Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

DOCK STUDID Turnitin Editor - Chagg Writing . . For each discussion topic, you must make a minimum of three substantive posts: one post that

image text in transcribed
image text in transcribed
DOCK STUDID Turnitin Editor - Chagg Writing . . For each discussion topic, you must make a minimum of three substantive posts: one post that starts a new thread (6 points) and two posts commenting on (in reply to) other students' new threads (2 points cach) for a total of (10 points) Discussions are implemented as post first discussions. You will not be able to see any other students' posts until you have posted your own new threads, and you may not edit your post once they are submitted Each original post will be evaluated based on accuracy, relevance to the topic, clarity and level of detail. Significant word, sentence, paragraph, grammatical and punctuation issues will also be evaluated. A substantive reply is one that contributes meaningfully to the discussion. A reply that says, in essence, little more than "I agree...," or "Good post...," or "Thank you...," will not receive any credit. Posts that stray from the topic also will not receive credit. Each original post should be at least 100 words and each reply should be at least 50 words. There is no maximum word limit Failure to meet the above requirements will result in appropriate deductions for each discussion board. On a Sunday afternoon at a hospital in the Pacific Northwest, computers became sluggish, and documents would not print. Monday morning, the situation became worse when employees logged on to their computers. Even stranger things happened- operating-room doors would not open, pagers would not work, and computers in the intensive care unit shut down. By 10:00 A.M., all 50 IT employees were summoned. They discovered that the hospital was under attack by a botnet that exploited a Microsoft operating system flaw and installed pop-up ads on hospital computers. They got access to the first computer on Sunday and used the hospital's network to spread the infection to other computers. Each infected computer became a zombie that scanned the network looking for new victims. With the network clogged with zombie traffic, hospital communications began to break down. The IT staff tried to halt the attack by shutting off the hospital's Internet connection, but it was too late. The bots were inside the hospital's computer system and infecting other computers faster than they could be cleaned. Monday afternoon IT figured out which malware the bots were installing and wrote a script, which was pushed out hourly, directing computers to remove the bad code. The script helped to slow the bots down a bit. (Source: D. Gage, Baseline Security, February 6, 2007.) In your opinion, what could the hospital do to stop the attack and contain the damage? Which computer fraud and abuse technique did the hackers use in their attack on the hospital? What steps should the hospital have taken to prevent the damage caused by the attack

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Effect Of The Internal Auditing On Financial Performance

Authors: Shakir Al Ghalayini, Mohammed A. Keshta, Thabet M. Hassan

1st Edition

ISBN: 3656943052, 978-3656943051

More Books

Students also viewed these Accounting questions