Case Study - ABC Inc.
You work for Security Consulting Associates (SCA). Recently, one of your clients, ABC Software (ABC), located in Tampa, FL, has called with a big problem. Some of their network servers were compromised, resulting in the possible loss of personal information and credit card numbers of purchasers of the software products produced by the company. It is not known at present whether this attack came from inside the company, or outside. ABC is currently dealing with this problem as best they can, but they need your company to help them to prevent this from happening in the future. Your manager has assigned this project to you, the new consultant. In researching ABC, you find that the company has the following setup:
1. A wired network of 300 users segmented into the following departments
- Executive Management
- Research and Development
- Human Resources
- Sales and Marketing
- Purchasing and Billing
- Warehousing and Order Fulfillment
- Information Technology and Security
- Facilities Management
2. A wireless network available to all internal users, with a separate segment available for use by visitors and non-registered users
3. A Website used for Advertising, and Marketing with a secure section for ordering and payments
4. Remote Access capabilities for users working from home or on the road
5. A system of routers and switches and firewalls that protect the network from outside intrusions, and segment the network into subnets for each department
6. A demilitarized zone (DMZ) in the network which includes the Web Server and Email Server
QUESTION:
1. Overview of scenario and purpose of this report
2. Using information gleaned from the Case Study, textbook readings, assigned readings, and your own research, describe the methodology of a network attack including the various steps in an attack along with mitigation solutions for each.
3. Using information gleaned from the Case Study, textbook readings, assigned readings, and your own research, relate this methodology to ABC Software and the current issues they are having by describing how an attacker could have used various attack methodology steps against them.