As part of my cybersecurity course today the focus was in threats and vulnerabilities and I did some more
research outside of the course’ content. I found it extremely interesting and rewarding. Evaluating different
Scenarios and determining the level of risk as well as discovering and traicing attackas, red flags and other
Areas of risk. Also, I did a little bit of digging thru the OWASP top 10 list and found it incredibly informative, I think
That Open-Sec concept is extremely helpful by providing insight into risks and vulnerabilities from affected users
And software so that others may implement measures to avoid harmful attacks and data leaks. I’ll leave a little
Exercise I did as part of the course for review. I know is not perfect but hey, am just getting started.
EXCERCISE
Note(s) | Issue(s) | Recommendation(s) | |
Authorization /authentication | Objective: List 1-2 pieces of information that can help identify the threat: ●Issue was caused by a ‘Contractor’ User Account assigned to Attorney Robert Taylor Jr. ●Event was logged on 10/03/2023 at 8:29:57 AM ●It came from device IP 152.207.255.255 ●Most likely this account was hacked and used by a malicious actor. | Objective: Based on your notes, list 1-2 authorization issues: ●This user has Administrator privileges within the company network. ●Since this account was created for a contractor it should have been eliminated once they finished their work and access was no longer needed. | Objective: Make at least 1 recommendation that could prevent this kind of incident: ●Monitoring accounts and their level of access would have prevented this issue by giving the account only read permits in the first place and lastly by eliminating the account once it was no longer needed. |