How would you track and remove the worm the network


Discussion

Text book: Information Governance: Concepts, Strategies and Best Practices; 1st Edition; Robert F. Smallwood; Copyright 2014 by John Wiley & Sons, Inc., Hoboken, New Jersey (ISBN 978-1-118-21830-3)

Describe how the business culture can have an impact on a company's implementation of a new Information Governance program. - 1 page.

Read chapters 8 and 9 from Textbook: Amoroso, E. G. (2012). Cyber attacks: protecting national infrastructure. Elsevier.

Scenario: An intern employee names James has found a USB on the ground coming into work, he wants to find the owner. He plugs the USB drive into his workstation computer and the drive appears to be empty. He sees that the command prompt flashes open and closes. Unknowingly he just executed a worm or botnet into the network. He informs you (the CIO) that he believes that he has unleashed a worm.

The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.

Task: How would you track, and remove the worm the network?

Areas to consider: What ports or port types will have unusual activity.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: How would you track and remove the worm the network
Reference No:- TGS03014548

Now Priced at $20 (50% Discount)

Recommended (96%)

Rated (4.8/5)