Computer Hack Case Study

767 words - 4 pages

My report will be discussing and analyzing the computer attack that happened at Stellar University (SU). In the first part, I will give a brief about that school and outline its servers. In the second part, I will discuss and analyze the issues that happened in IT department and finally I will add solutions, recommendation and end my report with conclusion and references.
Stellar University (SU) is an urban university that offers amazing majors such as engineering, business, hypnotherapy and health. SU uses many tools such as Mainframe AS 400, Unix, and Linux etc. Also, it has networking infrastructure such as wireless and VPN (Virtual Private Network).
The issue is that SU did not have a qualified staff in IT who could operate and run the system clearly. Moreover, they have low skills in training and low experience that prevented them of being IT professionals which made them walking with no direction. On the other hand, criterions of IT system were not clear due to the tight restriction and updating password policy. These reasons created a shortage in protecting IT system.
The server was an IBM and the upgrade were made to that server in order to maximize space and memory. Additionally, the IBM server warranty has been expired and it did not get renewed. The school management at SU decided to relocate all servers to be at the computer center. The SU was on a budget which made SU laying off some staff and reducing preventive maintenance.
Monday morning in February, The system administrator has seen a weird folder while he was accessing to his account. Right away, he deleted that folder and contacted the operating system administrator at the computer center, but unfortunately another admin logged on on site and the

folder that already deleted by the system administrator, started duplicating itself over and over where the disaster started. The issue is that the new admin account has been created while both of legal administrators were not accessing the server due to the weekend. When the antivirus protection was effective, the actual antivirus that scan viruses had been stopped. The system has been compromised, and a Trojan virus has been implemented.
The Immediate response was the first reaction that has applied by system administrators who decided to disconnect the server from...

Find Another Essay On Computer Hack-Case Study

Case Study: Dell computer (1994)

1620 words - 6 pages In 1994, Dell Computer was a struggling second-tier PC maker. Like other PC makers, Dell ordered its components in advance and carried a large amount of component inventory. If its forecasts were wrong, Dell had major write-downs.Then Dell began to implement a new business model. Its operations had always featured a build-to-order process with direct sales to customers, but Dell took a series of ingenious steps to eliminate its inventories. The

RBS computer failure (Case study)

2439 words - 10 pages . The main threat of IS / IT outsourcing is a lack of compliance with the contract by the supplier is another potential risk in this case. If one of the parties does not follow the prescribed agreement very difficult to do business. This could lead to computer failure , it is quite complicated. If outsourcing does not work , there would be a risk that must be taken. Moreover, in the case of IS / IT outsourcing, if the customer needs can not be

Computers and the Law

2446 words - 10 pages 'value' . As a result of a hack and planting of a virus for example, the computer can still function normally even if some data was damaged or altered in which case the Criminal Damage Act could not be applied. This made it difficult to prosecute someone for such computer crimes because there wasn't any specific legislation against such acts.The first time that a major piece of legislation had specifically been passed to authorise restrictions

Hack Attack

1653 words - 7 pages Prybutok 24). Since there is a lot of attention, people gain interest in order to receive attention. In Forcht’s study in 1991, nearly half the students who participated in the study were involved in hacking or using it criminally for purposes such as illegal pirating (Zhang, Young, and Prybutok 25). With this many children that have the knowledge of hacking and computer crimes, it is much more likely they will escalate their behavior to more

Hacking as a Means of Identifying Weaknesses in Computer Security

1651 words - 7 pages guy wore a black one. There are more than a few techniques which could be used to test a system’s security level. While penetration testing concentrates on attacking computer and software systems using a set of penetration techniques, ethical hacking, which will likely include such things, is under no such restrictions. A full-scale ethical hack (Knight, 2009) might include emailing staff to ask for password details, going through employees

How to write a legal report

1002 words - 5 pages not a common offence so sources were scarce and hard to come by. The Primary sources that were used were case studies and graphs and statistics. These sources provided information on different instances of computer hacking in Queensland and how frequently it happens. The Secondary Sources that were used were news articles and a survey that was conducted to get statistics and people’s views of various aspects of computer hacking. The strengths

Hackers

3835 words - 15 pages on the internet , they spend so much time on the computer to learn the techniques of hacking . Some of the hackers hack for to gain highest prestige within the comunity. Some of them hack just for fun, more they hack more fun they have . Hacking is just another way to recieve a build up of adranaline in the body. They also gain great deal of power from learning confidential information. Hacking involves accumulation of

"Hackers" analyzes the many misconceptions of the Hacker culture, which often contributes many unrecognized positive influences on the computing world today

2605 words - 10 pages systems from future break-ins. There are even many professionals who hack into computer systems for a living. Computer security consults are paid a very large amount of money to attempt to hack into their client's computer. Someone who uses what he knows to do good, whilst being perceived as evil, is the true image of a hacker. They strive to be their best whilst being attacked for their actions. The goal of the computer hacker is to be able to

Security Issues in Cyberspace

1325 words - 6 pages issues in cyberspace or computer laboratory do raise ethical concerns in our study of Ethics Intercultural Interaction as well as ICT Ethics. Unauthorized access to somebody’s data or information is in question mark by many users of computers nowadays as they interact with others by using computers. Growth of threat of cyber-terrorism is also in question mark and concern [2]. Attacks from the so called “Hackers” are on high increasing and

Should You Hire a Hacker to Protect Your Computer Systems?

1305 words - 5 pages using a telephone, as was the case of a computer hacker named Kevin Mitnick. Before we answer this question however we must define what a hacker really is and learn the characteristics of good, bad and ambivalent hackers. Some individuals are attempting to reverse the bad connotations that the word hacker brings to mind by stating that a hacker is a person who enjoys working with computers, while it is really a cracker who are the ones we should be

Ethical Hacking

812 words - 4 pages called crackers and "they violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005) Today, most people who are not computer professionals use the term 'hacker' to define cracker. Black hackers conduct illegal activities through computer. On the other hand, white hat hackers are considered to be "good" since they do not hack to harm others. Their intention is study networks and computers with hacker set

Similar Essays

Opinion On Case Of A Computer Hack

687 words - 3 pages Introduction In Case study number one (Dhillon, 2007), Stellar University(SU), which is public education institution, had a system breach in its Information Systems(IS). The IS of SU contained many types of IT such as Mainframe, AS400, Linux, VAX, Unix, AIX, Windows(3.1 and up to 2003), Apple, RISC boxes Storage Area Networks(SAN), Network Attached Storage(NAS) and much more. Sadly, SU has had a security breach on some of its systems. Even

Module 1: Why Do We Care About Human Computer Interaction? Case Study

1038 words - 5 pages Module 1: Case Study Human Computer Interaction/ITM 433 Case Assignment The rapid growth of technology has increased the need of Human Computer Interaction. From the device being able to decipher your speech and put it into text, being able to be placed into a country that is a 17 hour plane ride away in the matter of a second by virtual reality or being able to control a character with your voice/gesture, this shows the type of

Apple Computer Case Study

1283 words - 5 pages Apple Computers is perhaps the one computer company with the most interesting story line ever. Most people wouldn't associate a simple computer company with a long and dramatic tale filled with ups and downs however Apple's story is just that. The first major computer company to hit the personal computing market, one would think that Apple would be a more common and familiar name than Microsoft is today in the computing world. However, this is

Computer Purchase Case Study

1073 words - 4 pages AssessmentMy family has outgrown our old computer system. The last one we purchased was in 1996. It was a Packard-Bell system with a Pentium I, 166 kHz processor. At that time our kids were 10 and 5 and my wife was a complete novice on the computer. When we purchased the Packard-Bell, it was state-of-the-art. I remember the salesman at Best Buy touting the benefits of MMX technology (something I had never heard of). The system came with speakers