? ? ?? What can be done to minimize the risk of this situation recurring? Can these
Fantastic news! We've Found the answer you've been seeking!
Question:
? ?
??What can be done to minimize the risk of this situation recurring? Can these types of situations be completely avoided?
Transcribed Image Text:
Iris's smartphone beeped. Frowning, she glanced at the screen, expecting to see another junk e-mail. "We've really got to do something about the spam!" she muttered to herself. She scanned the header of the message. "Uh-oh!" Glancing at her watch and then looking at her incident response pocket card, Iris dialed the home number of the on-call systems administrator. When he answered, Iris asked "Seen the alert yet? What's up?" "Wish I knew-some sort of virus," the SA replied. "A user must have opened an infected attachment." Iris made a mental note to remind the awareness program manager to restart the refresher training program for virus control. Her users should know better, but some new employees had not been trained yet. "Why didn't the firewall catch it?" Iris asked. “It must be a new one,” the SA replied. “It slipped by the pattern filters." "What are we doing now?" Iris was growing more nervous by the minute. "I'm ready to cut our Internet connection remotely, then drive down to the office and start our planned recovery operations-shut down infected systems, clean up any infected servers, recover data from backups, and notify our peers that they may receive this virus from us in our e-mail. I just need your go-ahead." The admin sounded uneasy. This was not a trivial operation, and he was facing a long night of intense work. "Do it," Iris said. “I'll activate the incident response plan and start working the notification call list to get some extra hands in to help." Iris knew this situation would be the main topic at the weekly CIO's meeting. She just hoped her team would be able to restore the systems to safe operation quickly. She looked at her watch: 12:35 a.m. Iris's smartphone beeped. Frowning, she glanced at the screen, expecting to see another junk e-mail. "We've really got to do something about the spam!" she muttered to herself. She scanned the header of the message. "Uh-oh!" Glancing at her watch and then looking at her incident response pocket card, Iris dialed the home number of the on-call systems administrator. When he answered, Iris asked "Seen the alert yet? What's up?" "Wish I knew-some sort of virus," the SA replied. "A user must have opened an infected attachment." Iris made a mental note to remind the awareness program manager to restart the refresher training program for virus control. Her users should know better, but some new employees had not been trained yet. "Why didn't the firewall catch it?" Iris asked. “It must be a new one,” the SA replied. “It slipped by the pattern filters." "What are we doing now?" Iris was growing more nervous by the minute. "I'm ready to cut our Internet connection remotely, then drive down to the office and start our planned recovery operations-shut down infected systems, clean up any infected servers, recover data from backups, and notify our peers that they may receive this virus from us in our e-mail. I just need your go-ahead." The admin sounded uneasy. This was not a trivial operation, and he was facing a long night of intense work. "Do it," Iris said. “I'll activate the incident response plan and start working the notification call list to get some extra hands in to help." Iris knew this situation would be the main topic at the weekly CIO's meeting. She just hoped her team would be able to restore the systems to safe operation quickly. She looked at her watch: 12:35 a.m.
Expert Answer:
Answer rating: 100% (QA)
Step 1 of 2 A To minimize the risk of the situation recurring 1 New Staff should be on the floor aft... View the full answer
Related Book For
Management of Information Security
ISBN: 978-1285062297
4th Edition
Authors: Michael E. Whitman, Herbert J. Mattord
Posted Date:
Students also viewed these accounting questions
-
What is hacking? What can be done to prevent hacking?
-
What can be done to deter someone from committing a crime?
-
What is anti-synergy, and what can be done to counteract it?
-
How do business plan for successful import and export activity?
-
From the following accounts of Kurlz Salon, Inc., prepare the businesss statement of retained earnings for the year ended December 31, 2013: Retained Earnings Dividends Clo 95,000 Jan1 188,000 Mar 31...
-
There are two consumers on the market: Jim and Donna. Jim's utility function is U(x, y) = xy, with associated marginal utility functions MUx = y and MUy = x. Donna's utility function is U(x,y) = x2y,...
-
Explain the issues involved in establishing ROI for T&D initiatives. What role do HRIS T&D applications play in establishing ROI?
-
Kelly Foods has two plants and ships canned vegetables to customers in four cities. The cost of shipping one case from a plant to a customer is given in the following table. The plant in Akron has a...
-
In January, 1993, there were about 1,313,000 internet hosts. During the next five years, the number of hosts increased by about 100% per year. a. Write a model giving the number h (in millions) of...
-
1.Identify the three countries with the most favorable collection experience as measured by their receivables turnover ratios. RTR US = RTR Saudi Arabia = RTR UK = 2. Which country appears to have...
-
Scarcity is a condition that is everywhere and always, since it is based upon two assumptions that reflect permanent universal conditions. The assumptions are that more output will satisfy more wants...
-
A rotating object starts from rest at t = 0s and has a constant angular acceleration. At a time of t = 2.5 s the object has an angular displacement of 12 rad. What is its displacement at a time of t...
-
A stuntman likes to cross the ditch as shown in Fig.7. Find the minimum velocity required at P. Also determine the direction and magnitude of velocity of the stuntman just at the instant of clearing...
-
5. A pebble is hurled upward by a slingshot at 6 m/s from the roof of a building 75 m high. Assume a(t)=-10m/s. Calculate the time it took the pebble to reach its maximum height. Record your answer...
-
1. Three point charges are arranged as shown. Find the vector electric field that the q2 and 93 charges together create at the origin. Take q=4.87E-9C, 92=-3.00E-9C, 93-6.10E-9C, a=0.251m and...
-
2. We can adjust the voltage and magnetic fields to allow only particles moving at a certain speed to pass through undeflected. Say the magnetic field is 0.75 T, the voltage is 150 V and the plates...
-
Design an employee benefits program for an Attorney position and discuss pay structure; include thoughts about flex- time. Please reference the textbook as specific information must be included in...
-
What is a manufacturing system?
-
List and describe the three guidelines for sound policy, as stated by Bergeron and Brub.
-
What are some of the various ways to implement an awareness program?
-
Which information attributes are seldom or never applied to software elements?
-
Do you believe that fraud in the United States is more or less prevalent than fraud in countries outside the United States? Why?
-
How would a fraudster conceal missing cash, especially amounts of this magnitude?
-
What makes channel stuffing illegal by comparison to a car dealership that runs mega end-of-year sales?
Study smarter with the SolutionInn App