Encrypted by the crypto-malware attack

Assignment Help Other Subject
Reference no: EM133217459

You have been hired as a cybersecurity consultant for a company that has recently been breached in a crypto-malware attack. According to file server logs, a large number of files on the network has been modified (encrypted). The company is looking for your guidance on the requirements below. Please provide a solution(describe on your own) and your reasoning.

1. How to determine which files have been encrypted by the crypto-malware attack? The company would like to know the most efficient way as there are over 100,000 files potentially impacted.

2. What kind of policies and/or training would you suggest as a precautionary measure?

3. The company had some backups in alternate servers, but no consistent backup and recovery plan. The organization has agreed to have an RPO of 1 hour and an RTO of 4 hours. Please suggest the most appropriate backup strategy (full, differential, or incremental) to meet the requirement.

4. The company would like your help with its disaster recovery plan. Which recovery site (hot, warm, or cold) would you recommend to meet the organization's requirement of RPO = 1 hour and RTO = 4 hours? And Why?

Reference no: EM133217459

Questions Cloud

Window create a code : Window Create a code that declares a new class, ListBox, that derives from Window. You can read the colon as "derives from."
Decrease coupling of software module : The precondition for a method in its contract enables. In order to decrease coupling of a software module,
Common cause of computer failures : What are the most common cause of computer failures? How would your procedures protect you?
Covid-19 diagnosis system : Suppose, you are developing an intelligent agent for diagnosis Covid-19. Describe the PEAS for the agent "Covid-19 Diagnosis System".
Encrypted by the crypto-malware attack : How to determine which files have been encrypted by the crypto-malware attack?
Statement of personal ethics : What is a statement of personal ethics. The primacy of business requirements over technical expediency.
Identified of the database in online sales : Define three queries the company would run regularly for the function you identified of the database in online sales
Understand and exploit variability : Explain the 'understand and exploit variability' principle of product development flow.
The function database will serve business : Based on the business and why the customers buy from them. The function the database will serve the business.

Reviews

Write a Review

Other Subject Questions & Answers

  How do you feel about your personal liability

How do you feel about your personal liability? What can you do to protect yourself from being found personally liable?

  Major components of the two-store memory model-attention

How do the major components of the two-store memory model-attention, perception, STM or WM, and LTM-influence the cognitive information processing system

  How are particular service lines organized

How are particular service lines organized? How well integrated is decision making among clinical personnel and administrative professionals?

  How do you think the incident should be resolved

A Jainist student attending public high school has requested that the cafeteria staff clearly list the contents of each dish so that he can be certain he does.

  What areas related to test-taking need improvement

What areas related to test-taking do you feel need improvement? What strategies could you utilize to improve your own test-taking skills? List a minimum.

  Security issues-maintenance of paper medical records-ehr

Compare and contrast the security issues between maintenance of paper medical records and EHR. Use at least three outside references to support your views on this issue.

  Describe the school district for which the pilot curriculum

Describe the school district for which the pilot curriculum will be developed using information for the school district's publications.

  What is the involvement of nurses in your policy priority

Explore the C-span link provided for you in the lesson this week. Click the link, then click the Resources tab, and then click the Policy Organizations tab. Explore if one or more of the organizations can support you in your policy priority. How c..

  Effect of the artificial sweetener on headaches

If you obtain the expected results, what do you conclude about the effect of the artificial sweetener on headaches?

  How did we perceive the world around us

How did we perceive the world around us? How did it change our society? How did we now have to relate to each other? Finally, how did the local environment change?

  White paper based on virtualization

Create a white paper based on virtualization. Please be sure to include any security concerns. Note: You are welcome to use the Internet as a source, just be sure to cite your sources.

  Strengths and weaknesses of the set of directions

What visual and/or auditory cues were given to help the subject complete the tasks? What were the strengths and weaknesses of the set of directions that were given to the subject

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd