Case Study: Hacker Attack!

SCENARIO

ESSENCE OF THE CASE

Here are the essential elements in this case:

  • Determine the nature of attack.

  • Declare an incident and convene CIRT.

  • Follow incident-handling procedures.

Richard is the overnight system administrator for Needmore Security, Inc. At approximately 8 p.m., he began to receive alarms from Needmore's intrusion-detection system indicating a high level of IP sweep and port-scanning activity. Following proper procedures, Richard made note of this activity in the security log and increased his level of vigilance.

At 9:45 p.m., Richard received a telephone call from one of Needmore's executives traveling overseas. He said that he was having difficulty locating some of his files and wanted to know whether ...

Get TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.