Scenario: There was a surge of attacks on banks where the attackers were targeting card processing in Eastern Europe. Having penetrated the bank’s infrastructure, criminals obtained access to card processing systems and transferred funds from multiple accounts. They also disabled antifraud systems that would ordinarily notify the bank of fraudulent transactions. Simultaneously, their accomplices were withdrawing cash from ATMs in another country. The bank’s infrastructure contained the following: The company runs open-source database, e-mail, and web servers. Employees can access the network via desktop computers that are available in the main office or by using their personal devices. The main office uses the Wireless Encryption Privacy (WEP) Protocol to connect to its wireless network. When training at the main office, volunteers access the Internet via the wireless network. Passwords are not required to be changed, and some employees have been using the same access credentials since joining the organization. Although the employee handbook includes a policy on acceptable use and password maintenance, these policies have never been enforced and have not been updated in years. The employee handbook also states the organization’s security goal to maintain the confidentiality, integrity, and accessibility of the customer data.

The scenario described involves a surge of attacks on banks in Eastern Europe, specifically targeting their card processing systems. The attackers were able to gain access to the bank’s infrastructure, enabling them to transfer funds from multiple accounts and disable anti-fraud systems. Simultaneously, their accomplices were withdrawing cash from ATMs in another country. To understand the implications of this scenario, it is necessary to analyze the bank’s infrastructure and security measures in place.

The bank’s infrastructure includes open-source database, e-mail, and web servers. These systems are widely used in various organizations due to their cost-effectiveness and flexibility. However, the use of open-source software also introduces certain risks, as vulnerabilities may exist that have not been identified or patched. Additionally, the use of open-source software often requires active maintenance and updates to ensure the latest security patches are applied.

In terms of employee access, the bank allows employees to access the network using either desktop computers in the main office or their personal devices. This introduces potential security challenges, as personal devices may not have the same level of security controls as the bank’s own devices. Moreover, the use of personal devices increases the attack surface of the bank’s network, as these devices may not be regularly patched or updated with the latest security measures.

The bank’s main office uses the Wireless Encryption Privacy (WEP) Protocol to connect to its wireless network. WEP is an outdated security protocol that has long been known to have significant vulnerabilities. Attackers can exploit these vulnerabilities to decrypt wireless traffic and gain unauthorized access to the network. Therefore, relying on WEP for wireless network security represents a major weakness in the bank’s infrastructure.

Furthermore, the scenario mentions that passwords are not required to be changed, and some employees have been using the same access credentials since joining the organization. This practice is highly insecure, as it allows an attacker who gains access to one employee’s credentials to potentially gain access to multiple accounts and systems within the bank’s network. Passwords should be regularly changed and strong authentication mechanisms, such as multi-factor authentication, should be implemented to enhance security.

The employee handbook includes a policy on acceptable use and password maintenance, but it states that these policies have never been enforced and have not been updated in years. This lack of enforcement and updates indicates a lack of commitment to security within the organization. Policies serve as guidelines for employees and should be regularly reviewed and updated to reflect changing threats and best practices. Additionally, enforcement of these policies is essential to ensure that employees are following the necessary security measures to protect sensitive customer data.

Overall, the scenario highlights numerous security vulnerabilities within the bank’s infrastructure and practices. Addressing these weaknesses requires implementing stronger security measures, such as using updated and secure protocols, enforcing password changes and strong authentication mechanisms, regularly maintaining and updating policies, and conducting regular security audits and training for employees. By improving security practices, the bank can better protect customer data and minimize the risk of future attacks.

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer