
Management of Information Security 3rd Edition by Michael Whitman ,Herbert Mattord
Edition 3ISBN: 978-1435488847
Management of Information Security 3rd Edition by Michael Whitman ,Herbert Mattord
Edition 3ISBN: 978-1435488847 Exercise 26
Iris's smartphone beeped. Frowning, she glanced at the screen, expecting to see another junk e-mail. "We've really got to do something about the spam!" she muttered to herself. She scanned the header of the message.
"Uh-oh!" She glanced at her watch, and while looking at her incident response pocket card, dialed the home number of the on-call systems administrator. When he answered, she asked
"Seen the alert yet? What's up?"
"Wish I knew-some sort of virus," he replied. "A user must have opened an infected attachment."
Iris made a mental note to remind the awareness program manager to restart the refresher training program for virus control. Her users should know better, but some new employees had not been trained yet.
"Why didn't the firewall catch it?" Iris asked.
"It must be a new one," he replied. "It slipped by the pattern filters."
"What are we doing now?" Iris was growing more nervous by the minute.
"I'm ready to cut our Internet connection remotely, then drive down to the office and start our planned recovery operations-shut down infected systems, clean up any infected servers, recover data from tape backups, and notify our peers that they may receive this virus from us in our e-mail. I just need your go-ahead." The admin sounded uneasy. This was not a trivial operation, and he was facing a long night of intense work.
"Do it. I'll activate the incident response plan and start working the notification call list to get some extra hands in to help." Iris knew this situation would be the main topic at the weekly CIO's meeting. She just hoped her colleagues would be able to restore the systems to safe operation quickly. She looked at her watch: 12:35 a.m.
If you were in Iris's position, how would you approach your interaction with the second-shift operator?
"Uh-oh!" She glanced at her watch, and while looking at her incident response pocket card, dialed the home number of the on-call systems administrator. When he answered, she asked
"Seen the alert yet? What's up?"
"Wish I knew-some sort of virus," he replied. "A user must have opened an infected attachment."
Iris made a mental note to remind the awareness program manager to restart the refresher training program for virus control. Her users should know better, but some new employees had not been trained yet.
"Why didn't the firewall catch it?" Iris asked.
"It must be a new one," he replied. "It slipped by the pattern filters."
"What are we doing now?" Iris was growing more nervous by the minute.
"I'm ready to cut our Internet connection remotely, then drive down to the office and start our planned recovery operations-shut down infected systems, clean up any infected servers, recover data from tape backups, and notify our peers that they may receive this virus from us in our e-mail. I just need your go-ahead." The admin sounded uneasy. This was not a trivial operation, and he was facing a long night of intense work.
"Do it. I'll activate the incident response plan and start working the notification call list to get some extra hands in to help." Iris knew this situation would be the main topic at the weekly CIO's meeting. She just hoped her colleagues would be able to restore the systems to safe operation quickly. She looked at her watch: 12:35 a.m.
If you were in Iris's position, how would you approach your interaction with the second-shift operator?
Explanation
Anybody who would have been in place of ...
Management of Information Security 3rd Edition by Michael Whitman ,Herbert Mattord
Why don’t you like this exercise?
Other Minimum 8 character and maximum 255 character
Character 255