What would you communicate to your manager

Assignment Help Computer Engineering
Reference no: EM133591928

Discussion Post

You were introduced to a ransomware attack scenario during Unit I in which you assumed the role of a recently hired cybersecurity analyst to help the organization to respond to an unfolding ransomware attack. In Unit II, you provided your manager with your ideas on ransomware attack vectors, how an attacker might employ a vector in an attack or how Celinszky Automotive Group (CAG) might best defend against these common vectors.

Your manager appreciated your thoughtful analysis on the infiltrate phase and would now like your thoughts on the Activate phase. Your efforts at educating users on the common ransomware attack vectors has been a huge success. Despite that success, some users were caught off guard and clicked through a phishing email message. At least one user landed on a malicious website and clicked a form submission button that allowed the attacker direct access to your network.

Now that an attacker has infiltrated your network, and you suspect they have planted ransomware on some systems:

Choose one of the questions below.

Question A. What would you communicate to your manager?
Question B. What, if anything can CAG do to determine if malicious code was transferred over the network and planted on a system?
Question C. Provide your thoughts on how a defender can gain better visibility over the Activate phase.
Question D. How do you think CAG can best defend against a ransomware attack in the activate stage?

Textbook: Grama, J. L. (2022). Legal and privacy issues in information security (3rd ed.). Jones and Bartlett.

Reference no: EM133591928

Questions Cloud

Would it be appropriate to have the manager finish : Would it be appropriate to have the manager finish the checkout when this sort of difficulty with a guest arises? Or should the front-desk agent just take
Explain the purpose and focus of your selected organizations : Select three of these organizations that are most relevant to your career goals. Explain the purpose and focus of your three selected organizations.
Analyze the provided case study on an international trade : Read and analyze the provided case study on an international trade dispute involving Canada. Use relevant sources to gather additional information and data
What relevant detail of the scenario support your conclusion : What relevant details of the scenario support your conclusion? Name one change that occurred from one version to the next. Was it an improvement?
What would you communicate to your manager : What would you communicate to your manager? How do you think CAG can best defend against a ransomware attack in the activate stage?
Why might a treasury regulation be unreliable : Why might a Treasury Regulation be unreliable?
Discuss challenges and threats that organizational leaders : Discuss the challenges and threats that organizational leaders face when protecting privacy and planning for their business continuity.
Why should a company ensure that their incident response : Why should a company ensure that their incident response and digital investigations meet the same legal standard required by law enforcement?
Why is biffle acceptance invalid : The crop was destroyed by wheat weevils in September. Biffle faxed an acceptance to Kenseth in early October. Why is Biffle's acceptance invalid?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define the use of blockchain for the protection

Discuss in 500 words or more the use of blockchain for the protection of one of medical, financial, or educational records. Each paragraph must have at least.

  How does given impact data management within organizations

How do trustworthy and ethical leaders enhance knowledge sharing in organizations? How does this impact the rate of information technology implementations?

  Solve the recurrence using the master theorem

Show Proof of correctness and state, and solve the Recurrence using the Master Theorem.

  Write the message left to right across the rows

Use a Caesar cipher shifting letters 2 to the right to encode the message "EAT YOUR VEGETABLES and Use a transposition cipher to encode the message

  What are the attributes of efficient access control system

What is access control and is it enough to security an entity? (elaborate response) What are the attributes of an efficient access control system?

  Can you pick a programming language which was influential

Can you pick a programming language which was the most influential to the later languages but not successful at that time?

  What are the cloud cybersecurity threats

Create an original 10 question survey asking questions about (your topic) in MS Word. The survey should be based on a 5-point Likert scale and be in a survey.

  Multiply two numbers showing result in a register

Add and subtract two numbers showing result in a register. Multiply two numbers showing result in a register.

  Write a main method for the program

Write a main method for the program that demonstrates that the class works properly by displaying actual resistances for ten 330 O ±10 percent resistors.

  Create a poster to make the user aware of the key indicators

Using the list of possible, probable, and definite indicators of an incident, draft a recommendation to assist a typical end user in identifying.

  As a software engineer what are the means of tracking you

as a software engineer what are the means of tracking you would use to track and monitor the reuse history of a

  Write a lc-3 assembly program to perform division

Write a LC-3 assembly program to perform division. The integers (between 1 and 9) for the division are provided by the user in response to a prompt.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd