Identify the three most critical it policy changes

Assignment Help Computer Engineering
Reference no: EM132721501

Assignment: Scenario: You are the Director of IT Security at Maersk's London, UK, IT headquarters, reporting to the CIO. You have just worked 10 days straight to manage Maersk's recovery from the cyberattack. You have had an average of 3 hours of sleep per day, all at your desk, and your primary food source has been mostly cold pizza that you also ate at your desk, and which was brought in by various employees in your team. Your partner brought changes of clothing and a toothbrush to the office.

You finally have Maersk back online. The CIO personally thanked you for your dedication to leading Maersk's recovery from the attack and informed you that you will receive a $50K bonus in your next paycheck as a token of thanks from the company for what you have done. She also asked you to write a short report describing what happened, what actions were taken to recover, and what you recommend the company should do to ensure this does not happen again. She intends to provide your report to the Maersk executive committee.

Your report should contain the following:

1) What Happened:

a. In 150 words or less, describe how a ransomware attack works, and its effect on the target servers/computers.

b. In 150 words or less, describe how NotPetya was different to a usual ransomware attack.

c. In 150 words or less, describe how and where the NotPetya ransomware infiltrated Maersk's network; identify the software vulnerability and policy lapses that allowed this to happen.

2) Actions Taken To Recover:

a. In 150 words or less describe why the domain controller was critical to restore the Maersk network.

b. In 150 words or less, describe how the domain controller directory was recovered. CSE 50 Fall 2020 CASE STUDY ASSIGNMENT

c. In two or three sentences explain why most of Maersk's IT system had to be replaced over the past 10 days to recover Maersk's network. Then provide a table summarizing the hardware that was replaced, the quantity of each type of hardware and the cost of replacing that hardware. Assume that every 25 PCs require a switch and every 100 servers require a router. (This will require you to do some research to identify the cost of switches, routers, servers and PCs).

3) Recommendations to Prevent such Attacks in Future:

a. Identify the three most critical IT policy changes that you recommend should be implemented immediately throughout the Maersk organization. Provide a two or three sentence explanation of how these policy changes would have helped to prevent the NotPetya or other malware attacks, or at least would have enabled faster recovery.

b. Assume that Maersk is not using machine learning based intrusion detection systems (NG-SIEM or NG-XDR). In 150 words or less describe how deploying active machine learning intrusion detection systems across the Maersk network can prevent attacks such as NotPetya. (This will require you to do some research on machine learning based intrusion detection such as XDR and SIEM).

Reference no: EM132721501

Questions Cloud

Difference between singly-linked list and doubly-linked list : What is the difference between a singly-linked list and a doubly-linked list? In what situation would you use a singly-linked list over a doubly-linked list?
Compute how much final tax will be withheld by wise ventures : Compute How much final tax will be withheld by Wise Ventures? Teddy is a venturer sharing 50% in the profits of Wise Ventures, an unincorporated joint
Find total final tax to withheld by partnership on gina : How do Compute the total final tax to be withheld by the partnership on Gina's profit sharing. Ms. Gina owns 40% of the capital and profits of Cebu Venture
Prepare the journal entries to record the transactions : On August 1, 2020, Splish Led. purchased a call option from DDR Investments Corporation. Prepare the journal entries to record the transactions
Identify the three most critical it policy changes : Identify the three most critical IT policy changes that you recommend should be implemented immediately throughout the Maersk organization.
Journalize the entries to record the transactions of Essex : Journalize the entries to record the transactions of Essex Company for July using the periodic inventory system
Find what amount is recognised as income in the statement : Find What amount is recognised as income in the statement of profit in respect of the reversal of the impairment of this asset in the year ended 31 December
What steps are usually done in a windows environment : Discuss the following, supplying citations to support any information that you provide. Do not include your opinion, only what you can support with a citation.
Determine the cost of goods sold under lifo : Calculate average unit cost. (Round answer to 2 decimal places, e.g. 5.12.). Determine the cost of goods sold under average-cost.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd