Solution Library

Ways to Prevent Network Intrusion



You are the manager of a large division of your company. One of the supervisors under your leadership handles customer complaints. This supervisor recently received an e-mail addressed specifically to the supervisor from a customer complaining that one of the product listings on your website was incorrect. The e-mail contained a URL that pointed to the page with the error on it. The supervisor came to you to let you know that after clicking on the URL provided by the customer, nothing appeared to be wrong with the page. The supervisor attempted to reply to the customer’s e-mail address but received a message that read, “No such e-mail address exists.” Shortly after the supervisor responded to the customer complaint e-mail, you noticed that your computer was running slowly and that someone had been able to access some confidential files on your system. Normally, supervisor e-mail addresses are not public, so you are not sure how the customer obtained the supervisor’s e-mail address. You also are not sure how anyone could have gotten password or access privileges to your confidential files. Your boss told you other individuals have noticed that some of their confidential files have been accessed. Your boss wants a report on his desk by the end of the week that outlines:

•  How an intruder could have gained access to the confidential files located on the network
•  What process you are going to use to ensure that the network and files are not compromised again
•  What type of training or policies need to be put in place to ensure that the network and files are secure
Your task will be to provide answers to the three questions given to you by your boss. Your suspicion is that your company was a victim of a social engineering attack, and you believe that this information was used to gain access into the company’s computer systems.


A.  Create a memo (suggested length of 1 page) discussing how you believe the intruder gained access to the company’s network using social engineering.
B.  Create a security recommendations list suggesting prescriptive measures that should be implemented to prevent such intrusions in the future.
C.  Create a mock-up (suggested length of 1–2 pages) of how you would test your organization’s vulnerability to a social engineering attack. Include the following in your mock-up:

•  What techniques you would use
•  Who you would use the techniques on
•  What questions you would ask


This is a scenario analysis where a company’s confidential information was accessed by a network intruder. This was noticed after responding to a customer’s query and following the link provided by the customer. The required actions and plans to secure the network and network files has been given in detail in the solution.

Total Word Count 1484

Download Full Solution


  • HWA

    this is a very good website

  • HWA

    I have 50 questions for the same test your page is showing only 28

  • HWA

    hi can you please help or guide me to answer my assignments. thanks

  • HWA

    hi can anyone help or guide me to my assignments. thanks

  • HWA

  • HWA

    This solution is perfect ...thanks

  • HWA

    Hello Allison,I love the 2nd image that you did! I also, had never heard of SumoPaint, is something that I will have to exolpre a bit! I understand completely the 52 (or so) youtube videos that you probably watched. Sometimes they have what you want, sometimes they don't! However, it is always satisfying when you are able to produce something that you have taught yourself. Great job!Debra 0 likes

  • HWA

    Perfect bank of solution. 

  • HWA

    great !

  • HWA
    Paul Brandon-Fritzius

    thanks for the quick response. the solution looks good. :)

  • HWA
    tina Johnson

    thnx for the answer. it was perfect. just the way i wanted it. 

  • HWA

    works fine.