You are on page 1of 1

1. You are a member of the IT security support group of a large manufacturing company.

You were
informed that someone has defaced your organization’s Web site and also attempted to gain access
to the files containing information about a new product currently under development. What would
be your next steps? How much effort would you spend in tracking down the identity of the hacker?

We should be careful and protect our files that it will not be easily hacked by someone. And I’m going to
make is to know who the hacker is. Get some information about the hacker and track it using its IP
address. The hacker should be reported immediately and should be punished by the new law being
implemented, the Cybercrime law.

2. You have been hired as an IT security consultant to “fix the security problem” at Acme United
Global Manufacturing. The company has been hacked mercilessly over the last six months, with
three (3) of the attacks making headlines for the negative impact they have had on the firms and its
customers. You have been given 90 days and a budget of Php 55 million. Where would you begin,
and what steps would you take to fix the problem?

m
I will do my best to fix this before the deadline and I hire a licensed penetration tester or ethical hacker to

er as
be a partner with years of experience in their field. You should not feel anxious about them because they

co
know their thing and they have a license and you can only start with a contract if you really are not

eH w
comfortable with it.

o.
rs e
3. It appears that someone is using your firm’s corporate directory, which includes job titles and e-
ou urc
mail addresses to contact senior managers and directors via e-mail. The message requests that they
click on a URL to redirect them to a Web site that looks as if it were designed by your HR
organization. Once at this phony Web site, they will be asked to confirm the bank account number
to be used for electronic deposit at their annual bonus check. As an IT security for the firm, what
o

can you do?


aC s
vi y re

This one is an example of phishing, To make sure that our company is safe from the hacker. as an IT
security in our company it is indeed my job and my responsibility of keeping information are all in good
hands and never be hacked by any of those person who will try to enter into our company’s system. I must
ed d

be the one giving it a protection. I will make a system that only those persons have the authority to enter
into our company’s system.
ar stu
is
Th
sh

This study source was downloaded by 100000808770969 from CourseHero.com on 12-08-2021 06:34:33 GMT -06:00

https://www.coursehero.com/file/75482561/Prof-issue-06-Activity-2docx/
Powered by TCPDF (www.tcpdf.org)

You might also like