Business > CASE STUDY > C843_CaseStudy.docx The success of the attack on Azumer Water shows many instances of imp (All)
C843_CaseStudy.docx The success of the attack on Azumer Water shows many instances of improper mitigating controls, user accountability and awareness, as well as not following policy and regulations ... that could have prevented the deletion of 1,073 volunteer profiles from the database. The attack started from a simple click of a link that was part of a phishing email scam brought on by the attackers. John Smith, volunteer coordinator, did not pay attention in reading the phishing email and clicked on the link. This set the course of events in which many volunteers fell on the attack and led to the attackers gaining entry into the companys database and deleting the entire thing. Azumer Waters IT infrastructure does not have a Demilitarized Zone (DMZ) separate from their internal infrastructure. The DMZ would hold both their web and mail servers. This DMZ would be between two firewalls. The inner firewall would be used to separate the DMZ from the companys intranet LAN. The outer firewall would be used as a border firewall separating the internet from the DMZ unless the firewall rules are supplemented to allow certain traffic from the internet to access the web and mail servers, but prevent outsiders from accessing the intranet of the company unless specified by the inner firewall rules. Intrusion Detection System (IDS) / Intrusion Protection System (IPS) are not a part of Azumer Water infrastructure. NIST SP 800-94, “Guide to Intrusion Detection and Prevention Systems,†provide. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . . . . .. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .. . .. .. . . . . . . . . . . . . . . . . . .. . . . . [Show More]
Last updated: 2 years ago
Preview 1 out of 1 pages
Buy this document to get the full access instantly
Instant Download Access after purchase
Buy NowInstant download
We Accept:
Can't find what you want? Try our AI powered Search
Connected school, study & course
About the document
Uploaded On
Jul 31, 2022
Number of pages
1
Written in
This document has been written for:
Uploaded
Jul 31, 2022
Downloads
0
Views
58
In Scholarfriends, a student can earn by offering help to other student. Students can help other students with materials by upploading their notes and earn money.
We're available through e-mail, Twitter, Facebook, and live chat.
FAQ
Questions? Leave a message!
Copyright © Scholarfriends · High quality services·