Question

Case Study Exercise: The next day at SLS found everyone in technical support busy restoring computer...

Case Study Exercise: The next day at SLS found everyone in technical support busy restoring computer systems to their former state and installing new virus and worm control software. Amy found herself learning how to install desktop computer operating systems and applications as SLS made a heroic effort to recover from the attack of the previous day. Questions:

  1. Do you think this event was caused by an insider or outsider?Why do you think this?
  2. Other than installing virus and worm control software, what can SLS do to prepare for the next incident?
  3. Do you think this attack was the result of a virus, or a worm? Why do you think this?
0 0
Add a comment Improve this question Transcribed image text
Answer #1

a) the reason can be both, the attack is definitely not carried and performed by an insider but the insider may help the attack to carry out the attack. If the infrastructure of SLS is properly secured, it would not be easy for an attacker to carry out an attack that easy but if the attacker is efficient with these type of stuffs, he can do it. It will always easy for attackers to carry out the attack if they get hold of a insider's credentials.

b) here are few steps that SLS can do:

  • Implementing firewalls: implementation of firewall must always be the basic step that need to be done while implementing security. Firewalls will block unwanted traffic from entering into the network and thus the chances of an attack is minimised.
  • Encryption: Implementing encryption tool will help to encrypt valuable data. Decryption of data is not an easy task for the attacker to perform. Getting hold of the original data will always be difficult if the encryption is done using a powerful algorithm.
  • Backups: This is actually important for any business to have, backing up of data and then restoration of the data in these type of situations is good for business. If the business has proper backup, then whatever happens to the infrastructure, they can easily restore it and ensure business continuity.

c) If we look at the intensity of the attack, this attack is caused by a virus. Actually virus can damage the whole data easily and effectively. Moreover, killing and detecting a virus is always difficult. Moreover, virus can multiply themselves easily and damage done is increased.

Add a comment
Know the answer?
Add Answer to:
Case Study Exercise: The next day at SLS found everyone in technical support busy restoring computer...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • In this exercise, we will re-visit the case study “A day in the life” at the...

    In this exercise, we will re-visit the case study “A day in the life” at the end of Chapter 1. Answer these questions: 1- Based on the information provided in the case, what kind of project management structure you think this organization uses? 2- What conclusions can you draw about the organization culture? Use dimensions introduced in Chapter 3 to support your answer. Case study: A Day in the Life Rachel The project manager of a large information systems project...

  • Case Study 1: Should a Computer Grade Your Essays? Would you like your college essays graded...

    Case Study 1: Should a Computer Grade Your Essays? Would you like your college essays graded by a computer? Well, you just might find that happening in your next course. In April 2013, EdX, a Harvard/MIT joint venture to develop massively open online courses (MOOCs), launched an essay-scoring program. Using arti ficial intelligence technology, essays and short answers are immediately scored and feedback tendered, allowing students to revise, resubmit, and improve their grade as many times as necessary. The non-profit...

  • internal project 1 anything helps! thank you!! Instructions: Study the case that starts on page 3...

    internal project 1 anything helps! thank you!! Instructions: Study the case that starts on page 3 carefully. Then write concise answers to the following questions regarding the internal control system of Duarf, Inc. Clearly label your responses with proper headings and subheadings. Be very specific and precise. Answers that appear to be beating around the bush will not get any credit. 1. What are the controls in place that under normal conditions should function well to prevent embezzlements or frauds?...

  • Hi, Kindly assist with my project management assignment below using the attached case study Question 1 Update the project charter for the remainder of the project in response to Adams’ memo (lines 241...

    Hi, Kindly assist with my project management assignment below using the attached case study Question 1 Update the project charter for the remainder of the project in response to Adams’ memo (lines 241 through 246). Question 2 Prepare a plan for the remainder of the project in response to Adams’ memo (lines 241 through 246). Your answers to the above will be assessed in terms of the level of communication displayed, the insights and inferences drawn, and your ability to...

  • Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255....

    Read the case study "Google, Apple, and Facebook Struggle for Your Internet Experience" on page 255. Then discuss the advantages and disadvantages for each company. BUSINESS PROBLEM-SOLVING CASE Google, Apple, and Facebook Battle for Your Internet Experience Apple has a legacy of innovation on its side. In Three Internet titans Google, Apple, and 2011, it unveiled the potentially market disrupting Facebook are in an epic struggle to dominate your Siri (Speech Interpretation and Recognition Internet experience, and caught in the...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Mini Case Building Shared Services at RR Communications4 4 Smith, H. A., and J. D. McKeen....

    Mini Case Building Shared Services at RR Communications4 4 Smith, H. A., and J. D. McKeen. “Shared Services at RR Communications.” #1-L07-1-002, Queen’s School of Business, September 2007. Reproduced by permission of Queen’s University, School of Business, Kingston, Ontario, Canada. Vince Patton had been waiting years for this day. He pulled the papers together in front of him and scanned the small conference room. “You’re fired,” he said to the four divisional CIOs sitting at the table. They looked nervously...

  • Mini Case Building Shared Services at RR Communications4 4 Smith, H. A., and J. D. McKeen....

    Mini Case Building Shared Services at RR Communications4 4 Smith, H. A., and J. D. McKeen. “Shared Services at RR Communications.” #1-L07-1-002, Queen’s School of Business, September 2007. Reproduced by permission of Queen’s University, School of Business, Kingston, Ontario, Canada. Vince Patton had been waiting years for this day. He pulled the papers together in front of him and scanned the small conference room. “You’re fired,” he said to the four divisional CIOs sitting at the table. They looked nervously...

  • Please read the case provided below and answer the following question: In 2007, JetBlue was a...

    Please read the case provided below and answer the following question: In 2007, JetBlue was a booming young airline with a strong reputation for outstanding service. In fact, the low-fare airline referred to itself as a customer service company that just happened to fly planes. But on Valentine's Day 2007, JetBlue was hit by the perfect storm-literally-of events that led to an operational meltdown. One of the most severe storms of the decade covered JetBlue's main hub at New York's...

  • CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male...

    CASE 8 Unlocking the Secrets of the Apple iPhone in the Name of access the male San Bernardino suspect's iPhone 5c. Cook stated: Antiterrorism We are challenging the FBI's demands with the deepes respect for American democracy and a love of our country. We believe it would be in the best interest of everyone to step back and consider the implications While we believe the FBI's intentions are good, if would be wrong for the w e nt to force...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT