Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

On a Monday morning, the organization’s help desk receives calls from three user

ID: 3751055 • Letter: O

Question

On a Monday morning, the organization’s help desk receives calls from three users on the same floor of a building who state that they are having problems with their wireless access. A network administrator who is asked to assist in resolving the problem brings a laptop with wireless access to the users’ floor. As he views his wireless networking configuration, he notices that there is a new access point listed as being available. He checks with his teammates and determines that this access point was not deployed by his team, so that it is most likely a rogue access point that was established without permission.

1. Would the organization consider this activity to be an incident? If so, which of the organization’s policies does this activity violate?

2. What measures are in place to attempt to prevent this type of incident from occurring or to limit its impact?

Explanation / Answer

Q1. Answer)

The organization’s users state that they are having problems with their wireless networks and thus they call and the network admin starts looking into it. Going through the problem, the network administrator sees that there is a new access point listed as being available and this was not deployed by his team. Thus something which is network specific and the network team is not aware of, has to be a rogue access point which was established without permission and authorization. Thus, this particular issue is an incident to the company or organization as there is a problem in the company’s network and it is a security issue. This violates the organization’s policies such as – security policy, network policy, such that a rogue access point was setup indicated some unauthorized user’s access and confidentiality issue in the company network.

Q2. Answer)

Such incidents can be prevented by having robust security policies in the company and having adequate protection in the networking of the organization. To prevent this type of incident from occurring or to limit its impact, we have to have monitoring and logging of the incidents 24x7, identifying the abnormal activities on the network, and resolving them. To limit its impact we can have security software installed in all of the machines and also network access should be strict and not given to any internal user without authorization.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote