Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Case Exercises The nest day at SLS found everyone in technical support busy rest

ID: 3748108 • Letter: C

Question

Case Exercises

The nest day at SLS found everyone in technical support busy restoring computer systems to their former state and installing new virus and worm control software. Amy found herself learning how to re-install desktop computer operating systems and applications as SLS made a heroic effort to recover from the attack of the previos day.

Discussion Questions

1. Do you think this event was caused by an insider or outsider? Explain your anwer.

2. Other than installing virus and worm control software, what can SLS do to prepare for the nest incident?

3. Do you think this attack was the result of a virus or a worm? Explain your answer.

Ethical Decision Making

Often an attacker crafts e-mail attacks containing malware designed to take advantage of the curiosity or even greed of the recipients. Inmagine that the message body Amy saw on the e-mail from Davey had been "See our managers' salaries and SSNsP instead of "Funniest joke you'll see today."

1. Would it be ethical for Amy to open such a file?

2. If such an e-mail came in, what would be the best action to take?

Explanation / Answer

Answer)

1) From the above statement, it is not evident as to what type of attack it is,

It might be an insider or an outsider attack which has resulted in re-installing and restoring the systems.

2) Other than just installing the virus and worms control software SLS should also keep a thorough check on the logs and monitor the network and systems and installed the latest malware, ransomware protections and should follow the encryption technique to prevent such attacks in future, Also patches are to be done on a frequent basis as and when needed.

3) Yes, it might happen that this attack was because of virus and worm because of which the files and system were corrupted.

It can also be because of denial of service because of which systems were not responding as a result of which the systems were restored.

Section 2)

1) It would be unethical to open such files as it might have a virus and malware which again might attack the systems and be a huge loss to the organization.

2) The best action would be to delete such files.

Hit like if you find the answer useful. :)

Hope this answer helps. Thanks

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote