Business > CASE STUDY > C843_CaseStudy.docx The success of the attack on Azumer Water shows many instances of imp (All)

C843_CaseStudy.docx The success of the attack on Azumer Water shows many instances of imp

Document Content and Description Below

C843_CaseStudy.docx The success of the attack on Azumer Water shows many instances of improper mitigating controls, user accountability and awareness, as well as not following policy and regulations ... that could have prevented the deletion of 1,073 volunteer profiles from the database. The attack started from a simple click of a link that was part of a phishing email scam brought on by the attackers. John Smith, volunteer coordinator, did not pay attention in reading the phishing email and clicked on the link. This set the course of events in which many volunteers fell on the attack and led to the attackers gaining entry into the companys database and deleting the entire thing. Azumer Waters IT infrastructure does not have a Demilitarized Zone (DMZ) separate from their internal infrastructure. The DMZ would hold both their web and mail servers. This DMZ would be between two firewalls. The inner firewall would be used to separate the DMZ from the companys intranet LAN. The outer firewall would be used as a border firewall separating the internet from the DMZ unless the firewall rules are supplemented to allow certain traffic from the internet to access the web and mail servers, but prevent outsiders from accessing the intranet of the company unless specified by the inner firewall rules. Intrusion Detection System (IDS) / Intrusion Protection System (IPS) are not a part of Azumer Water infrastructure. NIST SP 800-94, “Guide to Intrusion Detection and Prevention Systems,” provide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]

Last updated: 2 years ago

Preview 1 out of 1 pages

Buy Now

Instant download

We Accept:

We Accept
document-preview

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

We Accept

Reviews( 0 )

$10.00

Buy Now

We Accept:

We Accept

Instant download

Can't find what you want? Try our AI powered Search

58
0

Document information


Connected school, study & course


About the document


Uploaded On

Jul 31, 2022

Number of pages

1

Written in

Seller


seller-icon
helperatsof1

Member since 4 years

48 Documents Sold

Reviews Received
1
0
0
0
2
Additional information

This document has been written for:

Uploaded

Jul 31, 2022

Downloads

 0

Views

 58

Document Keyword Tags


$10.00
What is Scholarfriends

In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.

We are here to help

We're available through e-mail, Twitter, Facebook, and live chat.
 FAQ
 Questions? Leave a message!

Follow us on
 Twitter

Copyright © Scholarfriends · High quality services·