passwords. Keylogging involves recording each keystroke that is composed in by a client on a PC console. You can do so utilizing a covert agent program known as a Keylogger.

You needn't bother with extraordinary abilities to introduce the program on a PC. Keyloggers additionally work in covertness mode, something that makes them difficult to recognize once introduced. On the off chance that you don't have physical admittance to an objective PC, there's no compelling reason to stress since some keyloggers offer far off establishment.

Keylogging is ostensibly the most clear hacking strategy that programmers use to take touchy data from casualties. Other than email hacking, Keylogging can be utilized to keep an eye on your objective's instant messages, calls, and different passwords.

2.4:-
Answer:-
The concept that we used is Keylogging attack.

A keylogger is a tricky type of spyware. You enter delicate information onto your console, accepting no one is viewing. Actually, keylogging programming is working diligently logging all that you type.

Keyloggers are movement checking programming programs that give programmers admittance to your own information. The passwords and charge card numbers you type, the pages you visit – all by logging your console strokes. The product is introduced on your PC, and records all that you type. At that point it sends this log document to a worker, where cybercriminals hold on to utilize this delicate data.

On the off chance that keyloggers seem like Hollywood fiction, that is on the grounds that we've seen them on the cinema previously. You may recollect Tom Cruise's character utilizing one a Mission Impossible film, and the mainstream programmer show Mr. Robot bases a key plot point around keyloggers.

These cybercriminals aren't simply listening in on whatever you are composing. They have ringside seats.


Related Solutions

As part of your preparation for appearing as a guest speaker at an upcoming national investment...
As part of your preparation for appearing as a guest speaker at an upcoming national investment conference you have been asked to provide a definition for each of the following terms and also a description of how each can affect investment decisions. Please share your answers. Loss aversion Representativeness Narrow framing Overconfidence Biased self-attribution
1. The nursing students are reviewing assessment of immune function in preparation for an upcoming examination....
1. The nursing students are reviewing assessment of immune function in preparation for an upcoming examination. How would the nursing students best summarize the difference between natural immunity and acquired immunity? state the reference.
As you have learned in your examination of Healthy People 2020, the population in the United...
As you have learned in your examination of Healthy People 2020, the population in the United States is growing in diversity. Within the context of diversity, nurses need to recognize that dominant and variant cultural patterns will exist within the society. Health disparities are closely linked with social, economic, and environmental disadvantage. When caring for patients, nurses need to be aware of similarities and differences among the diverse patient care population. Please answer the following questions. 1. Consider the ways...
Post your thesis sentence you have worked on for the upcoming Essay #1
Post your thesis sentence you have worked on for the upcoming Essay #1
You have been asked by your supervisor to develop a PowerPoint presentation for an upcoming training...
You have been asked by your supervisor to develop a PowerPoint presentation for an upcoming training on the following topics: ethics, international factors, and cross-cultural considerations in project management. Using 15-20 slides, create a PowerPoint presentation in which you discuss the following as it relates to successful project management: A summary of each topic as it relates to project management Challenges (common pitfalls) and opportunities for growth and/or improvement Solutions for dealing with challenges common in project management Include one...
Decision Making and relevant factors: You have an opportunity to choose a flight for your upcoming...
Decision Making and relevant factors: You have an opportunity to choose a flight for your upcoming spring break trip to Hawaii. After a lot of thought and research, you have narrowed your options to four different flights. If there are no delays, each should you to your destination on time. It is important to arrive on tim, since you have to meet a but at a specific time to take you and other students to your final destination. If any...
In preparation for upcoming wage negotiations with the union, the managers for the Bevel Hardware Company...
In preparation for upcoming wage negotiations with the union, the managers for the Bevel Hardware Company want to establish the time required to assemble a kitchen cabinet. A first line supervisor believes that the job should take 50 minutes on average to complete. A random sample of 130 cabinets has an average assembly time of 52 minutes with a standard deviation of 10 minutes. Is there overwhelming evidence to contradict the first line supervisor’s belief at a 0.05 significance level?...
In preparation for upcoming wage negotiations with the union, the managers for the Bevel Hardware Company...
In preparation for upcoming wage negotiations with the union, the managers for the Bevel Hardware Company want to establish the time required to assemble a kitchen cabinet. A first line supervisor believes that the job should take 3030 minutes on average to complete. A random sample of 150150 cabinets has an average assembly time of 5555 minutes with a standard deviation of 100100 minutes. Is there overwhelming evidence to contradict the first line supervisor’s belief at a 0.050.05 significance level?...
The results of both sections of your employment examination have finally been received, and you were...
The results of both sections of your employment examination have finally been received, and you were offered the position. You have a few important decisions to make before you can formally accept or decline the position. I. School Versus Work A. The school you would like to attend costs $100,000. To help finance your education, you need to choose whether or not to sell your 1,000 shares of Apple stock, 1,000 EE Savings Bonds (with $100 denominations and 4.25% coupon...
The results of both sections of your employment examination have finally been received, and you were...
The results of both sections of your employment examination have finally been received, and you were offered the position. You have a few important decisions to make before you can formally accept or decline the position. When composing your answers to these decisions, ensure that they are cohesive and read like a short essay. Your submission must address the following critical elements: I. School Versus Work A. The school you would like to attend costs $100,000. To help finance your...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT