1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
vichka [17]
4 years ago
10

Fullsoft, Inc. is a software development company based in New York City. Fullsoft’s software product development code is kept co

nfidential in an effort to safeguard the company’s competitive advantage in the marketplace. Fullsoft recently experienced a malware attack; as a result, proprietary information seems to have been leaked. The company is now in the process of recovering from this breach.
You are a security professional who reports into Fullsoft’s infrastructure operations team. The Chief Technology Officer asks you and your colleagues to participate in a team meeting to discuss the incident and its potential impact on the company.
Tasks
Prepare for the meeting by deliberating on the following questions:
• How would you assess the risks, threats, and/or vulnerabilities that may have allowed this
incident to occur, or could allow a similar incident to occur in the future?
• What insights about risks, threats, and/or vulnerabilities can you glean from reports of similar
incidents that have occurred in other organizations?
• What potential outcomes should the company anticipate as a result of the malware attack and
possible exposure of intellectual property?
• Which countermeasures would you recommend the company implement to detect current
vulnerabilities, respond to the effects of this and other successful attacks, and prevent future
incidents?
Computers and Technology
1 answer:
vfiekz [6]4 years ago
6 0

Answer:

Explanation is given below

Explanation:

A set of instructions runs on a system to do some actions that an attacker wants to do without the owners informed consent. It may be in the form of a virus, Backdoor, Trojan Horse, Rootkit, Scareware, Adware, and Worm.

1. This incident may occur due to:

sharing the file folders using USB's

propagation of e-mails

fake ant viruses

fake codec

through your browser

visiting infected web sites

installing infected software's and so on.

2. The worst that could occur with this incident are:

keylogger: software that can capture and record user keystrokes

backdoor: hidden method for bypassing normal computer authentication systems

zombie: computer attached to the Internet that has been compromised

denial-of-service attack (DoS attack): attempt to make a computer resource unavailable

3.

It steals the personal information such as email addresses, phone numbers, bank account numbers and so on.

It deletes or modifies the files.

Steals the software serial numbers and use our computers as relay.

4.

Usage of up-to-date antivirus which continuously analyze the behavior of your system.

Build a perfect malware detector

analyze program behavior

detect changes by using checksum methods

do the sandbox analysis.

change your passwords as you change your underwear.

Do not open unexpected e-mail attachments

Be wary of pop-up windows that ask you to install something (like anti-virus software) if you are just surfing the web.

Keep your system up-to-date. Newer systems automatically update.

firewall: software which inspects network traffic passing through it, and denies or permits passage based on a set of rules.

5. Outline of key points:

Circumstances related to Malware.

Insights about risks, threats, and/or vulnerabilities

Potential outcomes and possible exposure of intellectual property

countermeasures to detect vulnerabilities

You might be interested in
Which of the following statement is true? Single choice. (2 Points) Views are virtual tables that are compiled at run time All o
Elenna [48]

Answer:

All of the mentioned views could be looked as an additional layer in the table which enables us to protect intricate or sensitive data based upon our needs.

Explanation:

View is a virtual table which executed a pre compiled query. It is a table in which selective portion of the data can be seen from one or more tables. Queries are not allowed in indexed views and adding column is not possible. Views can be looked as an additional layer in the virtual table which protects sensitive data.

8 0
3 years ago
Learning in a digital environment is also called learning.
aleksandrvk [35]

Learning in a digital environment is also called O<u>nline Learning.</u>

Explanation:

The main difference between the digital learning and the traditional form of learning is that

  • Digital Learning takes place online or virtually.
  • The traditional Learning is conducted in a classroom building.
  • Another factor that differentiate the 2 forms of learning is that the instructor or the trainer may not be present at the real-time but in a traditional training method the trainer or the instructor is present in person
6 0
4 years ago
Read 2 more answers
Brainliest for correct answer
OLga [1]

Answer:

its the 4th sentence

Explanation:

5 0
3 years ago
Read 2 more answers
A technician is at a small facility that has five computers connected to a central switch and accessing a single server for file
Crazy boy [7]

Answer:

c.

Explanation:

The swich is failing because it letting the four in but not the fith ond so it a faulty swich

8 0
3 years ago
Which of the following items is not found on a web page?
navik [9.2K]
The answer is B. book mark definitely
7 0
3 years ago
Other questions:
  • Which of the following is not an important consideration before a business invests in a particular technology?
    12·1 answer
  • Pressing the Ctrl+Home keys moves the insertion point to the
    9·2 answers
  • When computer manufacturers overcame the enormous 13,000 Chinese character barrier by creating a workable keyboard through voice
    15·1 answer
  • What is the value of this expression?
    6·1 answer
  • An intranet that is partially accessible to authorized people outside the business or organization is known as an
    7·2 answers
  • This function causes a program to terminate, regardless of which function or control mechanism is executing.
    12·1 answer
  • Could u help me on this u just have to compare how its alike please help ​
    5·2 answers
  • In critical thinking, an argument is:
    12·2 answers
  • In the earliest stages of human history, what was the only medium?
    10·1 answer
  • a transport layer security (tls) virtual private network (vpn) requires a remote access server listening on port 443 to encrypt
    13·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!