Evaluation Case Essay Sample

1. Describe the nature of the incident.

The nature of this event describes an internal breach of security in order to entree and pull strings sensitive informations. This internal breach was caught by the hearer. but the communications from the hearer to those who’s informations was breached was intercepted.

It was determined that hallmark and encoding controls every bit good as a deficiency of PKI should hold been implemented in order to forestall this breach of informations.

2. Identify who needs to be notified based on the type and badness of the incident.

Badness of the incident
President of Company
Directly affected and upper direction.
IT Department
Must act to shut breach.
Directly affected by the breach
& A ; interloper had entree to their sensitive files.
Human Resource Depart
It was the HR system that accessed the files and they besides need to do certain everything has been corrected. High

3. Sketch how the incident could be contained.

This incident could’ve been contained by implementing a multiauthentication system and informations encoding. Permissions need to be set although because the onslaught was done accessing human resource files. that would non hold been a direct aid. The human resource section would hold entree to paysheet and fiscal records. Email digital signatures would besides hold helped so the electronic mails to the hearer would non hold been able to be spoofed. 4. Discourse how the factor that caused the incident could be removed.

Implementing better web security criterions and making a communications program that would include phone conversations would hold non allowed the individual to entree the paysheet. do alterations. and spoof electronic mails. Using other communicating methods would hold helped since the aggressor could non burlesque the hearer. The employee that caused the incident should be non merely terminated but besides brought up on fraud charges through the local. province. and federal jurisprudence. 5. Describe how the system could be restored to normal concern pattern.

ALSO READ  Security Roles Essay Sample

The system can be restored to normal concern pattern by either utilizing a backup that carried the correct informations and restored the files that were affected. An incremental restore. The system could besides be returned to its normal province with the human resource section traveling through the paysheet and altering the files that were affected back to their normal wage graduated table. Without adding extra security though. the system is still vulnerable. 5a. Explain how the system could be verified as operational.

The system is verified as operational when all files have been restored to the normal province and the system is running swimmingly. Management will necessitate to reexamine the affected files to guarantee that the information in them is right.

1. Identify countries that were non addressed by the IT staff’s response to the incident.

One of the countries that were non identified was how the web system allowed the spoofing and was non caught much earlier. Were permissions already in topographic point? Do they hold a web logging system that analyzes the logs? The deficiency of other system cheques were non addressed in this scenario. 2. Sketch the other onslaughts mentioned in the scenario that were non noticed by the organisation.

An onslaught that was non mentioned in the scenario was societal technology. The employee that manipulated the system used societal technology every bit good to convert the hearer that non merely did the electronic mails get sent by the individual to whom they were addressed. but that he or she was that individual every bit good.

ALSO READ  The different roles in a business buying center Essay

2a. Describe the nature of the onslaughts non noticed by the organisation.

The nature of the onslaughts that was non noticed by the organisation was human interaction ( Peltier. n. d. ) . Using societal technology. the employee was able to supervise the state of affairs from inside the office every bit good as parody emails to the hearer. The hearer put trust in the electronic mails alternatively of naming or speaking to each individual affected personally. This allowed for the societal technology onslaught to go on.

2b. Describe how these extra onslaughts can be prevented in the hereafter.

These onslaughts can be prevented by offering employee preparation of different security consciousness. Security policies should be updated to include extra actions to be taken to guarantee that sensitive electronic mails are so coming from the right individual by utilizing a phone call or by speaking to that individual physically. 3. Recommend a recovery process to reconstruct the computing machine systems back to their original province prior to such onslaughts.

Since the full web was non affected. merely certain files. I would urge an incremental backup to reconstruct the changed files back to their original signifier. Human Resources should verify to do certain that the information is right. Once the system is restored. topographic point in added security steps and backup the system once more.


Peltier. T. ( n. d. ) . Social Technology: Concepts and Solutions. Retrieved January 27. 2014. from hypertext transfer protocol: //www. infosectoday. com/Norwich/GI532/Social_Engineering. htm