Explain how the system could be verified as operational

Assignment Help Management Information Sys
Reference no: EM131128797

Scenario:

An employee hacked into the human resource records system at the employee's place of business and changed the employee's base salary rate to obtain a pay raise. The employee did this by spoofing an IP address in order to eavesdrop on the network. Once the employee identified where the data was stored and how to modify it, the employee made the changes and received two paychecks with the new amount.

Fortunately, an auditor happened to discover the error. The auditor sent an e-mail to several individuals within the organization to let them know there was a potential problem with the employee's paycheck. However, the employee was able to intercept the message and craft fake responses from the individuals the original e-mail was sent to. The employee and the auditor exchanged e-mails back and forth until the employee was soon given access permissions for some other financial records. With this new information, the employee was able to lower the salaries of the president of the company and several other employees and then to include the salary difference in the employee's own paycheck.

The IT staff determined that the spoofing that occurred that allowed the employee to gain access to the human resources system was caused by a lack of authentication and encryption controls. As such, a local root certificate authority was installed to implement a public key infrastructure (PKI) in which all communication to the human resource system required a certificate. This would encrypt network traffic to and from the human resources system and prevent eavesdropping. It would also properly authenticate the host to prevent spoofing.

Task:

A. Perform a postevent evaluation of how the organization's IT staff responded to the attack described in the scenario by doing the following:

1. Describe the series of malicious events that led up to the incident.

2. Identify who needs to be notified based on the type and severity of the incident.

3. Outline how the incident could be contained.

4. Discuss how the factor that caused the incident could be eradicated.

5. Discuss how the system could be recovered to return to normal business practice.

a. Explain how the system could be verified as operational.

B. Perform a follow-up of the postevent evaluation by doing the following:

1. Identify areas that were not addressed by the IT staff's response to the incident.

2. Identify the other attacks mentioned in the scenario that were not noticed by the organization.

a. Describe the type and severity of the attacks not noticed by the organization.

b. Describe how these additional attacks can be prevented in the future.

3. Recommend a recovery procedure to restore the computer systems back to a fully operational state.

C. When you use sources, include all in-text citations and references in APA format.

Reference no: EM131128797

Questions Cloud

Rule of ordering production when projected on-hand inventory : Prepare a master schedule given this information: It is now the end of week 1; customer orders are 25 for week 2, 16 for week 3, 11 for week 4, 8 for week 5, and 3 for week 6. Use the MPS rule of ordering production when projected on-hand inventory w..
Find the resonant frequency and bandwidth of the circuit : Find the resonant frequency and bandwidth of the circuit.
Watch without bonnie knowing of the theft : Ann took Bonnie's watch without Bonnie knowing of the theft. Bonnie subsequently discovered her loss and was informed that Ann had taken the watch. Bonnie immediately pursued Ann. Ann pointed a loaded pistol at Bonnie, who, in fear of being shot, ..
You are a newly hired accountant with batista company : You are a newly hired accountant with Batista Company. On your first day, the controller asks you to identify the main internal control objectives related to payroll accounting. How would you respond?
Explain how the system could be verified as operational : Describe the series of malicious events that led up to the incident. Identify who needs to be notified based on the type and severity of the incident. Outline how the incident could be contained.
How to ace your finals without studying : Write an expository essay on the topic "How to ace your finals without studying"
Aligning information technology and organizational strategy : Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive an..
Download the annual income statements-balance sheets : Download the annual income statements, balance sheets, and cash flow statements for the last three fiscal years for Ford Motor Company. Compute three different valuation ratios, three different profitability ratios, and three financial strength ratio..
Identify the three types of employer payroll taxes : How are tax liability accounts and payroll tax expense accounts classified in the financial statements?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Identify the shortcomings of both it and the business

From a leadership/management perspective, what are the fundamental/underlying problems that exist within Hefty Hardware? Overall, how effective is the partnership between IT and the business at Hefty Hardware? Identify the shortcomings of both IT a..

  Entities and attributes would be tracked at starbucks

Write a 3 Page Paper about which entities and attributes would be tracked at Starbucks and why these are important. Gather as much info as possible without being too wordy

  Analysis of smart phone usage

In order to prepare a reply to Rami Chowdy's email, you will need to examine and analyse the database, Mobile_Phone.xlsx, thoroughly

  Importance of a supply chain strategy

Describe what a supply chain is and the importance of a supply chain strategy. Identify at least four key drivers of a supply chain strategy and the important ingredient of each to a supply chain strategy.

  Summary of a specific business communication technology

Write an individual 350-word summary of a specific business communication technology from the list of interests and discuss its present and potential future impact on business communication

  Discuss some of ethical and social issues facing business

Social & Ethical: Discuss some of the current social and ethical issues in today's world. Discuss some of ethical and social issues facing business and users

  Prepare a report that critiques project management tools

The Chief Information Officer (CIO) is not the IT project manager, but you are. The CIO would like an evaluation from you of project management tools in the marketplace - their strenths, weaknesses and so forth. You need to prepare a report for t..

  Pertinent information for successful implementation

What other data bases might you use to insure that management has all of the pertinent information necessary for the successful implementation

  Harnessing information management

Harnessing Information Management

  Report for ms petrelli describing some port-scanning tools

Based on this information, write a 4 page report for Ms. Petrelli describing Some port-scanning tools that might be useful to your company. The report should Include available tools, such as Retina or Languard, and their cost

  External financial reporting problem

Nicole, Inc. uses iGAAP for its external financial reporting. During 2009, an employee of the company was injured in the factory. Discussions with corporate attorneys resulted in a determination that the company would be required to pay between $1..

  Specific innovation of the airmouse technology

Specific innovation of the airmouse technology, Potential risks in using this technology for an organization, How this technology can be 'integrated' in the organization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd