Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please solve this assignment ! ! IS 4 8 1 - Information Security Management Case Study Lab Assignment # 4 Access and Protection Controls

Please solve this assignment !! IS481- Information Security Management Case Study Lab Assignment \#4 Access and Protection Controls One night toward the end of his shift, Drew Brown, a technician at Random Widget Works, Inc. (RWW), received a call from his wife. One of their children was ill, and she wanted Drew to pick up some medicine on his way home from work. He decided to leave a few minutes early. Like all watch-standing employees in the operations center, Drew had a procedures manual, which was organized sequentially. He used the checklists for everyday purposes and had an index to look up anything else he needed. Only one unchecked box remained on the checklist when Drew snapped the binder closed and hurriedly secured his workstation. That oversight would cause the whole company grief in the next few hours. Since he was the second-shift operator and RWW did not have a third shift in its data center, Drew carefully reviewed the room shutdown checklist next to the door, making sure all the room's environmental, safety, and physical security systems were set correctly. That activated the burglar alarm, so Drew quickly exited the room and the building, and was soon on his way to the drugstore. At about the same time, a 10th-grader in San Diego was up late, sitting at her computer. Her parents assumed she was listening to music while chatting with school friends online. In fact, she had become bored with chatting and had discovered some new friends on the Internetfriends who shared her interest in programming. One of these new friends sent the girl a link to a new warez (illegally copied software) site. The girl downloaded a kit called Blendo from the warez site. Blendo is a tool that helps novice hackers create attack programs that combine a mass e-mailer with a worm, a macro virus, and a network scanner. The girl clicked her way through the configuration options, clicked a button labeled "custom scripts," and pasted in a script that one of her new friends had e-mailed to her. This script was built to exploit a brand-new vulnerability (announced only a few hours before). Although she didn't know it, the anonymous high-schooler had created new malware that was soon to bring large segments of the Internet to a standstill.IS481- Information Security Management Case Study Lab Assignment \#4IS481- Information Security Management Case Study Lab Assignment \#4

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Advances In Databases And Information Systems 23rd European Conference Adbis 2019 Bled Slovenia September 8 11 2019 Proceedings Lncs 11695

Authors: Tatjana Welzer ,Johann Eder ,Vili Podgorelec ,Aida Kamisalic Latific

1st Edition

3030287297, 978-3030287290

More Books

Students also viewed these Databases questions