Project Scenario # 3 Daniel Gomez. I am the Information Systems Security Manager at Western Technical College. A virus has penetrated the network firewall.

Slides:



Advertisements
Similar presentations
Tips and tools to keep you and your information safe on-line. We will go over a lot of information today, so it is important to pay attention and follow.
Advertisements

The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Safe IT – Protect your computer and Family from unwanted programs viruses and websites.
COMPUTER VIRUS: Potentially damaging computer program designed to infect other software or files by attaching itself to the software or files with which.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Spring Definitions  Virus  A virus is a piece of computer code that attaches itself to a program or file so it can spread.
Using Anti-virus Software A SeniorNet Workshop SeniorNet is a service program of the Lutheran Service Society of Western Pennsylvania.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
EDUCAUSE Security 2006 Internet John Brown University.
Incident Response Updated 03/20/2015
Desktop Security: Worms and Viruses Brian Arkills, C&C NDC-Sysmgt.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 IT Essentials PC Hardware and Software 4.1 Instructional Resource Chapter.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
Laptop Survival and Management Help Desk Services Pat Valiquette Mark Miller Campus tools – Fall 2006.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
David Overton Head of Small Business Technology – Head of Small Business Technology – Microsoft solutions for.
Learning In A Techno World How Safe is Your Cyberspace?
IT security By Tilly Gerlack.
DECS Community IT DIVISION OF ENGINEERING COMPUTING SERVICES Michigan State University College of Engineering.
Issues # 550 When receiving Yes What is the error message? Can you forward that to me? #553 Is the problem when sending or receiving? What kind of.
Georgia Department of Human Services Division of Aging Services (DAS): Data Breach Presenter:Harold Johnson Acting General Counsel Presentation to: Board.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
A computer virus is a computer program that can replicate itself and spread from one computer to another. The term "virus" is also commonly, but erroneously.
Robert Crawford, MBA West Middle School.  Explain how to prevent data loss  Describe how to use antivirus programs  Discuss ways of backing up data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Computer Security 2 Keeping your computer safe. Computer Security 2 Computer Security 2 includes two lessons:  Lesson 3: Protecting yourself and your.
1 Improving Security Through Automated Policy Compliance Christopher Stevens Director of Network and Technical Services Lewis & Clark College Educause.
ICT development office ICT research, planning and training dept. Network development and administration dept. System development and operation dept. President.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
How can IT help you today?. Agenda Why Do You Care? What Are The Risks? What Can You Do? Questions? How can IT help you today? 2.
Microsoft ® Windows ® Small Business Server 2003 R2 Sales Cycle.
Manga comic industry security information presentation By Dominic Roofe.
HalFILE 2.1 Network Protection & Disaster Recovery.
By Liam Wright Manga comic group Japan SAFETY on your computer.
Campus Network upgrade and Wi-Fi Rollout REVIEW AND PHASE 3 PROJECT MANAGER TASKS.
Local issues Auditing Log Review Physical protection Disaster Recovery Backup Schedules Off-site storage SECURITY.
Matthew Glenn AP2 Techno for Tanzania This presentation will cover the different utilities on a computer.
Viruses. Learning Objectives: At the end of this lesson you should be able to:
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Damarion Taylor WS-107 January 18, Installing a Anti-virus (i.e. Norton) I.Place Norton Anti-Virus disc into your CD drive. II.Wait for auto-run.
Proposed UW Minimum Computer Security Standards From C&C 28 Jan 2005 Draft.
About Us AVG is a global security software maker protecting 98 million active users in 170 countries from the ever-growing incidence of Web threats, viruses,
Best 'Out of Office' Automatic Replies:. 1. I am currently out of the office at a job interview and will reply to you if I fail to get the position.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
What is virus? §A computer virus is an irregular, human- made program designed to infect computers.
Software - Utilities Objectives Understand what is meant by utility software and application software Look at common utilities – Security – Disk organisation.
Computer and Internet Security (How to protect your computer from Threats) By: Steven Siggers Instructor: Dr. Marko Puljic.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Policies and Security for Internet Access
1 Outline of this module By the end of this module, you will be able to: – Understand what is meant by “identity crime”; – Name the different types of.
1 Outline of this module By the end of this module you will be able to: Understand why computer security is important; Name the different threats to.
Outline of this module By the end of this module, you will be able to: Understand the benefits that internet banking provides; Name the different dangers.
U3A Computing CMP Class Leader – Brian Moore Week 7 of 10 weeks. Mondays 4:15 to 5:45 pm 11/11/13.
«My future profession»
Three steps to prevent Malware infection
upport number.outlook.
Year 8 ICT Internet Security
Antivirus Support Phone Number + 1-(844) One Step IT Solutions December 6, 2017
Steps to Setup and Install McAfee Antivirus
Kaspersky Total Security for Mac Kaspersky Total Security for Mac,
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Types of Software.
The Troubleshooting theory
Presentation transcript:

Project Scenario # 3 Daniel Gomez

I am the Information Systems Security Manager at Western Technical College. A virus has penetrated the network firewall and infected the school’s web server. As the ISS Manager, it is my duty to repair the virus attack, find out what the source of the virus was, figure out why the firewall did not block the attack, and to prevent an attack from happening again.

Monday, Jan 10, 2011, 7 am: I receive a call that Western Technical College has experienced a virus that has penetrated the server’s firewall.

Monday, Jan 10, 2011, 8 am: As the ISS Manager, I immediately ask the IT security team for copies of any data logs available, including the web server, database, and firewall.

Monday, Jan 10, 2011, 9 am: The Director of the school calls me into his office and asks me why this attack has occurred with the purchase of a new firewall. I inform him that the firewall had been installed but failed to prevent the attack. At this time, I do not know why this happened but I submit a proposal to the Director stating what I plan to do to repair the server.

Monday, Jan 10, 2011, 10 am: I advise the ISS staff to examine the web server. The web server is temporarily taken off line and a “closed for essential maintenance” message is posted on the website. I instruct the team to run a full anti-virus and malware check on the web server. I instruct the team to use the previous day’s back-up disk to verify that nothing on the server has been added or deleted.

Monday, Jan 10, 2011, 11 am: After examining the logs, the ISS team discovers that an employee had opened an attachment called “seemybits.jpg.vbs” from his laptop. This attachment was the source of the virus. The laptop was connected briefly to a wi-fi access point.

Monday, Jan 10, 2011, 12 pm: I contacted the firewall vendor’s tech support representative through . The tech support specialist replied that the firewall will not protect a computer from being infected while in use at a wi-fi hotspot. The firewall vendor offers to replace the existing firewall model with another version that provides secure wi-fi access.

Monday, Jan 10, 2011, 1 pm: I sent out a memo to all Western Technical College employees stating that it is safe to connect to the server. However, I also state that they can not use wi-fi access on their computers until the required firewall security patches have been installed.

Tuesday, Jan 11, 2011, 8 am: I write an incident report to the Director of the school. I gave details on how we were able to remove the virus and get the server back on line without any traces of the virus. I explained how the virus managed to penetrate the firewall and informed about the replacement.