Screen Reader Mode Icon

Question Title

* 1. How can someone get unauthorized access to your accounts?

Question Title

* 2. What is NOT appropriate protocol to decrease risk of a security breach?

Question Title

* 3. Example scenario: A company’s remote location uses Microsoft’s remote desktop protocol (RDP) to allow the central office to remotely log into their systems for administrative purposes. This access was not locked down and was available to the entire Internet. Exploiting an unpatched vulnerability on the system, an attacker was able to take control of the workstation. Once on that system, they worked their way through the network to the workstation of someone in the finance department. They checked the email of the host periodically and watched activity until they saw a large transfer was being arranged to an overseas factory. They altered the account information in the form that was emailed to point to another, fraudulent account. More than $1.5M was transferred and no one noticed until the supplier called and asked when that money was going to get transferred. By then the attacker was long gone with the money and the account was closed. What could have prevented this attack?

0 of 3 answered