preview

Bsbwor501 Unit 10

Decent Essays

POSTINCIDENT EXECUTIVE SUMMARY REPORT
Unit 10
Jordan Rosenow
ITT Technical Institute
Introduction
The purpose of this meeting is to inform you of a security breach that occurred in our company, and to inform you of what has been affected, how we found out, and what measures have been used to correct and prevent this from happening again. The following is a bulleted list of relevant information related to the security breach.
• IDS system noticed an attack from an outside entity.
• IDS sent a notification to all members of the IT department.
• Segregation of affected system as soon as possible and investigation begins to establish the amount of damage.
• Virus and malware scans used to gain information and clean affected system
• Reimage …show more content…

The following will be a few practices and procedures that need to be adhered to as well as specific needs to address the bullets above.
The single most important thing we can do to reduce our attack surface is called User awareness and training. Most cyber-attacks come from the area of Social engineering. Social engineering is a combination of anything we do socially that may be used to gain information or exploit a situation based solely on an individual’s actions. These include gathering information from Facebook about someone and where they work for extortion or information gathering. Another would be simply leaving a rather expensive thumb drive on the ground in hopes someone will pick it up bring it into their office and plug it in releasing an automated attack or installing a backdoor for the attacker. With proper user awareness and training most cyber-attacks could be thwarted before they even have a chance to be used.
The bulleted list can be corrected mostly by updating antivirus and anti-malware software definitions and scanning regularly. Monitoring of logs and then hardening the network to anything we have

Get Access