Intro Slide
The clinic in this scenario is facing a potential Denial of Service network intrusion incident. It is the task of the network security team to follow proper incident handling processes to ensure the correct handling of the incident.
This presentation discusses an incident known as a denial of service (DoS) as well as an intrusion of the clinic’s network systems. A denial of service (DoS) attack is designed to shut down services which a business needs to operate. This incident caused widespread slowness and outages to internet services and affected the clinic’s capability to properly treat its patients. In this presentation, the incident is examined. The processes to detect, analyze, contain, eradicate and recover from the
…show more content…
This report detailed the incident as well as the steps taken by the team to handle the incident. This presentation was generated as part of that report.
What are the lessons learned from this incident?
There are essential components which cannot be left offline. In this instance, a working network intrusion detection system (NIDS) could have assisted in alerting the team of the incident sooner which could have lessened the impact to patients. Early reporting is essential. The impact of this incident could have been reduced had staff reported slowness on the network earlier. It is vital for patient care that the clinic deploy redundant firewall systems which can provide a more resilient network.
Slide 10
The team follows an incident handling checklist which improves the ability to react properly when confronted with an incident. This checklist guides the team through the detection and analysis. It ensures that containment, eradication and recovery is handled properly. It also provides specific guidance on the post-incident activities.
Slide
…show more content…
If you get an email from someone unexpected, don’t open it, instead report it. Phishing email contains links to malware or attachments with malware embedded in the file. If you open the file or click on the link, an attacker can access your system remotely.
In addition to reporting slowness or phishing email, it is vital that clinic staff follow the information security policies of the clinic. These policies have been created to protect the clinic and its patients information. If you have questions about any of these policies, please contact the network security team or call the help desk for clarification.
Slide 12
The network team is doing its part to recommend updates to the network intrusion detection system. Also the team has setup alerts which will send email to the team when there is a change in the baseline network bandwidth which can be a precursor to an attack. Additional monitoring has been enabled to alert the team when there is administrative access to the firewall. Also the team will work to build resiliency in the network to automatically switch the network to additional circuits when under this type of
The incident response policy is very useful as it offers guidance on how to handle the situation when data has been breached. Through the policy security experts can restore the situation to normal and ensure that business runs again as usual without incurring to much losses due to time wastage. The policy gives clear guidance of the tasks and activities that should be carried out by the employees and the managers including procedures, reporting and feedback mechanism (Butler, 2015).
Two weaknesses were found in regards to the company 's network security. First weakness is a hardware weakness; and another is IDS which not having a Network-based Intrusion Detection System (IDS) in use. The recommended solutions are to show an AAA server for user authentication and authorization to company resources, and deploy a combination Host and Network-based IDS for overall monitoring of the company 's enterprise.
In order to be properly prepared for an outage in the magnitude of what transpired to the CareGroup network, systems and process control may have prevented this unfortunate event from occurring. Instituting a preventive approach to network functionality and security, along with a contingency plan to deal with failures or breaches to the system should have been in place.
GFI cannot afford system outages because its cash flow and financial systems heavily depend on the network stability. GFI has experienced DOS network attacks twice this year and its Oracle database and email servers had been down for a week. The recovery process required GFI to use $25,000 to restore its operations back to normal. GFI estimated the loss from these network attacks at more than $100,000 including lost customer confidence. GFI’s failure to incorporate proper firewall devices at Internet access points can be linked to DOS network attacks and Oracle database and email servers being down.
The risks that face an organization are going to always be present. However, an incident response plan outlines procedures for handling security incidents that occur within the organization and for correcting and documenting the security issue in a timely manner. The incident response team is trained to effectively implement the incident response plan. By containing an attack, and limiting the amount of time that an attack is allowed to continue, further risks to the organization can be mitigated.
1. The most significant problem was CareGroup suffered internet collapse in November 2002 and caused every software that required network unable to function. The main factor of this problem was the huge data transfers in short period of time and monopolized all networks resources and caused other users unable to connect to the service (the same idea of DDos attack). There were three underlying causes of this internet collapse. First of all, algorithms for computing alternative data paths were unable to function correctly. Due to the evolved of network, the network components were mostly rely on the service of major switch which meant that they lost the capability to find the new paths if they lost the services. Second, CareGroup IT did not use network traffic control system to efficiently distribute the resource. Although the data center was able to process 40 terabytes of data per day, it did not mean the system was good at handling extreme events. The last underlying cause is CareGroup IT did not frequently check the status of the router. The case referenced that CareGroup IT and the Cisco SWAT team found out the firmware in the old router was broken due to permanently written into the microchips.
On January 12th, 2007 at 4:31am, Bob Turley, CIO of the iPremier Company, received a panicked phone call from his IT operations staff. Their external facing website was “locked up” and could not be accessed by anyone, including their customers. iPremier is a web-based business that generates revenue through solely processing online orders. While the web server was down, the company could not accept any new orders or allow their customers to view their products. An inadequately third-party managed and configured router/firewall allowed hackers to execute a DOS (Denial of Service) attack on iPremier. I recommend purchasing a new firewall solution that will be managed and configured by the Company’s IT staff internally. This
A Denial of Service (DoS) attack on the corporate IT system at IVK Corporation. (Adapted from the book The Adventures of an IT Leader, 2009, Harvard Business School Publishing). After reading the case description, answer the questions that follow.
Any network dependent enterprise should have procedures and process in place that facilitate quick fixture of problems in the network. It gets all the more important in the case of a sensitive industry like the healthcare institution - Being able to fix and troubleshoot problems faster could define the life and death of the patients
Threat: Denial of Service is the interruption of service on a device that prevents legitimate users from accessing it. A common source of this type of attack is from malicious agents. This is a threat because of the importance of the server to this small investigation business. Since this is where clients upload their evidence, it must always perform at its optimal capability. With this in mind denial of service attacks becomes a great threat, as the opposing party in a case will benefit from evidence not being not being uploaded to the attorneys (OWASP Top 10, 2015).
1 What are the procedures incase of an attack. We should write a well-developed cyber incident response plan that includes all the protocols to responses. Our plan should generally have these following components, such as response team, reporting, initial response, investigation, recovery and follow up, public relations, and law enforcement. The job of the response team is to develop cyber incident response plan and for investing and responding to cyber attack. They will identify and classify cyber attack sceneries, and figuring out what tools and technology will be used to detect the attack. Determined the scope of the attack and internal investigation. Lastly, address the data breach and conduct follow reviews. Second, The cyber incident response plan should address procedures to take on discovery and reporting of cyber attack incidents. For example, set up team to monitor industry practices, checking if all the system are updated and patched. Non-stop monitoring the system activity and computers logs to see any incidents, than recorded it in a track log for later use. Third, if there was a report of a cyber attack, the response team should start their investigation whether the attack had occurred. The response team should quickly stop the attacker right away and stop the spreading further into the companies computers system. After doing that they should document what they have done and the incident. Forth, investigating the cyber security we need to construct internal
The information security incident management policy of Blyth’s Books was created in 2010 and has been reviewed four times in five years. Those covered by its scope are clearly stated. It stresses the importance of incident management to the organisation and has the support of upper level management.
Every personnel and partner organisation covered under the scope of Blyth’s Books incident management policy should be acquainted with the incident management structure and understand the advantages of such a
An organization wide strategic plan formulated to avoid or minimize the impact of incidents should focus on three integral components of any organization; People, Process and Technology. The organization currently doesn’t have any Incident Response Team which resulted in a delay in responding
This paper entails a discussion about Intrusion Detection and Prevention Systems. An explanation with reference to what they are, what they are used for, where, why and