© Rithik Chatterjee 2021
R. ChatterjeeRed Hat and IT Securityhttps://doi.org/10.1007/978-1-4842-6434-8_7

7. Case Studies

Rithik Chatterjee1  
(1)
Pune, Maharashtra, India
 

Instead of sharing plenty of light case studies with similar scenarios and remediations, three primary case studies have been handpicked, showcasing different attack vectors and appropriate resolutions. Due to confidentiality and sensitivity issues, one of the case studies is kept anonymous, but the attacks are depicted as accurately as possible.

Case Study 1: Anonymous

Context

An employee of AZ1 Inc. had carried a personal laptop into the company premises. As it turned out, the laptop was infected with Poison Ivy trojan, which the employee was unaware of. After it was connected with ...

Get Red Hat and IT Security: With Red Hat Ansible, Red Hat OpenShift, and Red Hat Security Auditing now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.