question archive In this assignment you will be responding to a series of different scenarios

In this assignment you will be responding to a series of different scenarios

Subject:Computer SciencePrice:15.86 Bought3

In this assignment you will be responding to a series of different scenarios. There is one set of questions that you will use for all scenarios given. The questions will be answered and given in a document that you will be uploading. This is an exercise to get you to think and there are no exact right and wrong answers. You still may need to research some things to answer the questions to the best of your ability so make sure to use APA citations for all sources used if you research anything.

Questions to answer:

1. Who should you notify internally in your organization?

2. Who should you notify external to your organization if any?

3. What resources would you use to resolve the incident?

4. What would be your course of action? How would you recover? (give this in the form of a narrative timeline)

5. How would you prevent (or mitigate) incidents like these in the future?

Scenario #1

An employee casually remarks about how generous it is of state officials to provide the handful of USB drives on the conference room table, embossed with the State logo. After making some inquiries you find there is no state program to provide USB drives to employees. Further investigation subsequently found an unspecified password-stealing keylogger. The spyware was designed to upload stolen usernames and passwords to a server under the control of hackers.

Scenario #2

An employee calls to ask for the password for the Wi-Fi network, indicating they would like to use it on their personal cell phone so they can check Facebook on their lunch break. You don’t have a Wi-Fi network. A scan of the building indicates there are 4 Wi-Fi networks, clearly originating from within government space and broadcasting a variety of names that suggest people are using them for work purposes. In the course of follow-up to this report it is found that all 4 devices are plugged into your hard wired network. Two have logging enabled and show that they are being used by employees for official work purposes

Scenario #3

Upon review of your logs, several of your organization’s internet facing assets are being scanned. After investigation, the scans are originating from what seems to be a legitimate private cyber security company. The private company acknowledges the scans but refuses to disclose any information such as who ordered the scans due to a non-disclosure agreement (NDA). The scans from the same source continue to scan other external facing assets and the private company still refuses to disclose any information.

 

Option 1

Low Cost Option
Download this past answer in few clicks

15.86 USD

PURCHASE SOLUTION

Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

rated 5 stars

Purchased 3 times

Completion Status 100%