Have you ever had a major incident with your own IT (virus, attack, loss of data
ID: 3676452 • Letter: H
Question
Have you ever had a major incident with your own IT (virus, attack, loss of data, etc.)? If so, describe it. State whether you implemented any of the advice listed in the textbook [1] and whether it helped you. If you have not had a major IT incident, review and comment on the helpfulness of the advice in the textbook [1] for detecting and/or dealing with an IT incident. Write at most 2 pages.
copy the textbook address to a #www. to assess the textbook is PDF FILE
###***************Textbook: IT Governance Institute. IT Governance Using COBIT and ValIT: Student Book, 2nd Edition. 2007.
Explanation / Answer
Viruses cause varying degrees of destruction- some exist merely to replicate; others attach to and destroy files and programs. Anti-virus programs can generally restore files to their original state, but there are exceptions. If there is doubt to the reliability of the data held within a file, the user should compare the damaged file to a backup copy in order to assess whether or not damage has been sustainedIn many cases the discussion surrounding the detection of virus infections
centers on the activity of antivirus software. What is often overlooked is that if
antivirus software can detect an infection or an infection attempt, it can usually
deal with the situation effectively. A virus incident will only occur in situations
where the antivirus software was not able to detect the infecting agent, at least
not initially.
For Example : if you take RSA Security the impact is high like 40 million employee records stolen
The impact of the cyber attack that stole information on the company's SecurID authentication tokens is still being debated. The company said two separate hacker groups worked in collaboration with a foreign government to launch a series of spear phishing attacks against RSA employees, posing as people the employees trusted, to penetrate the company's network. EMC reported last July that it had spent at least $66 million on remediation. But according to RSA executives, no customers' networks were breached. John Linkous, vice president, chief security and compliance officer of eIQnetworks, Inc. doesn't buy it. "RSA didn't help the matter by initially being vague about both the attack vector, and (more importantly) the data that was stolen," he says. "It was only a matter of time before subsequent attacks on Lockheed-Martin, L3, and others occurred, all of which are believed to be partially enabled by the RSA breach." Beyond that, is the psychological damage. "The breach of RSA was utterly massive not only from a potential tactical damage perspective, but also in terms of the abject fear that it drove into every CIO who lost the warm-and-fuzzy feeling that the integrity of his or her enterprise authentication model was intact. Among the lessons, he says, are that even good security companies like RSA are not immune to being hacked. Finally, "human beings are, indeed, the weakest link in the chain
There are several types of indicators for possible infection. Indicators can result
directly from a specific virus payload, as a side affect of the virus payload, or as a
result of the virus’s attempt to spread. Indicators of virus infection include
Interface indicators include audio sounds or screen images that appear
unexpectedly, especially if the same audio or images appear on multiple
systems. The sounds or images are a payload of the virus. While the
indicators are non-destructive, this does not mean the virus is not
destructive. Since users are always presented with seemingly random
audio and images these indicators are easily overlooked unless they are
obtrusive. You must depend on your users to detect this type of indicator;
user education is key in this area.
Network indicators are usually caused by the side affects of the virus
attempting to spread and include network storms and unscheduled email
outages. This type of indicator is usually obvious to many users at the
same time but can also be detected through the use of network
administrative tools with notification capabilities
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.