Malware was reported on multiple users systems

Assignment Help Basic Computer Science
Reference no: EM132347452

Select ONE of the following security incidents and provide the following information:

1. A SQL Injection was performed by a hacker, resulting in the loss of PII data.

2. You have discovered a covert leak (exfiltration) of sensitive data to China.

3. Malcious code or malware was reported on multiple users' systems.

4. Remote access for an internal user was compromised - resulting in the loss of PII data.

5. Wireless access. You discovered an "evil twin" access point that resulted in many of your users connecting to the hacker's access point while working with sensitive data.

6. Compromised passwords. You discovered that an attacker used rainbow tables to attack your domain's password file in an offline attack. Assume that all of your user's passwords are compromised.

7. A DoS or DDoS was performed against your system, resulting in the loss of 3 hours of downtime and lost revenue.

Paragraph 1: IRT Team. What would the IRT team look like for this incident (who would be on the team to be able to effectively handle the event)? Justify your choices.

Paragraph 2: Approach. Address HOW you would respond. What logs or tools would you use to identify/analyze the incident? What would alert you to the incident? What tools would you use to contain/recover from the incident?

Paragraph 3: Metrics. Who would you measure your team's response effectivenss? What measurements/metrics would you track?

Note: Paper should have minimum 250 words, Proper references and inline citations.

Reference no: EM132347452

Questions Cloud

Average worker in their organization : Are U.S. Executives paid too much particularly compared to the average worker in their organization?
Destroy the physical components of entity quickly : Fire is one of the most devastating elements that can destroy the physical components of an entity quickly.
List the noteworthy strengths and weaknesses of the theory : List the noteworthy strengths and weaknesses of the theory. (Optional) Include any notes that you find helpful in understanding and applying the theory.
How might you promote discussion of controversial issues : Write a 2-3-page analysis of the areas where you are strong in your ethics and the areas where you may examine further to define or improve your ethical stance
Malware was reported on multiple users systems : A SQL Injection was performed by a hacker, resulting in the loss of PII data. Malcious code or malware was reported on multiple users' systems.
List the primary characteristics or features of the theory : List the primary characteristics or features of the theory (its key tenets and concepts). Be sure to include if a particular period of life is emphasized.
How did the application work to influence your thoughts : Think of a time when operant conditioning has played a role in your life. How did the application work to influence your or another person's thoughts and action
Find Probability that chosen person is either girl or blond : There are 20 people in the room: One person from the group is chosen randomly. Find Probability that the chosen person is either a girl or blond
Can steganography replace the use of encryption : What are the advantages and disadvantages of using steganography? Can steganography replace the use of encryption?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the socially optimal level

What is the socially optimal level of P, based on the Samuelson condition?

  Draw external view diagram by compiling all inputs-outputs

Draw the external view diagram by compiling all inputs and outputs from these four functional diagrams Draw the internal view diagram by compiling all info processors and info sores from these four functional diagrams.

  What rc key value leave state vector during initialization

What RC4 key value will leave state vector, S unchanged during initialization? That is after the initial permutation of S, the entries of S will be equal to the values.

  Understanding the function and responsibilities

Understanding the function and responsibilities of each layer of the OSI model will help to understand how network communications function

  Can the conservators cancel the deed

Conrad Schaneman sr v. Lawrence Schaneman. Can the conservators cancel the deed?

  Venture sustainable growth rate

Use the following information to estimate a venture's sustainable growth rate: Net income = $200,000; Total assets = $1,000,000; equity multiple based.

  Closing the digital divide might provide

Do you believe that having Internet access, as the author suggests, is not a convenience or luxury, but a human right? List one benefit that closing the digital divide might provide (e.g. economic growth).

  What differences might you expect in compilers designed

Compilers are used in many different circumstances. What differences might you expect in compilers designed for the following applications?

  Current values on foreign direct investments

1.) Discuss the two different methods the Bureau of Economic Analysis (BEA) uses to place current values on foreign direct investments.

  Describe the step-by-step process

If you had an additional 1.65 pounds to download songs, how many more songs could you have downloaded? Write and solve an equation to solve the problem. Describe the step-by-step process you used to solve the problem.

  Calculate the npv of machine

Machines A, B, C, and D are mutually exclusive are expected to produce real cash flows with the real opportunity cost of capital is 12%.

  Summarize the purpose of the sql language

Summarize the purpose of the SQL language

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd