. You are an IT manager in an organization. During a routine check of the log fi
ID: 3744574 • Letter: #
Question
. You are an IT manager in an organization. During a routine check of the log files on network usage, you find that one of the users, Donald, is using the network to access files from the server every day for two to three hours after regular working hours. You meet Donald in the cafeteria the next day and tell him not to work after regular hours. Donald is surprised and says that he very rarely works long hours. It's clear to you that someone has hacked on to the network and used Donald's credentials to access the servers. You find the culprit on further investigation. How will you react to the situation based on your responsibilities as an IT manager? In this situation. which policy should the organization folloExplanation / Answer
Answer)
As said in the case, as an IT manager during a routine checkup of the log file we find that an employee Donald is using the network of the office to access files from server. Donald is then asked to not work after regular hours to which is response is shocking, as he doesn't work late often. Thus, it is clear to the manager that someone has hacked into network system and used Donald's credentials to access the servers. On further investigation, we also get hand on the culprit who was doing this. In this situation the IT manager should be vigilant and always see to that the business is operating under compliance and also that the information security and the tools to protect the information security is in place such that no such future issues occur.
The organization should follow Information Security Management Policy in this scenario where in the company under the purview of the managers or the leads should operate under compliance and security features have to be installed and working. Certain steps by the managers which can increase and help overcome the security risks in this scenario are:
a) Mandate password change after this incident for all employees to complicated passwords using a company standard.
b) Evaluate the assets and the security risks to them and also implement the security to protect them
c) System maintenance and monitoring should be done 24x7 and logs should also be checked for critical and business important modules
d) Train and build competencies for the Roles involved in the business process
e) Securing executive support and setting the objectives
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.