https://github.com/compcode1/access-control-worksheet
You’re the first cybersecurity professional hired by a growing business. Recently, a deposit was made from the business to an unknown bank account. The finance manager says they didn’t make a mistake. Fortunately, they were able to stop the payment. The owner has asked you to investigate what happened to prevent any future incidents.
https://github.com/compcode1/access-control-worksheet
access-control cybersecurity
Last synced: 10 months ago
JSON representation
You’re the first cybersecurity professional hired by a growing business. Recently, a deposit was made from the business to an unknown bank account. The finance manager says they didn’t make a mistake. Fortunately, they were able to stop the payment. The owner has asked you to investigate what happened to prevent any future incidents.
- Host: GitHub
- URL: https://github.com/compcode1/access-control-worksheet
- Owner: Compcode1
- License: gpl-3.0
- Created: 2024-12-05T19:07:18.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-12-05T19:12:49.000Z (about 1 year ago)
- Last Synced: 2024-12-05T20:21:59.266Z (about 1 year ago)
- Topics: access-control, cybersecurity
- Language: Jupyter Notebook
- Homepage:
- Size: 19.5 KB
- Stars: 0
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
You’re the first cybersecurity professional hired by a growing business.
Recently, a deposit was made from the business to an unknown bank account. The finance manager says they didn’t make a mistake. Fortunately, they were able to stop the payment. The owner has asked you to investigate what happened to prevent any future incidents.
To do this, you’ll need to do some accounting on the incident to better understand what happened. First, you will review the access log of the incident. Next, you will take notes that can help you identify a possible threat actor. Then, you will spot issues with the access controls that were exploited by the user. Finally, you will recommend mitigations that can improve the business' access controls and reduce the likelihood that this incident reoccurs.