Case Exercises The nest day at SLS found everyone in technical support busy rest
ID: 3748108 • Letter: C
Question
Case Exercises
The nest day at SLS found everyone in technical support busy restoring computer systems to their former state and installing new virus and worm control software. Amy found herself learning how to re-install desktop computer operating systems and applications as SLS made a heroic effort to recover from the attack of the previos day.
Discussion Questions
1. Do you think this event was caused by an insider or outsider? Explain your anwer.
2. Other than installing virus and worm control software, what can SLS do to prepare for the nest incident?
3. Do you think this attack was the result of a virus or a worm? Explain your answer.
Ethical Decision Making
Often an attacker crafts e-mail attacks containing malware designed to take advantage of the curiosity or even greed of the recipients. Inmagine that the message body Amy saw on the e-mail from Davey had been "See our managers' salaries and SSNsP instead of "Funniest joke you'll see today."
1. Would it be ethical for Amy to open such a file?
2. If such an e-mail came in, what would be the best action to take?
Explanation / Answer
Answer)
1) From the above statement, it is not evident as to what type of attack it is,
It might be an insider or an outsider attack which has resulted in re-installing and restoring the systems.
2) Other than just installing the virus and worms control software SLS should also keep a thorough check on the logs and monitor the network and systems and installed the latest malware, ransomware protections and should follow the encryption technique to prevent such attacks in future, Also patches are to be done on a frequent basis as and when needed.
3) Yes, it might happen that this attack was because of virus and worm because of which the files and system were corrupted.
It can also be because of denial of service because of which systems were not responding as a result of which the systems were restored.
Section 2)
1) It would be unethical to open such files as it might have a virus and malware which again might attack the systems and be a huge loss to the organization.
2) The best action would be to delete such files.
Hit like if you find the answer useful. :)
Hope this answer helps. Thanks
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.