ID NO:360684
1. Do you think this event was caused by an insider or outsider? Why do you think this?
A.An insider could have been included, tragically, but unintentionally, by joining an individual usb streak removable commute to the workplace machine to the manager, was contaminated somewhere else with an infection or worm. Be that as it may, all the more than likely the guilty party was a pariah in light of the fact that it was expressed in account that the issues started when the clients clicked their email connections. Also most messages regularly originate from the outside. 2. Other than installing virus and worm control software, what can SLS do to prepare for the next incident? A.They thought to introduce an industrystandard firewall into their frameworks. Really they should have had one effectively, overall this issue would not have happened. Be that as it may I guess they don't have a strong security arrangement set up. Likewise, the way that they were putting in new infection programming lets me know that they either had a shabby one introduced before or that they never had one in any case. 3. Do you think this attack was the result of a virus or a worm? Why do you think this?
A.It would need to be both. An infection can demolish your machine framework and a worm is used to spread it. The way that Amy got a pack of contaminated messages all the while tells me that this is a pulverizing worm that engenders an infection and spreads it quickly through theesends by means of their connections. 1.Would it be ethical for Amy to open such a file?
A.No,it is not ethical for Amy to open because the attacker can hack email and may misuse the information. 2.If such an email came in, what would be the best action to take?
A.It is good to avoid and block such emails.User must also let other people know about such emails. 3. Using the Web, identify the chief information officer (CIO), chief information security officer
(CISCO), and system administrator for your school. Which of these people represent the data owner? Which represent the data custodian?
A.
You May Also Find These Documents Helpful
-
| d. A worm can replicate itself and does not need a host for distribution.…
- 5533 Words
- 23 Pages
Satisfactory Essays -
Educate facility not to open email from unknown users and not to click on links in emails from unknown users.…
- 508 Words
- 3 Pages
Satisfactory Essays -
13) What worm was released in 2001 and primarily defaced web sites? C) Code Red…
- 284 Words
- 1 Page
Satisfactory Essays -
microbreaks in Africa for some time now. A virus doesn’t usually kill it’s natural host because…
- 2240 Words
- 9 Pages
Better Essays -
For the LAN domain, inform employees about email scams. Most users know not to open emails when on our system. Spam filters can help control junk email, so there is less risk of opening emails containing malware.…
- 337 Words
- 2 Pages
Satisfactory Essays -
• Never download or forward suspicious attachments. Trust only mail from contact list but always be aware messages can become infected.…
- 2175 Words
- 9 Pages
Powerful Essays -
Issue three. Based on the premise that there is a mix of computer running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.…
- 2096 Words
- 9 Pages
Powerful Essays -
7. Which of the following attack strategies has the highest success rate of making a particular system vulnerable?…
- 939 Words
- 4 Pages
Good Essays -
information. Shortly after that you receive the same e-mail from three other friends and the e-mails are…
- 1020 Words
- 6 Pages
Satisfactory Essays -
1. What are the various types of malware? How do worms differ from viruses? Do Trojan…
- 639 Words
- 2 Pages
Good Essays -
1. Discuss common forms of attack on Microsoft systems using the text Internet, and/or your job as reference for full credit.…
- 488 Words
- 2 Pages
Satisfactory Essays -
The e-mail system is not to be used to send offensive, sexually suggestive, obscene, lewd, demeaning, or disruptive messages. This includes, but is not limited to, messages that are inconsistent with the company’s policies on equal employment opportunity, anti-discrimination, and anti-harassment (including sexual harassment). Moreover, the e-mail system is not to be used to solicit or proselytize for commercial ventures, religious or political causes, or other non job-related solicitations.…
- 696 Words
- 3 Pages
Good Essays -
Mails should always be dispatched or distributed to the correct recipient, because they can be important and confidential information which should not be disclosed to others. They have to be also distributed on time, so that the task specified on the email is completed within the timescale mentioned and the deadline is met, so that we avoid complaints or other serious issues.…
- 510 Words
- 3 Pages
Good Essays -
D: Parasites: Are organisms such as fungi or worms that live in or on a host to obtain nourishment without providing any benefit to the host. Worms are not always microscopic in size but pathogenic worms do cause infection and some can spread from person to person.…
- 823 Words
- 4 Pages
Good Essays -
i. When purchasing a Mac you can be sure that it’s secure from any viral threats. The truth is, hardly anyone writes viruses for Macs. The Mac’s…
- 1312 Words
- 6 Pages
Powerful Essays