Question

In: Operations Management

The Information Technology department notifies you that there has been evidence of unusual behavior from a...

The Information Technology department notifies you that there has been evidence of unusual behavior from a privileged user's account, in this case the Chief Financial Officer (CFO). The CFO indicates that they had received an email from a close friend with an attachment, clicked on a link, but it turned out to be junk and they ignored it. IT began their initial investigation immediately, and found that the email was likely a successful spear fishing attempt, from a similar but slightly different email address that mirrored the information of the friend's account.. What actions do you recommend be taken to contain this incident, and return to normal operations? Additionally, what steps should be taken to gather evidence during this procedure, in case it is later determined that you need to contact authorities? (the course is called cybersecurity management)

Solutions

Expert Solution

Below actions are recommended to be taken to contain the incident and and return to normal operations:

1. First of all it is crucial to inform in detail the entire incident to the IT department so that they are able to take necessary remedial steps.

2. All the associated networks and connected databases must be checked throughly for any fishing attempts and proper verification must be done.

3. It is important to format all the affected systems immediately and take data backup of all the critical information. This is required in order to prevent from data loss and data theft.

Below steps should be taken to gather evidence during this procedure:

1. First of all the CFO must be interviewed about the email that he was about to receive from the close friend and what contents was he expecting in the email.

2. The situation that led the CFO to open the email attachment of prospected fishing mail and put the information system at risk.

3. Why did the CFO not inform the IT department beforehand if he suspected any fraud mail since he knew the mail ID of his close friend and did not receive mail from same email ID?


Related Solutions

Washington City created an Information Technology department in 2013 to centralize information technology (IT) functions for...
Washington City created an Information Technology department in 2013 to centralize information technology (IT) functions for the city. The goal of the department was to reduce costs, avoid duplication of efforts, and provide up-to-date technology to all of the city’s operations. The fund was designed to be self-supporting; that is, all costs are to be recovered through user fees, but any excess of fees over expenses should be less than 5%. The pre-closing trial balance for the IT department as...
consider the victoria university information technology department, department has setup a small library for NIT5130 students....
consider the victoria university information technology department, department has setup a small library for NIT5130 students. The department library maintains a checkout list ( CALL NO, USER ID, DATE REQUESTED) of all the books borrowed by students, Every student record consists of User ID, User name, Borrow limit, Number checked out, and fines. Suppose that the library will have multiple copies (CALL NO, AUTHOR NAME, PUBLISHER, ISBN, DATE PUBLISHED) can have multiple authors (AUTHOR NAME, DATE OF BIRTH, COUNTRY OF...
Your 79- year-old client awaiting from the hospital notifies you that their adult daughter has arrived...
Your 79- year-old client awaiting from the hospital notifies you that their adult daughter has arrived to provide a ride home. When providing the discharge instructions to the client you note the adult daughter is unkempt,lack eye contact, and has an unusual odor present. Identify the priority nursing intervention the RN should apply to this scenario and explain your rationale.
Scenario: Your 79-year-old client awaiting discharge from the hospital notifies you that their adult daughter has...
Scenario: Your 79-year-old client awaiting discharge from the hospital notifies you that their adult daughter has arrived to provide a ride home. When providing the discharge instructions to the client, you note the adult daughter is unkempt, lacks eye contact, and has an unusual odor present. Initial Discussion Post: Identify the priority nursing intervention the RN should apply to this scenario and explain your rationale. Using the model for critical thinking, describe two thinking processes the RN can use to...
Washington City created an Information Technology department four years ago to centralize information technology (IT) functions...
Washington City created an Information Technology department four years ago to centralize information technology (IT) functions for the city. The goal of the department was to reduce costs, avoid duplication of efforts, and provide up-to-date technology to all of the city’s operations. The fund was designed to be self-supporting; that is, all costs are to be recovered through user fees, but any excess of fees over expenses should be less than 5 percent. The preclosing trial balance for the IT...
Imagine that you are working as manager of the Information Technology Department, ASCS College, King Saud...
Imagine that you are working as manager of the Information Technology Department, ASCS College, King Saud University, Riyadh, Saudi Arabia. Write a business letter (Alternative block format) to Sales Manager, Dell Company situated at the following address Dell Computer Corporation, One Dell Way Round Rock, Texas 78682, United States of America. Requesting them to send the price quotation of 100 workstations with the following configuration. Precision T3630;Tower Workstation; Intel Xeon E-2174G, 4 Core HT, 8MB Cache, 3.8Ghz, 4.7GHz; Windows 10...
You are the head of the engineering department in a certain company. your department has been...
You are the head of the engineering department in a certain company. your department has been allocated an annual budget of R2.6 million for this year. it is now towards the endof the financial year and your department has overspent by 25%. your senior manager wants you to justify why this is so. YOur task is to present a report showing all the expense of your department for the year and analyse them in a form of a Pareto analysis...
You are the head of the engineering department in a certain company. your department has been...
You are the head of the engineering department in a certain company. your department has been allocated an annual budget of R2.6 million for this year. it is now towards the endof the financial year and your department has overspent by 25%. your senior manager wants you to justify why this is so. YOur task is to present a report showing all the expense of your department for the year and analyse them in a form of a Pareto analysis...
You have been offered a job with an unusual bonus structure. As long as you stay...
You have been offered a job with an unusual bonus structure. As long as you stay with the​ firm, you will get an extra $72,000 every seven​ years, starting seven years from now. What is the present value of this incentive if you plan to work for the company for 42 years and the interest rate is 6.2% ​(EAR)? ​(Note: Be careful not to round any intermediate steps less than six decimal​ places.)
You have been offered a job with an unusual bonus structure. As long as you stay...
You have been offered a job with an unusual bonus structure. As long as you stay with the​ firm, you will get an extra every seven​ years, starting seven years from now. What is the present value of this incentive if you plan to work for the company for years and the interest rate is ​(EAR)? ​(Note: Be careful not to round any intermediate steps less than six decimal​ places.) The present value of this incentive is ​$
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT