You\'re an IT manager in an organization. During a routine check of the log file
ID: 3636414 • Letter: Y
Question
You're an IT manager in an organization. During a routine check of the log files on network usage, you find that one of the users, Larry, is using the network to access files from the server every day for two to three hours after regular working hours. You meet Larry in the cafeteria the next day and tell him not to work after regular hours. Larry is surprised and says that he very rarely works long hours. It's clear to you that someone has hacked on to the network and used Larry's credentials to access the servers. You find the culprit on further investigation. How will you react to the situation based on your responsibilities as an IT manager? In this situation, which policy should the organization follow?Explanation / Answer
First of all I will inform all the developers to switch the network on early basis and then try to find the location of user accessing the files or database. i will then suggest to encrypt the network to avoid further hacking and take appropriate measures to avoid such things happen in future by removing the node which is producing difficulties
Related Questions
Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.