Question: Consider the following case study and write down the following questions. On Thursday morning, John, an XYZ university employee, noticed a warning message on his
Consider the following case study and write down the following questions.
On Thursday morning, John, an XYZ university employee, noticed a warning message on his computer saying that the system has been attacked by a worm WinVB Even though the antivirus software was present in the system, the software failed to detect the new worm because it was not updated to the latest version. When John tried to open his email, he experienced a slow internet connection. He noticed there were some unusual file names in the disk. John immediately informed his friend Bob, who was also an XYZ employee, of the problem. Bob checked his computer in his office and experienced the same problem as John. John and Bob checked several computers in the laboratories, and found that WinVB worm had infected many other computers in the laboratory. They contacted the system administrator of the XYZ University. The system administrator checked the computers in the laboratory and reported the incident to the incident response team. The system administrator also checked the computers in other laboratories. As a result of the worm attack the activities in the XYZ University laboratory were suspended for a day, which caused a great inconvenience.
This above case was escalated to an autonomous organization founded in July, that designs, develops, implements and maintains IT systems, products and services of one of the major government institutions in India. Governed by board, the organization has a Managing Director as the top authority. Operating with employees, the key functions of the company are as follows provide IT solutions, manage overall information system and give IT consulting services to its parent organization. Headquartered in New Delhi, the organization has its regional offices in five other cities in India.
Questions:
Brief your key observation on the above case study
List out the Information security requirements required for the case.
What Information Security policy, do you Recommend
List out the best practices for ISM.
What's the severity level of the above mentioned incident? and Suggest actions to improve the detection of similar events
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
