Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
Linux Slapper Worm, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
The Incident Response plan has been made to give guidance and oversight of all exercises to the team, in the case of the identified interruption of the data innovation, IT services, and information technology programming system accessibility. The incident involves a suspected worm spreading via buffer overflow techniques, which is compromising Microsoft IIS Web servers.The reason for this approach is to secure a convention to guide a reaction to a workstation episode or occasion affecting Microsoft machine supplies, information or systems. This strategy applies to representatives, foremen, experts, impermanent workers, and different laborers at Microsoft, incorporating all work force subsidiary with outsiders.
Incident Reporting
All machine security occurrences, including suspicious occasions, should be accounted for instantly either orally or by means of email to the division IT director and/or office chief by the worker who saw or distinguished the incident. This will include: incident report, description, point of contact, affected areas, incident status, damage evaluation, and corrective strategies.
Escalation
The office IT administrator and/or division manager needs to focus the criticality of the episode. The division IT director and/or office chief will allude to their IT crisis contact rundown for both administration staff and episode reaction parts to be reached. On the off chance that the episode is something that will have a genuine effect, the head supervisor/managerwill be informed and advised on the occurrence.
Containment:
Any framework, system, or security executive who watches an interloper on servers or framework should make fitting move end the gatecrasher’s right to gain entrance. Influenced frameworks, for example, those contaminated with noxious code or frameworks got to by the worms, might be secluded from the system until the degree of the harm could be evaluated. Any ran across vulnerabilities in the system or framework will be corrected by suitable means as quickly as time permits. The first order of business is containing the outbreak, by means of auditing the ports and the router access. Scanning and identifying the affected and vulnerable systems (Microsoft Servers), which can be done by updating antivirus software systems, intrusion detection applications that will indicate the possible buffer overflow attempt, and set the Network Monitor utility.
Rebuilding
The degree of harm must be dead set, and game plan arranged and conveyed to the proper gatherings. Any requirement for rebuilding of framework setups, provisions or information should be made succeeding annihilation of the episode from clean reinforcements. Patch and reboot affected and vulnerable systems, which requires creating and applying a Group Policy Object with three factors: shutdown script, startup script, and user logon script. (Microsoft, 2013)
Progressing Reporting
The last step in the plan is, reviewing the security response and communications plan that covers: lessons learned, new information from the incident response, and factors that can be used in a long-term response strategy. After the beginning oral or email report is documented, and if the occurrence has been resolved to be a critical occasion, (for example, numerous workstations affected, root trade off, information rupture, and so forth.), Ensuing reports should be given to the CIO and proper directors. Occurrences, for example, distinctive workstations tainted with malware are viewed as minor occasions and need not be caught up with a composed report. The occurrence reports might be submitted inside 24 hours of the episode. On the off chance that this is the situation, the more stringent prerequisites are to be met as needed.
Audit:
After the introductory reporting and/or notice, the IT supervisor, division chiefs, The Information Security Incident Team Manager and CIO might audit and reassess the level of effect that the episode made. Audit reaction and redesign approaches arrange and take safeguard steps so the interruption can be prevented in the future.
References
Fifarek, Richard H. (2002). Linux Slapper Worm: Buffer Overflow Attacks Continue to be a Problem. SANS GSEC Practical. 1.4. Retrieved from http://cyber-defense.sans.org/resources/papers/gsec/linuxslapperworm-buffer-overflow-attacks-continue-problem-103966
Incident Response. Managing Security at Microsoft. (2003). Microsoft White Papers. Download Center.
Responding to IT Security Incidents. (2014). Microsoft TechNet. Retrieved from http://technet.microsoft.com/en-us/library/cc700825.aspx
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee