Suggest a password policy for no-internal-controls

Assignment Help Management Information Sys
Reference no: EM131401643

CASE ASSIGNMENT

Background:

No-Internal-Controls, LLC is a mid-sized pharmaceutical sales company in the Midwest of the US employing around 150 personnel. It has grown over the past decade by merging with other pharmaceutical sales companies and purchasing smaller firms.

Recently No-Internal-Controls, LLC suffered a ransomware attack. The company was able to recover from the attack with the assistance of a third party IT Services Company.

Attack Analysis:

After collecting evidence and analyzing the attack, the third party was able to recreate the attack.

No-Internal-Controls, LLC has a number of PCs configured for employee training

These training computers use generic logins such as "training1", "training2", etc. with passwords of "training1", "training2", etc.

The logins were not subject to lock out due to repeated incorrect logins

One of the firms purchased by No-Internal-Controls, LLC allowed Remote Desktop connections from the Internet through the firewall to the internal network for remote employees

Due to high employee turnover and lack of documentation none of the IT staff were aware of the legacy remote access

The main office has only a single firewall and no DMZ or bastion host exists to mediate incoming remote connections

The internal network utilized a flat architecture

An attacker discovered the access by use of a port scan and used a dictionary attack to gain access to one of the training computers

The attacker ran a script on the compromised machine to elevate his access privileges and gain administrator access

The attacker installed tools on the compromised host to scan the network and identify network shares

The attacker copied ransomware into the network shares for the accounting department allowing it spread through the network and encrypt accounting files

Critical accounting files were backed up and were recovered, but some incidental department and personal files were lost

Question 1:

Suggest a password policy for No-Internal-Controls. Include an example of a technical control and an administrative control. Also include examples of a preventative control and a detective control. You may include as many controls as you like. Explain how this will mitigate against similar attacks.

Question 2:

No-Internal-Controls has a main office, two regional sales offices, and two warehouses. Suggest a physical security policy for

No-Internal-Controls that includes controls that address each of the following potential vulnerabilities:

· The warehouses have multiple controlled pharmaceuticals that must be logged when received and shipped out.

· Each warehouse has a separate room for highly regulated narcotics.

· The main office has a public lobby and conference rooms for guests and prospective clients.

· One of the regional offices is in an urban area that has been suffering from an increase in vandalism and petty crime.

· The data center is located at the main office. There are two doors, one from the Network Admin's office and one from the main hallway between the IT department and the Finance department.

Question 3:

No-Internal-Controls has a limited budget and is considering one of three different projects for the first half of the year:

· A network penetration test from an accredited third party security firm

· New firewalls, a NIDS appliance, jump servers for remote access, and RSA tokens for remote employees

· A new fiber channel SAN with specialized backup software allowing off-site replication to one of the regional offices.

The organization can only afford one project, the other two will be delayed until the end of the year. The board has asked you to recommend which project will be funded first. Which one do you support, and why?

Question 4:

A) The Board of Directors wants to preserve evidence in the event that the attacker can be identified and prosecuted. Refer to slide 8 from the Week 5 lecture. How can we assure that the evidence is authentic? Accurate? Complete? Should you request documentation from the IT services company that investigated? Why?

B) What ports and protocol was in use by the remote employees at the time of the attack?

Reference no: EM131401643

Questions Cloud

Fraud and risk factors and enterprise systems : Review the Fraud Risk Factors on page 288 of the textbook. Choose one (1) factor which you believe is the most important. Justify your response. Next, choose one (1) factor and determine two (2) policies that a company could put in place in order ..
Fit straight line to relationship between weight and year : Fit a straight line to the relationship between Weight and Year.- Does a straight line seem reasonable?- Predict the average weight of the team for the year 2003. Does this seem reasonable?
Implement a plan of care in a faith-based community : To formulate and implement a plan of care in a faith-based community: A focus on the mind, body, and spirit - Determine your practicum's project processes and procedures.
Outright spot exchange rate : The SF/$ 180-day forward exchange rate is SF1.30/$ and the 180 day forward premium is 8 percent. What is the outright spot exchange rate? 1.25 please show work
Suggest a password policy for no-internal-controls : No-Internal-Controls, LLC is a mid-sized pharmaceutical sales company in the Midwest of the US employing around 150 personnel. It has grown over the past decade by merging with other pharmaceutical sales companies and purchasing smaller firms.Rece..
How many yen will the customer get : Suppose a bank customer with €1,000,000 wishes to trade out of euro and into Japanese yen. The dollar-euro exchange rate is quoted as $1.60 = €1.00 and the dollar-yen exchange rate is quoted at $1.00 = ¥120. How many yen will the customer get?
Calculate the company debt to equity ratio : 1. Brands Company has total current assets of $11,422,000, current liabilities of $5,112,000 and a quick ratio of 0.76.  What is its level of inventory? 2. Mountain Resort has total assets of $459, 800,000 and a debt ratio of 0.30.  Calculate the c..
How installing water wells in remote villages represents : Define your assigned concept and include an appropriately formatted citation. Explain how installing water wells in remote villages represents an expression of your assigned concept.
Considered alternative capital projects : What are considered alternative capital projects and by what method are they evaluated?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd