Would you involve any external government or private agency

Assignment Help Management Information Sys
Reference no: EM132279327

‘Boeing Possibly Hit by WannaCry' Malware Attack

In his article dated 3/28/2018 in NYT, Nicole Perlroth wrote:

"Boeing said on Wednesday that it was hit by a cyberattack that some Boeing executives identified as the same WannaCry computer virus that struck thousands of computer systems in more than 70 countries around the world last year.

In an internal memo, Mike VanderWel, chief engineer of Boeing Commercial Airplane production engineering, said the attack was "metastasizing" and he worried it could spread to Boeing's production systems and airline software"

In a high level, please briefly discuss the steps you would follow if you have been selected to lead the Information Security team for this ransomware incident.

Hints for best practices

Don't just describe good security measures that would be implemented after everything is stable and under control.

What would you do first hour, first day, and so on.Think about the big picture and how you would escalate the issue.

who are your stakeholders? Think about RACI matrix (Responsible, Accountable, Consulted, and Informed)

Who should be notified first?

Would you form your response team?

Collecting and handling evidence investigation

What is the role of digital forensics?

What about backup and restore?

Do you need to restore anything?

Reporting and Documenting? What about your initial incident report?

Would you be segregating some computers and folders from the network?

Would you involve any external government or private agency ?

Think about the process from both management and technical perspectives.

Reference no: EM132279327

Questions Cloud

What is the average unit cost of the order : What is the average unit cost of the order? Please provide at least one step of calculation and the correct answer for full credit.
Human resources department : What would be advantages and disadvantages of the Human Resources department if they had individual strategies
People use the services of intermediaries : Why do most people use the services of Intermediaries as opposed to direct finance?
Factory and business dimensional lifecycle : What is the difference when conduct the ETL with Cooperate information factory and business dimensional lifecycle?
Would you involve any external government or private agency : Reporting and Documenting? What about your initial incident report? Would you be segregating some computers and folders from the network?
What is the concept of globally right source : What is the concept of Globally Right source and how can an organization use this to add value to their activities to increase their competitive positions?
Marketing communications industry : What are relevant issues within the marketing communications industry.
Explain pci compliance to the database administrator : Explain PCI compliance to the database administrator at a large retailer. Consider the consequences for non-compliance.
Feedback on the performance of team members : How does collecting regular feedback on the performance of team members, from relevant sources assist managers in identifying the learning needs of individuals

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe the challenges businesses have in securing data

Describe the challenges businesses have in securing data in today's technological environment and what businesses should do to mitigate or minimize risks.

  Discuss about the implications associated with wifi calling

Users of mobile devices often experience connection issues, which have prompted some cellular providers to offer WIFI calling.

  Which is position manages firewalls and antivirus

which is position manages firewalls and antivirus softwarethis managerial is position is responsible for managing such

  Examine the prevalence of honeypots

Examine the prevalence of honeypots and honey nets? Evaluate the advantages and disadvantages of using each.

  Role of the operating manager in given case

The Role of the Operating Manager in Information Systems, It was 7:30 P.M. on September 22, 2006, and Leon Lassiter, Vice President of Marketing with the Midsouth Chamber of Commerce (MSCC), was still in his office, reflecting on the day's frustrat..

  Explain three properties of the media you identify

Explain three properties of the media you identify that qualify it as propaganda in your eyes.

  List three circumstances that will require planning in him

What is the purpose of performance standards?How can the human resource department assist the HIM department managers/supervisors?

  How to create an effective business continuity plan

What recommendations would you have for small and medium-sized businesses based on the article?

  Are you satisfied with your current level of nursing

NR 512:Are you satisfied with your current level of nursing informatics competencies? What, if anything, would you like to change or improve? How, if at all, do you see the evolving role of the master's-prepared nurse defining additional inf..

  Computer hardware and softwarewhat are some of the types of

computer hardware and softwarewhat are some of the types of computer hardware and software available today to make

  Explain the digital crime thoery

Explain the manner in which the theory that you selected in Question 1 relates to crime in general.Determine one (1) additional theory that a researcher could use to explain the cause of digital-crime and non-digital crime. Include one (1) example ..

  Describe the major privacy issues facing organizations today

The CEO is concerned about the amount of information that is being collected and maintained within the organization.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd