Create incident response plan

Assignment Help Basic Computer Science
Reference no: EM133098316

Scenario

On Thursday morning, John, an XYZ university employee, noticed a warning message on his computer saying that the system has been attacked by a worm Win32.VB. Even though the antivirus software was present in the system, the software failed to detect the new worm because it was not updated to the latest version. When John tried to open his e-mail, he experienced a slow internet connection. He noticed there were some unusual file names in the disk. John immediately informed his friend Bob, who was also an XYZ employee, of the problem. Bob checked his computer in his office and experienced the same problem as John. John and Bob checked several computers in the laboratories, and found that Win32.VB worm had infected many other computers in the laboratory. They contacted the system administrator of the XYZ University. The system administrator checked the computers in the laboratory and reported the incident to the incident response team. The system administrator also checked the computers in other laboratories. As a result of the worm attack the activities in the XYZ University laboratory were suspended for a day, which caused a great inconvenience.

Case Objectives:

Create an incident response plan which is accompanied by a forensic plan please refer to NIST specifications.

Must include penetration testing and forensics procedures etc.

Diagram of the attack

Identify the vulnerabilities

Reference no: EM133098316

Questions Cloud

Implementing change to existing process or procedure : What management issues arise when implementing a change to an existing process or procedure?
Wireless mobile network : What are some things you need to think about when it comes to doing business globally, using a wireless mobile network?
What does architectural alignment entail : What does an architectural alignment entail? Provide three common risk mitigation strategies for handling the enterprise. What is BYOD? What is MDM?
Why is data mining popular today : How will it be done in the future? Will AI be a factor in potential job loss for analysts who hold data mining jobs in organizations today?
Create incident response plan : Create an incident response plan which is accompanied by a forensic plan please refer to NIST specifications.
Determine the likelihood for potential vulnerability : Determine the likelihood for a potential vulnerability. Determine the adverse impact resulting from a successful threat exercise of vulnerability.
Difference between plagiarism vs self-plagiarism : What is an Information Technology Project? Explain the difference between plagiarism vs self-plagiarism?
Digital divide : According to many, the digital world is being divided into ‘haves' and ‘have nots' - between those that have access and can use a computer and the Internet,
Discuss concept of quality of life : Discuss the concept of "quality of life." Elaborate on how Christian healthcare administrators might assure "quality of life" in healthcare delivery settings.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write the dfa simulator

Write the DFA Simulator that can run a DFA against an input string. Given a DFA and an input at string, the stimulator will return yes if the DFA accepts

  Implementing new interorganizational system

You are a member of the Human Resource Department of a medium-sized organization that is implementing a new interorganizational system

  What is 4g and its benefits

What is 4G and its benefits. How fast is your Internet service supposed to be for stationary users?

  Construct variable variable type data

Building upon the previous sections of the proposal you are developing with respect to the extension of a published study,

  Draw a star schema diagram for the data warehouse

Bitmap indexing is useful in data warehousing. Taking this cube as an example, briefly discuss advantages and problems of using a bitmap index structure.

  What is the current pace and extent of globalization

What is the current pace and extent of globalization of the world economies and what fuels it?

  Present value and the future value of an asset

What is difference between Present Value and the future value of an asset?

  Your research interests in area of information technology

What are your research interests in the area of Information Technology? Why do you think it is important to research in this area?

  Regression and classification methods

Regression and classification are categorized under the same umbrella of supervised machine learning.

  How is technology affecting restaurant business

Discuss about, how is technology affecting the restaurant business? Please share the organization's function.

  Halogen systems for extinguishing fires

Server rooms often have halogen systems for extinguishing fires. An accidental discharge of the halogen could have disastrous results.

  Social networking site and research its security features

Choose a Social Networking site and research its security features. Are they sufficient? Should they be stronger?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd