Suggest a policy that would help mitigate against attacks

Assignment Help Other Subject
Reference no: EM131405773

Assignment

The following scenario is based on an actual attack deconstructed at a seminar I attended last year. The names and locations have been removed to preserve the privacy of the organization in question.

Background:

No-Internal-Controls, LLC is a mid-sized pharmaceutical sales company in the Midwest of the US employing around 150 personnel. It has grown over the past decade by merging with other pharmaceutical sales companies and purchasing smaller firms.

Recently No-Internal-Controls, LLC suffered a ransomware attack. The company was able to recover from the attack with the assistance of a third party IT Services Company.

Attack Analysis:

After collecting evidence and analyzing the attack, the third party was able to recreate the attack.

No-Internal-Controls, LLC has a number of PCs configured for employee training

These training computers use generic logins such as "training1", "training2", etc. with passwords of "training1", "training2", etc.

The logins were not subject to lock out due to repeated incorrect logins

One of the firms purchased by No-Internal-Controls, LLC allowed Remote Desktop connections from the Internet through the firewall to the internal network for remote employees

Due to high employee turnover and lack of documentation none of the IT staff were aware of the legacy remote access

The main office has only a single firewall and no DMZ or bastion host exists to mediate incoming remote connections

The internal network utilized a flat architecture

An attacker discovered the access by use of a port scan and used a dictionary attack to gain access to one of the training computers

The attacker ran a script on the compromised machine to elevate his access privileges and gain administrator access

The attacker installed tools on the compromised host to scan the network and identify network shares

The attacker copied ransomware into the network shares for the accounting department allowing it spread through the network and encrypt accounting files

Critical accounting files were backed up and were recovered, but some incidental department and personal files were lost

Instructions:

You have been hired by No-Internal-Controls, LLC in the newly created role of CISO and have been asked to place priority on mitigating further attacks of this type. Keep in mind that No-Internal-Controls, LLC is a mid-sized company with a small IT staff and limited budget.
All Questions are worth 3 points each - 12 points total for the assignment. Assignment is due on January 29th, at 11:59 am, EsT.

Question 1:

Suggest a policy that would help mitigate against attacks similar to this one in the future. Justify your choice in one paragraph.

Question 2:

Good policies begin with an overview section that summarizes the policy for senior management. Write a summary paragraph for the Board that explains what the policy intends to do and how. Do not attempt to write a full policy, simply summarize it for the Board.

Question 3:

Suggest at least two different controls to support your policy and explain how they will support the policy. Identify each of the controls as physical, administrative, or technical and as preventative, detective, or corrective. Justify why you classified them the way you did.

Question 4:

Suggest an employee position to be responsible for your policy and what metrics they might use to measure compliance with the policy.

Reference no: EM131405773

Questions Cloud

Expain the selected companys specific practices or policies : Bus 322- Examine the selected company's specific practices or policies. Speculate on the major influences that these practices or policies have on individual and organizational outcomes.
Defend two organizational changes : Management has reviewed your work from two weeks ago about how the employees' low job motivation may affect the company internally and externally and determined that there is sufficient evidence to support an organizational change. It has asked yo..
Write null and alternative hypotheses : Write null and alternative hypotheses about the relationship between the two variables in this situation. Make your hypothesis statements specific to this situation.
Calculate the value of the chi square statistic for testing : Calculate the value of the chi-square statistic for testing the null hypothesis of no relationship between sex and handedness.
Suggest a policy that would help mitigate against attacks : Suggest a policy that would help mitigate against attacks similar to this one in the future. Justify your choice in one paragraph. Write a summary paragraph for the Board that explains what the policy intends to do and how.
What is the myth of amoral business : What is the Myth of Amoral Business? If business operates within the law, does it thereby automatically operate morally? Most moral judgements in business are made on such generally accepted rules as.
Explain whether each of the given is possible : Explain whether each of the following is possible.- A relationship exists in the observed sample but not in the population from which the sample was drawn.
What can be concluded about chi square test of relationship : The Minitab output for a chi-square test of the relationship follows. Based on this output, what can be concluded about the relationship?
When confronted with disciplinary problems from employees : When confronted with disciplinary problems from employees, the supervisor should. When conducting an investigation, the supervisor should interview.

Reviews

Write a Review

Other Subject Questions & Answers

  Cross-cultural opportunities and conflicts in canada

Short Paper on Cross-cultural Opportunities and Conflicts in Canada.

  Sociology theory questions

Sociology are very fundamental in nature. Role strain and role constraint speak about the duties and responsibilities of the roles of people in society or in a group. A short theory about Darwin and Moths is also answered.

  A book review on unfaithful angels

This review will help the reader understand the social work profession through different concepts giving the glimpse of why the social work profession might have drifted away from its original purpose of serving the poor.

  Disorder paper: schizophrenia

Schizophrenia does not really have just one single cause. It is a possibility that this disorder could be inherited but not all doctors are sure.

  Individual assignment: two models handout and rubric

Individual Assignment : Two Models Handout and Rubric,    This paper will allow you to understand and evaluate two vastly different organizational models and to effectively communicate their differences.

  Developing strategic intent for toyota

The following report includes the description about the organization, its strategies, industry analysis in which it operates and its position in the industry.

  Gasoline powered passenger vehicles

In this study, we examine how gasoline price volatility and income of the consumers impacts consumer's demand for gasoline.

  An aspect of poverty in canada

Economics thesis undergrad 4th year paper to write. it should be about 22 pages in length, literature review, economic analysis and then data or cost benefit analysis.

  Ngn customer satisfaction qos indicator for 3g services

The paper aims to highlight the global trends in countries and regions where 3G has already been introduced and propose an implementation plan to the telecom operators of developing countries.

  Prepare a power point presentation

Prepare the power point presentation for the case: Santa Fe Independent School District

  Information literacy is important in this environment

Information literacy is critically important in this contemporary environment

  Associative property of multiplication

Write a definition for associative property of multiplication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd