warning message on his computer | My Assignment Tutor

Question 1. Case Study On Thursday morning, John, an XYZ university employee, noticed a warning message on his computer saying that the system has been attacked by a worm Win32.VB. Even though the antivirus software was present in the system, the software failed to detect the new worm because it was not updated to the latest version. When John tried to open his e-mail, he experienced a slow internet connection. He noticed there were some unusual file names in the disk. John immediately informed his friend Bob, who was also an XYZ employee, of the problem. Bob checked his computer in his office and experienced the same problem as John. John and Bob checked several computers in the laboratories, and found that Win32.VB worm had infected many other computers in the laboratory. They contacted the system administrator of the XYZ University. The system administrator checked the computers in the laboratory and reported the incident to the incident response team. The system administrator also checked the computers in other laboratories. As a result of the worm attack the activities in the XYZ University laboratory were suspended for a day, which caused a great inconvenience. Why would the organization consider this activity as an incident? Justify your answer.What’s the severity level of the above mentioned incident?Who or what groups will be involved in the situation?Suggest measures to contain and recover from the incident.Suggest measures to prevent similar incidents from occurring in the future.Suggest actions to improve the detection of similar events. Question 2. Differentiate between the following Cyber-attacks:HacktivismCybercrimesCyberespionage [9 marks] Describe how cyber-security professionals’ deal with these attacks could. [8 marks]How to evaluate the effectiveness of security countermeasures. [8 marks] Question 3. What are the main Organisational Roles within an organization? And what are their main responsibilities? [8 Marks] Discuss the main security triad along with the required mechanisms to achieve them.marks] How could organizations best respond to cyber threats?.marks] Question 4. In your experience… What are the main strategies that could be used to increase the effort for hackers? [4 marks] How would you identify the main risks for a bank following a flood? [ 6 marks]What three things could be done to reduce the reward for cybercriminals? [15 marks] Question 5. Case Study You have been recently appointed as a Cyber Security Consultant in a company that deals with some sensitive business. As a Security Consultant you shall work as part of a newly-formed security operations team to ensure that security requirements are being implemented and operated as per the overall Security program. One month into the job, suddenly files on the shared drives are inaccessible. Someone reported that they clicked on a link and then got this hideous popup window: “Your files have now been encrypted! Pay me or you’ll never get them back” Your team is also concerned of two other issues:  Some team members are very juniors and inexperienced in incident handling  General staffs might lack Info Security competence. As a senior consultant, deal with this situation and address the following: 1. Why would the organization consider this activity as an incident? Justify your answer. 2. What’s the severity level of the above mentioned incident? 3. Who or what groups will be involved in the situation? 4. Suggest measures to contain and recover from the incident. 5. Suggest measures to prevent similar incidents from occurring in the future. 6. Suggest actions to improve the detection of similar events. Question 6. a) Briefly describe each of the following security Governance: [16 marks ] a. ISO/IEC 27000 Series b. Zachman Framework c. British Ministry of Defence Architecture Framework (MODAF) d. Sherwood Applied Business Security Architecture (SABSA) b) How to evaluate the effectiveness of security countermeasures. [9 marks] Question 7. a) What are the main dimensions to follow in response to a cyber threat? [9 marks] b) What are the main duties of the Emergency Response Team (CERT)?. [8 marks] c) What are the main steps involved in Disaster Response Plan? [8 marks] Question 8. a) What are the main types of Cyber Security Policies [8 marks] b) In the context of system security, discuss the strategies followed to ensure Availability, Integrity and Confidentiality. [17 marks]

QUALITY: 100% ORIGINAL PAPER – NO PLAGIARISM – CUSTOM PAPER

Leave a Reply

Your email address will not be published.