Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Please solve this assignment ! ! IS 4 8 1 - Information Security Management Case Study Lab Assignment # 4 Access and Protection Controls
Please solve this assignment IS Information Security Management Case Study Lab Assignment # Access and Protection Controls One night toward the end of his shift, Drew Brown, a technician at Random Widget Works, Inc. RWW received a call from his wife. One of their children was ill, and she wanted Drew to pick up some medicine on his way home from work. He decided to leave a few minutes early. Like all watchstanding employees in the operations center, Drew had a procedures manual, which was organized sequentially. He used the checklists for everyday purposes and had an index to look up anything else he needed. Only one unchecked box remained on the checklist when Drew snapped the binder closed and hurriedly secured his workstation. That oversight would cause the whole company grief in the next few hours. Since he was the secondshift operator and RWW did not have a third shift in its data center, Drew carefully reviewed the room shutdown checklist next to the door, making sure all the room's environmental, safety, and physical security systems were set correctly. That activated the burglar alarm, so Drew quickly exited the room and the building, and was soon on his way to the drugstore. At about the same time, a thgrader in San Diego was up late, sitting at her computer. Her parents assumed she was listening to music while chatting with school friends online. In fact, she had become bored with chatting and had discovered some new friends on the Internetfriends who shared her interest in programming. One of these new friends sent the girl a link to a new warez illegally copied software site. The girl downloaded a kit called Blendo from the warez site. Blendo is a tool that helps novice hackers create attack programs that combine a mass emailer with a worm, a macro virus, and a network scanner. The girl clicked her way through the configuration options, clicked a button labeled "custom scripts," and pasted in a script that one of her new friends had emailed to her. This script was built to exploit a brandnew vulnerability announced only a few hours before Although she didn't know it the anonymous highschooler had created new malware that was soon to bring large segments of the Internet to a standstill.IS Information Security Management Case Study Lab Assignment #IS Information Security Management Case Study Lab Assignment #
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started