All papers examples
Get a Free E-Book!
Log in
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Linux Slapper Worm, Research Paper Example

Pages: 2

Words: 648

Research Paper

The Incident Response plan has been made to give guidance and oversight of all exercises to the team, in the case of the identified interruption of the data innovation, IT services, and information technology programming system accessibility. The incident involves a suspected worm spreading via buffer overflow techniques, which is compromising Microsoft IIS Web servers.The reason for this approach is to secure a convention to guide a reaction to a workstation episode or occasion affecting Microsoft machine supplies, information or systems. This strategy applies to representatives, foremen, experts, impermanent workers, and different laborers at Microsoft, incorporating all work force subsidiary with outsiders.

Incident Reporting

All machine security occurrences, including suspicious occasions, should be accounted for instantly either orally or by means of email to the division IT director and/or office chief by the worker who saw or distinguished the incident. This will include: incident report, description, point of contact, affected areas, incident status, damage evaluation, and corrective strategies.

Escalation

The office IT administrator and/or division manager needs to focus the criticality of the episode. The division IT director and/or office chief will allude to their IT crisis contact rundown for both administration staff and episode reaction parts to be reached. On the off chance that the episode is something that will have a genuine effect, the head supervisor/managerwill be informed and advised on the occurrence.

Containment:

Any framework, system, or security executive who watches an interloper on servers or framework should make fitting move end the gatecrasher’s right to gain entrance. Influenced frameworks, for example, those contaminated with noxious code or frameworks got to by the worms, might be secluded from the system until the degree of the harm could be evaluated. Any ran across vulnerabilities in the system or framework will be corrected by suitable means as quickly as time permits. The first order of business is containing the outbreak, by means of auditing the ports and the router access. Scanning and identifying the affected and vulnerable systems (Microsoft Servers), which can be done by updating antivirus software systems, intrusion detection applications that will indicate the possible buffer overflow attempt, and set the Network Monitor utility.

Rebuilding

The degree of harm must be dead set, and game plan arranged and conveyed to the proper gatherings. Any requirement for rebuilding of framework setups, provisions or information should be made succeeding annihilation of the episode from clean reinforcements. Patch and reboot affected and vulnerable systems, which requires creating and applying a Group Policy Object with three factors: shutdown script, startup script, and user logon script. (Microsoft, 2013)

Progressing Reporting

The last step in the plan is, reviewing the security response and communications plan that covers: lessons learned, new information from the incident response, and factors that can be used in a long-term response strategy. After the beginning oral or email report is documented, and if the occurrence has been resolved to be a critical occasion, (for example, numerous workstations affected, root trade off, information rupture, and so forth.), Ensuing reports should be given to the CIO and proper directors. Occurrences, for example, distinctive workstations tainted with malware are viewed as minor occasions and need not be caught up with a composed report. The occurrence reports might be submitted inside 24 hours of the episode. On the off chance that this is the situation, the more stringent prerequisites are to be met as needed.

Audit:

After the introductory reporting and/or notice, the IT supervisor, division chiefs, The Information Security Incident Team Manager and CIO might audit and reassess the level of effect that the episode made. Audit reaction and redesign approaches arrange and take safeguard steps so the interruption can be prevented in the future.

References

Fifarek, Richard H. (2002). Linux Slapper Worm: Buffer Overflow Attacks Continue to be a Problem. SANS GSEC Practical. 1.4. Retrieved from http://cyber-defense.sans.org/resources/papers/gsec/linuxslapperworm-buffer-overflow-attacks-continue-problem-103966

Incident Response. Managing Security at Microsoft. (2003). Microsoft White Papers. Download Center.

Responding to IT Security Incidents. (2014). Microsoft TechNet. Retrieved from http://technet.microsoft.com/en-us/library/cc700825.aspx

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Research Paper Samples & Examples

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper

The Risk of Teenagers Smoking, Research Paper Example

Introduction Smoking is a significant public health concern in the United States, with millions of people affected by the harmful effects of tobacco use. Although, [...]

Pages: 11

Words: 3102

Research Paper

Impacts on Patients and Healthcare Workers in Canada, Research Paper Example

Introduction SDOH refers to an individual’s health and finances. These include social and economic status, schooling, career prospects, housing, health care, and the physical and [...]

Pages: 7

Words: 1839

Research Paper

Death by Neurological Criteria, Research Paper Example

Ethical Dilemmas in Brain Death Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in [...]

Pages: 7

Words: 2028

Research Paper

Ethical Considerations in End-Of-Life Care, Research Paper Example

Ethical Dilemmas in Brain Death Ethical dilemmas often arise in the treatments involving children on whether to administer certain medications or to withdraw some treatments. [...]

Pages: 5

Words: 1391

Research Paper

Ethical Dilemmas in Brain Death, Research Paper Example

Brain death versus actual death- where do we draw the line? The end-of-life issue reflects the complicated ethical considerations in healthcare and emphasizes the need [...]

Pages: 7

Words: 2005

Research Paper

Politics of Difference and the Case of School Uniforms, Research Paper Example

Introduction In Samantha Deane’s article “Dressing Diversity: Politics of Difference and the Case of School Uniforms” and the Los Angeles Unified School District’s policy on [...]

Pages: 2

Words: 631

Research Paper