Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Steve's company was hit by a cyber-attack. Upon investigation, the malicious network communication was initiated from one of the components of IT monitoring software in

Steve's company was hit by a cyber-attack. Upon investigation, the malicious network communication was initiated from one of the components of IT monitoring software in use that has a valid digital signature of the software vendor. He confirmed that the component is exactly the same file which can be downloaded from the vendor's legitimate update server. Some of other companies which use the same software is also discovering the same symptom. Choose the most suitable description for this attack.

Vulnerability of the IT monitoring software was exploited.

Hackers intruded the network of Steve's company and disabled the IT monitoring software.

Ransomware modified the original software component.

Software supply chain attack seemed to have happened.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Communications and Networking

Authors: Behrouz A. Forouzan

5th edition

73376221, 978-0073376226

More Books

Students also viewed these Computer Network questions