How you approach your interaction with second shift operator

Assignment Help Computer Networking
Reference no: EM131330106

Iris's smartphone beeped. Frowning, she glanced at the screen, expecting to see another junk e-mail. "We've really got to do something about the spam!" she muttered to herself. She scanned the header of the message. "Uh-oh!" Glancing at her watch and then looking at her incident response pocket card, Iris dialed the home number of the on-call systems administrator.

When he answered, Iris asked "Seen the alert yet? What's up?" "Wish I knew-some sort of virus," the SA replied. "A user must have opened an infected attachment." Iris made a mental note to remind the awareness program manager to restart the refresher training program for virus control. Her users should know better, but some new employees had not been trained yet. "Why didn't the firewall catch it?" Iris asked. "It must be a new one," the SA replied. "It slipped by the pattern filters."

"What are we doing now?" Iris was growing more nervous by the minute. "I'm ready to cut our Internet connection remotely, then drive down to the office and start our planned recovery operations-shut down infected systems, clean up any infected servers, recover data from backups, and notify our peers that they may receive this virus from us in our e-mail. I just need your go-ahead." The admin sounded uneasy. This was not a trivial operation, and he was facing a long night of intense work. "Do it," Iris said.

"I'll activate the incident response plan and start working the notification call list to get some extra hands in to help." Iris knew this situation would be the main topic at the weekly CIO's meeting. She just hoped her team would be able to restore the systems to safe operation quickly. She looked at her watch: 12:35 a.m.

Discussion

1. What can be done to minimize the risk of this situation recurring? Can these types of situations be completely avoided?

2. If you were in Iris's position, once the timeline of events has been established, how would you approach your interaction with the second-shift operator?

3. How should RWW go about notifying its peers? What other procedures should Iris have the technician perform?

4. When would be the appropriate time to begin the forensic data collection process to analyze the root cause of this incident? Why?

Reference no: EM131330106

Questions Cloud

What is an advantage of an adjustable-rate mortgage : What is an advantage of an adjustable-rate mortgage? What is the best definition of profit? Which best describes why a company issues stocks? What is one main objective in the study of economics?
Describe a cultural diversity policy for the firm : Describe a cultural diversity policy for the firm expanding overseas operations. Highlight any differences that might arise in some Middle Eastern countries where a distribution center is currently being built
Describe the criteria for selecting infosec personnel : When an organization undertakes an InfoSec-driven review of job descriptions, which job descriptions must be reviewed? Which IT jobs not directly associated with information security should be reviewed?
Identifying external strategic factors includes all except : Identifying external strategic factors includes all EXCEPT: Internal analysis results in the identification of _________ factors that impact the competitive position and profitability of an organization.
How you approach your interaction with second shift operator : What can be done to minimize the risk of this situation recurring? Can these types of situations be completely avoided?
Find the maximum value of the vibrational constant : The vibrational partition function for an unknown diatomic molecule at 300 K is 2.33.
How people get paid around the world depends on variations : Understanding international compensation begins with the recognition of differences and similarities, along with figuring out how to best manage them. How people get paid around the world depends on variations
Issues that exist between 3nf and bcnf : Explain the issues that exist between 3NF and BCNF.  Now normalize through BCNF.  Show the relations at each step even if there is no change so I can see the process.
What was the annual effective rate of interest : Joanna deposits $200 at the beginning of every quarter in the bank account. Five years later the balance in the bank is 4, 500. What was the annual effective rate of interest?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd