SlideShare a Scribd company logo
1 of 7
Student Name
CYB/110
Playbook / Runbook Parts 1-3
Student Name
University of Phoenix Online
CYB/110
Question 3
The scenario that happened involved the Win32/Virut malware
that was notorious and wreaked havoc on one machine in the
company (Microsoft). The malware was detected and stopped
before it spread to any other computer on the network. It
operates by modifying the software executables on the
computers and spreads by targeting every software executable
that opens and writes its code that introduces a backdoor that
allows hackers to access the system from remote servers. The
malware is introduced when an infected executable is run on the
machine and once it has been installed along with the innocent-
looking software, it copies itself to every other executable as
soon as it is opened, meaning that it does not spread if no
executable file is run. This, in turn, means that any software
that is yet to be run is safe.
Upon realizing the corruption, which was done when an online
scan using ESET antivirus was conducted, every executable was
closed down (ESET). This allowed for antivirus to effectively
isolate any executable affected and list it. Indeed, the
executables were listed and it turned out that 7 executables had
been affected already, these were immediately quarantined.
Some of the software affected were office word and operating
system executables. To effectively deal with the threat, I
restored the quarantined files so that I could cleanly uninstall
the software. After the uninstallation, the online scan was run
again, since it was not vulnerable to infection through the
executable corruption. This time around, every identified threat
was removed and an operating system disc used to repair the
corrupted operating system files. Finally, the ESET antivirus
was installed so that such threats can be prevented before
happening to reduce the extent of the damage. The affected
software was then reinstalled and the system scanned with the
offline antivirus and scheduled to automatically scan every day
(Koret and Bachaalany).
Employees must be guided not to share the following
information online:
· Usernames
· Office address
· Their medical history and records
· Their work experiences
· The place they have lived in
· Family member’s identity
· Date of births
· Personal information regarding bank detail or similar data
(Norton).
If employees put this data online, their personal information can
be misused and they may face an issue which can be severe.
Employees also need to be trained to interact securely while
they use the internet. They must take care of the confidential
information while sharing it in an email because if the emails
are not protected, company data may be at high risk. If they
have to share any document or attachment with the management,
they need to develop a special code or a password to safeguard
the sensitive and confidential information. Employees need to
frequently change the passwords because the similar passwords
for longer periods can be misused and easily hacked. While
interacting online, they should not download any programs or
need not install the unnecessary and untrusted applications
because they can be a serious threat to their devices and the
data kept in their devices may become at stake. They must
develop passwords which are a mix of numeric and text to
strengthen the security. When it comes to emails, they should
not be downloading any emails from unknown sources and must
also not click on the unknown links because they make give a
security shock. Safe browser must be used and the antivirus
should be updated (Kaspersky).
For the enhanced email security, employees must develop
separate email accounts for the official use and their passwords
must be updated and complex. No large or unnecessary
attachment needs to be downloaded because they may contain
malware. Email security features must be known to the
employees. Using public Wi-Fi to send and receive emails is not
recommended because there is a high risk of data to be stolen
on public Wi-Fi. All those attachments which are of no use must
be blocked. If an email has too many recipients, it should also
be blocked. So, email communication must be protected (Tolly).
Following is the list of items that company employees should
never share on the social media:
· Representation of the company with unauthentic statements
· Not talking about intellectual property rights
· Not disclosing any confidential information
· Not giving statements without having proper knowledge
· Taking in a negative tone about the competitor
· Posting any controversial thing
· Talking about job roles
· Posting office stories
· Posting any accounts information
· Talking in a hatred manner toward other people (Workable).
Part 3
It is imperative for any business to secure the equipment with
respect to network connections, mobile devices and cloud
services. There is a strong need for businesses to develop
guidelines for enhancing security of network connection, mobile
devices and cloud services.
To develop guidelines for the security of network connections,
it is significant to understand about the components of a
network. The main components of a network are router, firewall
and switch. The router is a security barrier furthest from the
center (Meier et al. para 26). The router sends IP packets to the
networks to which it is attached. This router can be safeguarded
in opposition to reconfiguration by making sure that it contains
the advanced security patches and upgrades implemented. In
addition, shielded administration interfaces can be utilized to
enhance its safety (Meier et al. para 26). Firewall obstructs
those ports which are not needed and permits the traffic from
those ports that are recognized. To increase the security of
firewall, it is necessary that firewall is patched on regular basis.
The services which are not used should be eliminated.
Moreover, the administration interfaces of the firewall should
be safeguarded (Meier et al. para 27). Switch is the third main
component of a network. Switches do not perform a greater part
in the safe networking domain. Switches enhance the
performance of a network. They can be made secure by testing
and installing the updates and patches, and removing all those
services or ports which are not utilized.
Cybercriminals persistently search for the methods to make
complete use of and derive benefit from weaknesses in
operating systems, applications and software attempting to
discover security defects prior to producers discovering and
patching those faults (“Best Practices” para 2). The main prey
to them is the user information which ranges from credit card
details to emails passwords. The users can enhance the security
of their mobile devices by utilizing built-in anti-robbery
applications such as Find My iPhone. With the help of this
applications, the owner of a mobile device can delete all
information from a distance in a case they are not able to find
their stolen device (“Best Practices” para 8). Besides, the users
can safeguard their data that is transferred and obtained online
by establishing a VPN. Mobile devices should be set on
automatic locks and a sound passcode should be created so that
no one can immediately discover the personal data. Also, it is
mandatory to scan any email, message or call from an
unfamiliar sender prior to opening it.
It is very important to adopt a proactive approach when the
security of cloud services is considered into account. It is
recommended that the businesses should utilize two-factor
authentication because the customary usernames and passwords
combinations are not enough to offer high security to the users’
accounts. Two-factor authentication allows only official
employees to log into the accounts and approach important
information (Ntiva Editorial Team para 2). It is also important
for a business to establish appropriate degree of authorization
because each employee does not require a reach to every bit of
data. Allocating user access rights will not only stop a worker
from editing details which he/she is not allowed to approach,
but also safeguards the systems of an organization from hackers
(Ntiva Editorial Team para 3). It is also imperative to assure
that an employee cannot approach an organization’s data,
systems, intellectual properties and customer details when
he/she is no longer a part of that particular organization. The
organizations should implement a systemized deprovisioning
procedure to make sure that the access entitlements of all
leaving employees are cancelled (Ntiva Editorial Team para 5).
Lastly, a cyber security training should be offered to the
personnel.
Works Cited
ESET. Free Virus Scan | Online Virus Scan from ESET. 2018.
Web. 19 June 2018.
<https://www.eset.com/us/home/online-scanner/>.
Kaspersky. Top 10 Internet Safety Rules & What Not to Do
Online. n.d.
https://usa.kaspersky.com/resource-center/preemptive-
safety/top-10-internet-safety-rules-and-what-not-to-do-online.
30 August 2019.
Koret, Joxean and Elias Bachaalany. The Antivirus Hacker's
Handbook. 1st. Hoboken: Wiley,
2015. Print.
Microsoft. Virus: Win32/Virut.BN. 15 September 2017. Web.
19 June 2018.
<https://www.microsoft.com/en-us/wdsi/threats/malware-
encyclopedia-description?Name=Virus:Win32/Virut.BN>.
Norton. What personal information should you safeguard? n.d.
https://us.norton.com/internetsecurity-privacy-what-personal-
information-should-you-safeguard.html. 30 August 2019.
Tolly, Kevin. Implementing the top 6 email security best
practices for employees. 26 April 2019.
https://searchsecurity.techtarget.com/tip/Implementing-the-top-
6-email-security-best-practices-for-employees. 30 August 2019.
Workable. Employee social media policy sample. n.d.
https://resources.workable.com/social-
media-company-policy#. 30 August 2019.
Works Cited “Best Practices: Securing Your Mobile Device”
Trend Micro. Trend Micro Incorporated, 10 Oct. 2017. Web. 10
September 2019.Meier, J.D., Alex Mackman, Michael Dunner,
Srinath Vasireddy, Ray Escamilla and Anandha Murukan
“Chapter 15 – Securing Your Network.” Improving Web
Application Security: Threats and Countermeasures. Microsoft
Corporation. 2003. Web. 10 September. 2019.Ntiva Editorial
Team. “6 Tips for Improving Cloud Computing Security.”
Ntiva. Ntiva, 20 August, 2018. Web. 10 September 2019.

More Related Content

Similar to Student NameCYB110Playbook Runbook Parts 1-3S.docx

Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docxjeanettehully
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docxtodd521
 
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET Journal
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxtoltonkendal
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data ProtectionUthsoNandy
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdfBelayet Hossain
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfInfinityGroup5
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security FundamentalsRahmat Suhatman
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015Jeffery Brown
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network SecuritySachithra Gayan
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesisidro luna beltran
 

Similar to Student NameCYB110Playbook Runbook Parts 1-3S.docx (20)

Cn35499502
Cn35499502Cn35499502
Cn35499502
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docxRunning Head RISK, THREAT AND VULNERABILITY MANAGEMENT           .docx
Running Head RISK, THREAT AND VULNERABILITY MANAGEMENT .docx
 
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
IRJET- A Review of Information Systems Security: Types, Security Issues, and ...
 
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docxRunning head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
Running head NETWORK INFRASTRUTCTURE AND SECURITYNETWORK INFR.docx
 
Mis 1
Mis 1Mis 1
Mis 1
 
185
185185
185
 
Network Security of Data Protection
Network Security of Data ProtectionNetwork Security of Data Protection
Network Security of Data Protection
 
Application security
Application securityApplication security
Application security
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
3.8 Ways to Establish Secure Protocols in a Digital Organization.pdf
 
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdfJust-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
Just-How-Secure-is-your-Remote-Workforce-Infinity-Group-Ebook.pdf
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
Network Security Fundamentals
Network Security FundamentalsNetwork Security Fundamentals
Network Security Fundamentals
 
A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015A network security policy group project unit 4 (1) july 2015
A network security policy group project unit 4 (1) july 2015
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
WK8.pptx
WK8.pptxWK8.pptx
WK8.pptx
 
Computer Network Security
Computer Network SecurityComputer Network Security
Computer Network Security
 
Seguridad web -articulo completo- ingles
Seguridad web -articulo completo- inglesSeguridad web -articulo completo- ingles
Seguridad web -articulo completo- ingles
 

More from deanmtaylor1545

Assignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docxAssignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docxdeanmtaylor1545
 
Assignment 1 Why are the originalraw data not readily us.docx
Assignment 1 Why are the originalraw data not readily us.docxAssignment 1 Why are the originalraw data not readily us.docx
Assignment 1 Why are the originalraw data not readily us.docxdeanmtaylor1545
 
Assignment 1 Refer to the attached document and complete the .docx
Assignment 1 Refer to the attached document and complete the .docxAssignment 1 Refer to the attached document and complete the .docx
Assignment 1 Refer to the attached document and complete the .docxdeanmtaylor1545
 
Assignment 1 Remote Access Method EvaluationLearning Ob.docx
Assignment 1 Remote Access Method EvaluationLearning Ob.docxAssignment 1 Remote Access Method EvaluationLearning Ob.docx
Assignment 1 Remote Access Method EvaluationLearning Ob.docxdeanmtaylor1545
 
Assignment 1 Please read ALL directions below before startin.docx
Assignment 1 Please read ALL directions below before startin.docxAssignment 1 Please read ALL directions below before startin.docx
Assignment 1 Please read ALL directions below before startin.docxdeanmtaylor1545
 
Assignment 1 Inmates Rights and Special CircumstancesCriteria.docx
Assignment 1 Inmates Rights and Special CircumstancesCriteria.docxAssignment 1 Inmates Rights and Special CircumstancesCriteria.docx
Assignment 1 Inmates Rights and Special CircumstancesCriteria.docxdeanmtaylor1545
 
Assignment 1 Go back through the business press (Fortune, The Ec.docx
Assignment 1 Go back through the business press (Fortune, The Ec.docxAssignment 1 Go back through the business press (Fortune, The Ec.docx
Assignment 1 Go back through the business press (Fortune, The Ec.docxdeanmtaylor1545
 
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docxAssignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docxdeanmtaylor1545
 
Assignment 1 1. Using a Microsoft Word document, please post one.docx
Assignment 1 1. Using a Microsoft Word document, please post one.docxAssignment 1 1. Using a Microsoft Word document, please post one.docx
Assignment 1 1. Using a Microsoft Word document, please post one.docxdeanmtaylor1545
 
Assignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docxAssignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docxdeanmtaylor1545
 
Assignment 1  Due Monday 92319 By using linear and nonlinear .docx
Assignment 1  Due Monday 92319 By using linear and nonlinear .docxAssignment 1  Due Monday 92319 By using linear and nonlinear .docx
Assignment 1  Due Monday 92319 By using linear and nonlinear .docxdeanmtaylor1545
 
Assignment 1This assignment is due in Module 8. There are many v.docx
Assignment 1This assignment is due in Module 8. There are many v.docxAssignment 1This assignment is due in Module 8. There are many v.docx
Assignment 1This assignment is due in Module 8. There are many v.docxdeanmtaylor1545
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxdeanmtaylor1545
 
ASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docx
ASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docxASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docx
ASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docxdeanmtaylor1545
 
Assignment 1Select one of these three philosophers (Rousseau, Lo.docx
Assignment 1Select one of these three philosophers (Rousseau, Lo.docxAssignment 1Select one of these three philosophers (Rousseau, Lo.docx
Assignment 1Select one of these three philosophers (Rousseau, Lo.docxdeanmtaylor1545
 
Assignment 1Scenario 1You are developing a Windows auditing pl.docx
Assignment 1Scenario 1You are developing a Windows auditing pl.docxAssignment 1Scenario 1You are developing a Windows auditing pl.docx
Assignment 1Scenario 1You are developing a Windows auditing pl.docxdeanmtaylor1545
 
Assignment 1Research by finding an article or case study discus.docx
Assignment 1Research by finding an article or case study discus.docxAssignment 1Research by finding an article or case study discus.docx
Assignment 1Research by finding an article or case study discus.docxdeanmtaylor1545
 
Assignment 1Positioning Statement and MottoUse the pro.docx
Assignment 1Positioning Statement and MottoUse the pro.docxAssignment 1Positioning Statement and MottoUse the pro.docx
Assignment 1Positioning Statement and MottoUse the pro.docxdeanmtaylor1545
 
ASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docx
ASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docxASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docx
ASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docxdeanmtaylor1545
 
assignment 1Essay Nuclear ProliferationThe proliferation of.docx
assignment 1Essay Nuclear ProliferationThe proliferation of.docxassignment 1Essay Nuclear ProliferationThe proliferation of.docx
assignment 1Essay Nuclear ProliferationThe proliferation of.docxdeanmtaylor1545
 

More from deanmtaylor1545 (20)

Assignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docxAssignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docx
 
Assignment 1 Why are the originalraw data not readily us.docx
Assignment 1 Why are the originalraw data not readily us.docxAssignment 1 Why are the originalraw data not readily us.docx
Assignment 1 Why are the originalraw data not readily us.docx
 
Assignment 1 Refer to the attached document and complete the .docx
Assignment 1 Refer to the attached document and complete the .docxAssignment 1 Refer to the attached document and complete the .docx
Assignment 1 Refer to the attached document and complete the .docx
 
Assignment 1 Remote Access Method EvaluationLearning Ob.docx
Assignment 1 Remote Access Method EvaluationLearning Ob.docxAssignment 1 Remote Access Method EvaluationLearning Ob.docx
Assignment 1 Remote Access Method EvaluationLearning Ob.docx
 
Assignment 1 Please read ALL directions below before startin.docx
Assignment 1 Please read ALL directions below before startin.docxAssignment 1 Please read ALL directions below before startin.docx
Assignment 1 Please read ALL directions below before startin.docx
 
Assignment 1 Inmates Rights and Special CircumstancesCriteria.docx
Assignment 1 Inmates Rights and Special CircumstancesCriteria.docxAssignment 1 Inmates Rights and Special CircumstancesCriteria.docx
Assignment 1 Inmates Rights and Special CircumstancesCriteria.docx
 
Assignment 1 Go back through the business press (Fortune, The Ec.docx
Assignment 1 Go back through the business press (Fortune, The Ec.docxAssignment 1 Go back through the business press (Fortune, The Ec.docx
Assignment 1 Go back through the business press (Fortune, The Ec.docx
 
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docxAssignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
 
Assignment 1 1. Using a Microsoft Word document, please post one.docx
Assignment 1 1. Using a Microsoft Word document, please post one.docxAssignment 1 1. Using a Microsoft Word document, please post one.docx
Assignment 1 1. Using a Microsoft Word document, please post one.docx
 
Assignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docxAssignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docx
 
Assignment 1  Due Monday 92319 By using linear and nonlinear .docx
Assignment 1  Due Monday 92319 By using linear and nonlinear .docxAssignment 1  Due Monday 92319 By using linear and nonlinear .docx
Assignment 1  Due Monday 92319 By using linear and nonlinear .docx
 
Assignment 1This assignment is due in Module 8. There are many v.docx
Assignment 1This assignment is due in Module 8. There are many v.docxAssignment 1This assignment is due in Module 8. There are many v.docx
Assignment 1This assignment is due in Module 8. There are many v.docx
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
 
ASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docx
ASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docxASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docx
ASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docx
 
Assignment 1Select one of these three philosophers (Rousseau, Lo.docx
Assignment 1Select one of these three philosophers (Rousseau, Lo.docxAssignment 1Select one of these three philosophers (Rousseau, Lo.docx
Assignment 1Select one of these three philosophers (Rousseau, Lo.docx
 
Assignment 1Scenario 1You are developing a Windows auditing pl.docx
Assignment 1Scenario 1You are developing a Windows auditing pl.docxAssignment 1Scenario 1You are developing a Windows auditing pl.docx
Assignment 1Scenario 1You are developing a Windows auditing pl.docx
 
Assignment 1Research by finding an article or case study discus.docx
Assignment 1Research by finding an article or case study discus.docxAssignment 1Research by finding an article or case study discus.docx
Assignment 1Research by finding an article or case study discus.docx
 
Assignment 1Positioning Statement and MottoUse the pro.docx
Assignment 1Positioning Statement and MottoUse the pro.docxAssignment 1Positioning Statement and MottoUse the pro.docx
Assignment 1Positioning Statement and MottoUse the pro.docx
 
ASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docx
ASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docxASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docx
ASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docx
 
assignment 1Essay Nuclear ProliferationThe proliferation of.docx
assignment 1Essay Nuclear ProliferationThe proliferation of.docxassignment 1Essay Nuclear ProliferationThe proliferation of.docx
assignment 1Essay Nuclear ProliferationThe proliferation of.docx
 

Recently uploaded

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 

Recently uploaded (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Student NameCYB110Playbook Runbook Parts 1-3S.docx

  • 1. Student Name CYB/110 Playbook / Runbook Parts 1-3 Student Name University of Phoenix Online CYB/110 Question 3 The scenario that happened involved the Win32/Virut malware that was notorious and wreaked havoc on one machine in the company (Microsoft). The malware was detected and stopped before it spread to any other computer on the network. It operates by modifying the software executables on the computers and spreads by targeting every software executable that opens and writes its code that introduces a backdoor that allows hackers to access the system from remote servers. The malware is introduced when an infected executable is run on the
  • 2. machine and once it has been installed along with the innocent- looking software, it copies itself to every other executable as soon as it is opened, meaning that it does not spread if no executable file is run. This, in turn, means that any software that is yet to be run is safe. Upon realizing the corruption, which was done when an online scan using ESET antivirus was conducted, every executable was closed down (ESET). This allowed for antivirus to effectively isolate any executable affected and list it. Indeed, the executables were listed and it turned out that 7 executables had been affected already, these were immediately quarantined. Some of the software affected were office word and operating system executables. To effectively deal with the threat, I restored the quarantined files so that I could cleanly uninstall the software. After the uninstallation, the online scan was run again, since it was not vulnerable to infection through the executable corruption. This time around, every identified threat was removed and an operating system disc used to repair the corrupted operating system files. Finally, the ESET antivirus was installed so that such threats can be prevented before happening to reduce the extent of the damage. The affected software was then reinstalled and the system scanned with the offline antivirus and scheduled to automatically scan every day (Koret and Bachaalany). Employees must be guided not to share the following information online: · Usernames · Office address · Their medical history and records · Their work experiences · The place they have lived in · Family member’s identity · Date of births · Personal information regarding bank detail or similar data (Norton).
  • 3. If employees put this data online, their personal information can be misused and they may face an issue which can be severe. Employees also need to be trained to interact securely while they use the internet. They must take care of the confidential information while sharing it in an email because if the emails are not protected, company data may be at high risk. If they have to share any document or attachment with the management, they need to develop a special code or a password to safeguard the sensitive and confidential information. Employees need to frequently change the passwords because the similar passwords for longer periods can be misused and easily hacked. While interacting online, they should not download any programs or need not install the unnecessary and untrusted applications because they can be a serious threat to their devices and the data kept in their devices may become at stake. They must develop passwords which are a mix of numeric and text to strengthen the security. When it comes to emails, they should not be downloading any emails from unknown sources and must also not click on the unknown links because they make give a security shock. Safe browser must be used and the antivirus should be updated (Kaspersky). For the enhanced email security, employees must develop separate email accounts for the official use and their passwords must be updated and complex. No large or unnecessary attachment needs to be downloaded because they may contain malware. Email security features must be known to the employees. Using public Wi-Fi to send and receive emails is not recommended because there is a high risk of data to be stolen on public Wi-Fi. All those attachments which are of no use must be blocked. If an email has too many recipients, it should also be blocked. So, email communication must be protected (Tolly). Following is the list of items that company employees should never share on the social media: · Representation of the company with unauthentic statements · Not talking about intellectual property rights · Not disclosing any confidential information
  • 4. · Not giving statements without having proper knowledge · Taking in a negative tone about the competitor · Posting any controversial thing · Talking about job roles · Posting office stories · Posting any accounts information · Talking in a hatred manner toward other people (Workable). Part 3 It is imperative for any business to secure the equipment with respect to network connections, mobile devices and cloud services. There is a strong need for businesses to develop guidelines for enhancing security of network connection, mobile devices and cloud services. To develop guidelines for the security of network connections, it is significant to understand about the components of a network. The main components of a network are router, firewall and switch. The router is a security barrier furthest from the center (Meier et al. para 26). The router sends IP packets to the networks to which it is attached. This router can be safeguarded in opposition to reconfiguration by making sure that it contains the advanced security patches and upgrades implemented. In addition, shielded administration interfaces can be utilized to enhance its safety (Meier et al. para 26). Firewall obstructs those ports which are not needed and permits the traffic from those ports that are recognized. To increase the security of firewall, it is necessary that firewall is patched on regular basis. The services which are not used should be eliminated. Moreover, the administration interfaces of the firewall should be safeguarded (Meier et al. para 27). Switch is the third main component of a network. Switches do not perform a greater part in the safe networking domain. Switches enhance the performance of a network. They can be made secure by testing and installing the updates and patches, and removing all those services or ports which are not utilized. Cybercriminals persistently search for the methods to make
  • 5. complete use of and derive benefit from weaknesses in operating systems, applications and software attempting to discover security defects prior to producers discovering and patching those faults (“Best Practices” para 2). The main prey to them is the user information which ranges from credit card details to emails passwords. The users can enhance the security of their mobile devices by utilizing built-in anti-robbery applications such as Find My iPhone. With the help of this applications, the owner of a mobile device can delete all information from a distance in a case they are not able to find their stolen device (“Best Practices” para 8). Besides, the users can safeguard their data that is transferred and obtained online by establishing a VPN. Mobile devices should be set on automatic locks and a sound passcode should be created so that no one can immediately discover the personal data. Also, it is mandatory to scan any email, message or call from an unfamiliar sender prior to opening it. It is very important to adopt a proactive approach when the security of cloud services is considered into account. It is recommended that the businesses should utilize two-factor authentication because the customary usernames and passwords combinations are not enough to offer high security to the users’ accounts. Two-factor authentication allows only official employees to log into the accounts and approach important information (Ntiva Editorial Team para 2). It is also important for a business to establish appropriate degree of authorization because each employee does not require a reach to every bit of data. Allocating user access rights will not only stop a worker from editing details which he/she is not allowed to approach, but also safeguards the systems of an organization from hackers (Ntiva Editorial Team para 3). It is also imperative to assure that an employee cannot approach an organization’s data, systems, intellectual properties and customer details when he/she is no longer a part of that particular organization. The organizations should implement a systemized deprovisioning procedure to make sure that the access entitlements of all
  • 6. leaving employees are cancelled (Ntiva Editorial Team para 5). Lastly, a cyber security training should be offered to the personnel. Works Cited ESET. Free Virus Scan | Online Virus Scan from ESET. 2018. Web. 19 June 2018. <https://www.eset.com/us/home/online-scanner/>. Kaspersky. Top 10 Internet Safety Rules & What Not to Do Online. n.d. https://usa.kaspersky.com/resource-center/preemptive- safety/top-10-internet-safety-rules-and-what-not-to-do-online. 30 August 2019. Koret, Joxean and Elias Bachaalany. The Antivirus Hacker's Handbook. 1st. Hoboken: Wiley, 2015. Print. Microsoft. Virus: Win32/Virut.BN. 15 September 2017. Web. 19 June 2018. <https://www.microsoft.com/en-us/wdsi/threats/malware- encyclopedia-description?Name=Virus:Win32/Virut.BN>. Norton. What personal information should you safeguard? n.d. https://us.norton.com/internetsecurity-privacy-what-personal- information-should-you-safeguard.html. 30 August 2019. Tolly, Kevin. Implementing the top 6 email security best practices for employees. 26 April 2019. https://searchsecurity.techtarget.com/tip/Implementing-the-top- 6-email-security-best-practices-for-employees. 30 August 2019. Workable. Employee social media policy sample. n.d. https://resources.workable.com/social- media-company-policy#. 30 August 2019. Works Cited “Best Practices: Securing Your Mobile Device” Trend Micro. Trend Micro Incorporated, 10 Oct. 2017. Web. 10 September 2019.Meier, J.D., Alex Mackman, Michael Dunner, Srinath Vasireddy, Ray Escamilla and Anandha Murukan
  • 7. “Chapter 15 – Securing Your Network.” Improving Web Application Security: Threats and Countermeasures. Microsoft Corporation. 2003. Web. 10 September. 2019.Ntiva Editorial Team. “6 Tips for Improving Cloud Computing Security.” Ntiva. Ntiva, 20 August, 2018. Web. 10 September 2019.