Ask Question

Case ExercisesThe nest day at SLS found everyone in technical support busy restoring computer systems to their former state and installing new virus and worm control software. Amy found herself learning how to re-install desktop computer operating systems and applications as SLS made a heroic effort to recover from the attack of the previos day. Discussion Questions1. Do you think this event was caused by an insider or outsider? Explain your anwer. 2. Other than installing virus and worm control software, what can SLS do to prepare for the nest incident?3. Do you think this attack was the result of a virus or a worm? Explain your answer.

+5
Answers (1)
  1. 9 July, 20:36
    0
    In the explanation section, the further description of the problem is defined.

    Explanation:

    (1) According to the above paragraph, this isn't obvious what kind of assault it would be, It could be an attacker or maybe an outsider assault that has contributed to the re-installation and restore of the applications.

    (2) Apart from just downloading the SLS malware configuration tool, the records also should be thoroughly checked as well as the server and devices monitored and the new virus, ransomware defenses enabled, and also the authentication method should be followed to avoid such future attacks.

    (3) Sure, this intrusion may have been due to malware that infected the documents as well as the network.

    It could also be attributed to data theft, due to which networks have not responded as a consequence from which the devices have been reinstated.

    So, it's the right answer.
Know the Answer?
Not Sure About the Answer?
Find an answer to your question 👍 “Case ExercisesThe nest day at SLS found everyone in technical support busy restoring computer systems to their former state and installing ...” in 📗 Computers & Technology if the answers seem to be not correct or there’s no answer. Try a smart search to find answers to similar questions.
Search for Other Answers