logo

Corporate Security Management Report 2022

   

Added on  2022-10-11

10 Pages2173 Words15 Views
Running head: Report On Corporate Security Management
REPORT
ON
CORPORATE SECURITY MANAGEMENT
Name of the Students
Name of the University
Author note:

IT Security Management
1
Introduction:
The fundamental objective of this report is to deliver a detail analysis on the current
data breach incidents. Followed by which it will discuss the aspects of security management
in the corporate world. Considering the mentioned aspects this paper will consist a detail
elaboration related to the threats and vulnerability present in the mentioned case scenario.
Here in this report the case of LockerGoga has been taken which is a ransom ware attack.
Followed by analysing the vulnerabilities and the threats it will also consist a detail
explanation related the identification of the ethical considerations as well as the legal issues.
Since, data breach is one of the most popular topic in cyber security which holds a significant
impact on data security it is highly essential to analyse the consequences of this attack in
order to determine the impact of the selected data breach. Followed by the above aspects this
paper will also consist of a detail elaboration related to the aspects which needs to be
addressed in order to avoid the possibilities of data breach. Lastly, it will conclude by
suggesting the mitigation approaches which holds the capability to effectively mitigate the
identified limitations.
Threats, Vulnerabilities and Exploits analysis:
In this paper the scenario of the Altran Technologies has been nominated in order to
discuss about the threats, vulnerabilities as well as for exploit analysis. After a thorough
investigation it has been observed that Altran Technologies is basically a global innovation as
well as engineering consulting company which is located in France. Hence, this organization
consist of international branches. Targeting the broadness of the organizational structure the
attacker has attacked the IT network server of this company in 24th of January, 2019 which
has significantly affected the work flow in the European countries. The announcement of this
attack been made by the organizational authorities on 28th of January 2019. While the attacker
has attacked the IT network of the mentioned company the organization has forced to stop the

IT Security Management
2
network server in order to protect the customer data. Followed by this incident in a press
release the organisational authorities has mentioned that since, they has stopped the IT
network server the attacker failed to extract any data from the server, as they has mentioned
that after a forensic investigation there is no evidence of data loss.
Threats-
Followed by the above mentioned scenario several threats has been accounted which
are mentioned below:
One of the most significant threats present in this case is the attacker has attacked the
mentioned organizations by clicking the unknown links which, hence this is considered as
one of the significant threat to protect the organizational server to avoid clicking the unknown
links. In this case scenario it has been noticed that the attacker has the intention to spread
over the path in order to encrypt all the files of the organizations network server with the
purpose to disable the organizations authority to access their required data.
The attacker has send the IOCs:
Hash code –
The file names –
The email which is associated with it –

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Advance Security Techniques : Echrs Ltd
|15
|3951
|16

Microsoft Data Access Components Vulnerability Report
|5
|801
|430

Microsoft Data Access Components (MDAC) Vulnerability Report
|4
|1091
|417

Computer & Network Security Analysis Report- Unix Environment
|10
|810
|122

Standard Operating Procedure for Penetration Testing
|11
|1708
|256

cyber Attack presentation 2022
|11
|796
|49