Week 1 Assignment 1

docx

School

Collin County Community College District *

*We aren’t endorsed by this school

Course

1371

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

2

Uploaded by MinisterMask26335

Report
OSINT on Lowes Lowes.com Their website led me to their Facebook, Twitter, Instagram, and YouTube where I can follow updates. Lowes Instagram I can see everyone who Lowes is following and who follows them. I can use this information to see what companies or people they may partner with. I can also cross reference their followers with a list of employees to see who may be active on social media. Facebook I can see everyone who Lowes is following. I can use this information to see what companies or people they may partner with. The account information tells me there are multiple people who control the account. These people are located in the United States, India, and one other country I was unable to see. Twitter I can see everyone who Lowes is following and who follows them. I can use this information to see what companies or people they may partner with. I can also cross reference their followers with a list of employees to see who may be active on social media. LinkedIn I am able to search for people who work at Lowes. I find a large amount of people in different positions. Including their Senior Vice President. I am able to use the information on many Lowes Associates LinkedIn accounts to find their Facebook accounts. These can have a wide range of security depending on the individual’s awareness and knowledge on social engineering tactics. A hacker could use this information to try to target someone directly, by sending them Facebook messages or emails with embedded malware. Google I searched for lowes CEO and found Marvin Ellison. I was able to find his LinkedIn which led me to a variety of information and posts including one angry post about loss prevention, and the numbers being inaccurate. The person was Bradley Cook and claimed to be a stakeholder. There was also a link at the bottom of his post that I didn’t click on. Bradley Cook After looking at his LinkedIn profile, he doesn’t have much on there and doesn’t have a picture. I searched his name with lowes stake holder and I found another LinkedIn profile saying he was a Lowes Assembler. Stockholders Their top stockholders are Vanguard, BlackRock, S SgA Funds Management, JPMorgan, and Fidelity Management. lowesb2c.b2clogin.com The login portal for Lowes service providers is open access Suppliers Illinois Tool Works, Stanley Black & Decker, and Deere & Company are Lowes’ largest suppliers Google Cloud According to a 2022 Google Could Blog, All of Lowes.com is run through Google cloud, and almost completely on Carbon Platform. This allowed Lowes for better load balancing and led to a successful online Black Friday, but having information so readily available does allows someone to try to target their cloud servers directly. On-Premises software Lowes uses Oracle Fusion Cloud ERP and EPM as their on Premises system since 2022. Vendorgateway.lowes.com The login portal for Lowes vendors is open access Lowes.suppliesgateway.co m The login portal for Lowes suppliers is open access
OSINT on Lowes Vendors A.O. Smith, Blackstone and Mansfield plumbing were lowes 2022 vendor partner of the year Social Media is a great way to find vulnerabilities or specific targets within an organization. We learned in the Fundamentals of Information Security class that common targets of Social Engineering are higher ups with large amounts of access. Other common targets are people who have some privilege or access, but little security knowledge, and the hacker is able to raise their privilege once inside. Cloud storage, Vendors, and Suppliers are huge vulnerabilities. While a company can control what they produce in their own code and firewalls, they can’t control what their suppliers do. We know from past attacks like the 2013 Target attack that vendors and suppliers with logins can be a huge vulnerability as you can’t be certain they have received proper security training. The 2021 Microsoft Exchange Server attack showed us that using cloud storage can have huge risk, as once a vulnerability is found it can be used against hundreds or even thousands of companies and can take months to completely patch. The Department of Defense had to step in to completely patch the Microsoft Exchange Servers.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help

Browse Popular Homework Q&A

Q: An oil company purchased an option on land in Alaska. Preliminary geologic studies assigned the…
Q: Choose the answer that correctly fills in the blanks. As carbon dioxide accumulates in the…
Q: BMX Company has one employee. FICA Social Security taxes are 6.2% of the first $137,700 paid to its…
Q: Using the appropriate bond energies, calculate the heat of reaction AH for the following reaction!…
Q: find an explicit solution of the given initial-value problem.28. (1 + x4) dy + x(1 + 4y2) dx = 0,…
Q: Consider lines 1-9. What emotional system does Nic seem to be speaking from?  a. SEEKING   PANIC…
Q: An optometrist has a patient who needs bifocals. The patient can clearly see an object when it is…
Q: Use Theorem 7.1.1 to find L{f(t)}. (Write your answer as a function of s.) f(t) = 3t²4 sin(5t)…
Q: I don't understand the equation that gave you the answer 44.00. I mostly dont get what the commas…
Q: The point P(1, 0) lies on the curve y = sin( (a) If Q is the point (x, sin(¹3″ )), find the slope of…
Q: A business has found that it can sell 770 items if it sets its price to $66.61. However, if it…
Q: what is the domain? (5,1)(5,7)(6,1)(6,7)
Q: After landing on an unfamiliar planet, a space explorer constructs a simple pendulum of length 55.0…
Q: A. Identify the actual number of respondents who ted them selves above average drivers. B Identify…
Q: Prove the following statement using a direct proof. If x and y are rational numbers, where y # 0 and…
Q: A 56-Ω resistor in a circuit has a voltage difference of 8 V across its leads. Calculate the current…
Q: Labels Differentiated and specialized Immortal Nuclei take up most of the cell Attach to substrate…
Q: Use synthetic division to decide whether the given number k is a zero of the polynomial function. If…
Q: If –5 + y³ = xy² – x and it is known that find all coordinate -2xy+3y2 > 2 and the line tangent to…
Q: cos 3x = √3/2 x =
Q: Calculate the missing information. Round dollars to the nearest cent and percents to the nearest…
Q: Consider the following instruction: AND ( %1111_0000, AL ); After its execution, what will be true…