Discuss about an attack analysis about it security

Assignment Help Management Information Sys
Reference no: EM131725333 , Length: 5

The following scenario is based on an actual attack deconstructed at a seminar I attended earlier this year. The names and locations have been removed to preserve the privacy of the organization in question.

Background:

No-Internal-Controls, LLC is a mid-sized pharmaceutical company in the Midwest of the US employing around 150 employees. It has grown over the past decade by merging with other pharmaceutical companies and purchasing smaller firms.

Recently No-Internal-Controls, LLC suffered a ransomware attack. The company was able to recover from the attack with the assistance of a third party IT Services Company.

Attack Analysis:

After collecting evidence and analyzing the attack, the third party was able to recreate the attack.

No-Internal-Controls, LLC has a number of PCs configured for employee training

These training computers use generic logins such as "training1", "training2", etc. with passwords of "training1", "training2", etc.

The generic logins were not subject to lock out due to incorrect logins

One of the firms purchased by No-Internal-Controls, LLC allowed Remote Desktop connections from the Internet through the firewall to the internal network for remote employees

Due to high employee turnover and lack of documentation none all of the IT staff were aware of the legacy remote access

The main office has only a single firewall and no DMZ or bastion host exists to mediate incoming remote desktop connections

The internal network utilized a flat architecture

An attacker discovered the access by use of a port scan and used a dictionary attack to gain access to one of the training computers

The attacker ran a script on the compromised machine to elevate his access privileges and gain administrator access

The attacker installed tools on the compromised host to scan the network and identify network shares

The attacker copied ransomware into the network shares for the accounting department allowing it spread through the network and encrypt accounting files

Critical accounting files were backed up and were recovered, but some incidental department and personal files were lost

Instructions:

You have been hired by No-Internal-Controls, LLC in the newly created role of CISO and have been asked to place priority on mitigating further attacks of this type.

Suggest one or more policies that would help mitigate against attacks similar to this attack

Suggest one or more controls to support each policy

Identify each of the controls as physical, administrative, or technical and preventative, detective, or corrective.

Keep in mind that No-Internal-Controls, LLC is a mid-sized company with a small IT staff and limited budget

Do not attempt to write full policies, simply summarize each policy you suggest in one or two sentences.

Clearly indicate how each policy you suggest will help mitigate similar attacks and how each control will support the associated policy

3-5 pages in length.

APA format.. citations, references etc.

Reference no: EM131725333

Questions Cloud

What are the advantages of having an interface : Consider an alternative interface design that provides an interface for every layer of protocol software.
Financial incentive attached to the requirements : Due to Meaningful Use and the financial incentive attached to the requirements, using an EHR is now almost unavoidable on the job. HIM professionals
Do you think multinationals face in those countries : What kinds of socio-economic challenges do you think multinationals face in those countries?
Lists the names of companies : Make a query that lists the names of companies that have referred at least one other client and those that are in the top 2 industries
Discuss about an attack analysis about it security : An attacker discovered the access by use of a port scan and used a dictionary attack to gain access to one of the training computers
Discuss revising and presenting your writing : Discuss the Revising and Presenting Your Writing. Identify areas of evaluation you consider to be most important in communicating effectively misunderstandings.
Sentence or phrase from the user : Given some sentence or phrase from the user, display the sentence where each word has had its letters reversed. After the reversed-worded sentence.
How would you prioritize these projects : With the information provided, how would you prioritize these projects? Please provide details to your reasoning with words and visuals of your choice
Object-oriented design : Select an organization that you are familiar with and determine the most advantageous benefits of using object-oriented design in this organization.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Create a web design usability guide for an organization

Before you learn how to use web-authoring software to design, edit, and update web-based content, you need to understand basic concepts regarding user interface

  Discuss the key risks to a health care organization

From the e-Activity, create an argument that highlights both the strengths and weaknesses of outsourcing the information technology responsibilities for a health care organization. Support your response with a list of at least three (3) functions ..

  Recommend ways to use social media in stakeholder management

Recommend ways to use social media in stakeholder management. This can include social media features in software such as chatter in salesforce or the ability to +1 in Google groups when used as intranets.

  Create the program which converts fahrenheit to celsius

Create the program which converts Fahrenheit to Celsius - The output Celsius should be a floating point - Format your manual according to APA style

  Opt-in vs opt-out memoprepare a 3 page memorandum that

opt-in vs opt-out memoprepare a 3 page memorandum that examines an opt-in vs opt-out startegy for an online buiness to

  Explain quality management planning

Explain quality and its importance to project success. Explain quality management planning. Contrast quality assurance and quality control

  Develop a business case for implementing crm

Develop a 1-page business case for implementing CRM within your current organization, an organization you are familiar with, or an organization you can research

  Demonstrate critical thinking to prioritize the action items

You also need to be creative in presenting this information to capture the most important points from the National Infrastructure Protection Plan.

  Non-it managers inputs on technologyshould non-it managers

non-it managers inputs on technologyshould non-it managers identify technology that will help the business meets its

  Define what is encompassed in term information technology

Define what is encompassed in the term information technology. What are some of the ways that IT has become "pervasive"? What kinds of portable IT help employees work more efficiently and effectively?

  What are the threats and risks to the digital identities

IT Risk Assessment. What are the threats and risks to the digital identities of Government employees from the move to SaaS applications?

  Write a report on the csp and customer responsibilities

You are to write a report on the CSP and customer responsibilities associated with the different cloud architectures (SaaS, PaaS, and IaaS). Explain the different types of cloud service architectures.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd