MIS 427.docx

27 Pages
Unlock Document

Management Information Systems
Jim Kiddoo

MIS 427 9192013 90800 AM Anatomy of an AttackThe Process Hit and Run get in and then get outProfilingunderstanding an organizationUnderstanding the user namesPolicieshow soon do they have to change their passwordsWho are they partnered withAutomated vs ManualWho does their accountingProbing and ScanningDisturb you in your houseLook for open doors and windowsEnumerateExploitRun attack softwareRun DOSTarget data at service in certain from Email virus to usersRun for the HillsGo into a log and then erase that you were even thereHowever that information should have been mirrored somewhere elseOngoing Hack monitor and track o Gathering dataExit proceduresPolicies and ProceduresSoftware versionsVendors and third Parties New software or systems o ExploitFind tools neededWrite tools neededDevelop plan o Elevate PrivilegesGet passwordsAdd usernamesGet usernamesCreate trusted relationshipsOpen doorsdisable antivirus ie Norton update points back to itselfo Cover track and Install ToolsErase logsTime delay softwareRemote control toolsKeyloggerChange programs names and add new onesAdd Startup files o Gather Sensitive infoAutomatically get data sent to youGo in and get dataTriggers on activityCompile data o EasiestStolen or lost laptopsThe wwwregistercoukwwwGadgetopiacom
More Less

Related notes for MIS427

Log In


Join OneClass

Access over 10 million pages of study
documents for 1.3 million courses.

Sign up

Join to view


By registering, I agree to the Terms and Privacy Policies
Already have an account?
Just a few more details

So we can recommend you notes for your school.

Reset Password

Please enter below the email address you registered with and we will send you a link to reset your password.

Add your courses

Get notes from the top students in your class.