Module: CST2572 Secure Web Technologies Assessment 1: Case Study / Scenario Context: A client calls you...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Module: CST2572 Secure Web Technologies Assessment 1: Case Study / Scenario Context: A client calls you first thing on a Saturday morning, panicking as their website has been hacked. The website is for a major national health conference with NHS as a leading promotor. Other details: ● ● ● The server had auto-malware checks on it which shut the site down The server is an Apache server setup in a VM by a host The setup also contains the company's main health website with a member's database All websites are designed and running WordPress There is admin access via a username/password The web developers have declared that what has happened is out of their remit' Describe: How do you initially reconnaissance and discover what has occurred? How do you remedy? How do you clean-up and restore? Mitigate? Ensure you provide diagrams of the system and any upgrades or updates that are needed. Module: CST2572 Secure Web Technologies Assessment 1: Case Study / Scenario Context: A client calls you first thing on a Saturday morning, panicking as their website has been hacked. The website is for a major national health conference with NHS as a leading promotor. Other details: ● ● ● The server had auto-malware checks on it which shut the site down The server is an Apache server setup in a VM by a host The setup also contains the company's main health website with a member's database All websites are designed and running WordPress There is admin access via a username/password The web developers have declared that what has happened is out of their remit' Describe: How do you initially reconnaissance and discover what has occurred? How do you remedy? How do you clean-up and restore? Mitigate? Ensure you provide diagrams of the system and any upgrades or updates that are needed.
Expert Answer:
Answer rating: 100% (QA)
Initial Reconnaissance Isolate the Affected Server Ensure the compromised server is isolated from the network to prevent further damage Gather Informa... View the full answer
Related Book For
Auditing Cases An Interactive Learning Approach
ISBN: 9780134421827
7th Edition
Authors: Mark S Beasley, Frank A. Buckless, Steven M. Glover, Douglas F Prawitt
Posted Date:
Students also viewed these programming questions
-
Describe the magnetic field, in terms of magnitude and direction, produced inside a solenoid when it is driven by a) a signal generator b) a DC volt power supply or battery
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Case Study: Quick Fix Dental Practice Technology requirements Application must be built using Visual Studio 2019 or Visual Studio 2017, professional or enterprise. The community edition is not...
-
How are the interface and implementation sections of an Objective-C class specified?
-
Sketch the differential Manchester encoding for the bit stream of the previous problem. Assume the line is initially in the low state.
-
What can you say about the sets A and B if we know that a) A B = A? b) A B = A? c) A B = A? d) A B = B A? e) A B = B A?
-
A \(45^{\circ}\) off-axis specimen cut from an AS/3501 carbon/epoxy lamina is subjected to a tensile test. The specimen is \(3 \mathrm{~mm}\) thick and \(25 \mathrm{~mm}\) wide, and a tensile load of...
-
On January 1, 2018, Xu Ltd., which uses IFRS 16, entered into an eight-year lease agreement for a conveyor machine. Annual lease payments are $28,500 at the beginning of each lease year, which ends...
-
A metal rod with 1 0 mm diameter is subjected to 9 kN tensile load. Calculate the resulting diameter of the rod after loading. Assume that the modulus of elasticity is 7 0 GPa, Poisson s ratio is 0 ....
-
You are to examine two flow geometries as depicted in the figure. The flow rate in the main pipe is to be maintained constant and equal to Q in both scenarios. To make the comparison simple, it will...
-
Just a reminder that this whole exercise about Divisibility is to get used to thinking about the sorts of decisions that go into designing an algorithm -- what might be tested to be true or false,...
-
Give an example of when you were faced with adversity in a job position such as angry customers, how would you respond?
-
If a . 5 kg toy car is rolling down a 3 0 - degree incline: a . What is the car s acceleration in the x direction? b . If the car sat at the top of the ramp at a height of 4 m , what distance does...
-
What is the business impact and value of implementing EHR system performance measures? What is the importance of project improvement initiatives that meet organizational objectives? What are the...
-
How might you collaborate with a client who has diagnosed schizophrenia, to develop treatment and care plan?
-
A current of 2 . 1 6 is generated from a battery whose internal resistance is 0 . 8 5 . You measure the voltage across the battery terminals to be 1 0 . 8 6 V . What is the EMF of the battery?
-
The curves r (t) = (-412 4t + 76, 3t 16, -1 2) and r2(s) = ( s2, 3s + 2, s 4) intersect when: t= S= At the point: M M These curves intersect at angle 0 = M M
-
You are thinking of investing in one of two companies. In one annual report, the auditors opinion states that the financial statements were prepared in accordance with generally accepted accounting...
-
Confirmations of accounts receivable play an important role in the accumulation of sufficient, appropriate audit evidence. One of the principal strengths of confirmations is that they provide...
-
Henrico Retail, Inc. is a first year audit client. The audit partner obtained the following description of the sales system after recently meeting with client personnel at the corporate office....
-
One can only imagine the high expectations of investors when the boards of directors of CUC International, Inc. (CUC) and HFS, Inc. (HFS) agreed to merge in May 1997 to form Cendant Corporation. The...
-
Speeds of bullet trains. Determine whether the data are qualitative or quantitative. Explain your reasoning.
-
Widths of veins in different species of leaves. Determine whether the data are qualitative or quantitative. Explain your reasoning.
-
American Standard Code for Information Interchange (ASCII) codes. Determine whether the data are qualitative or quantitative. Explain your reasoning.
Study smarter with the SolutionInn App