We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Evaluation Case Essay Sample

The whole doc is available only for registered users OPEN DOC

Get Full Essay

Get access to this section to get all the help you need with your essay and educational goals.

Get Access

Evaluation Case Essay Sample

1. Describe the nature of the incident.

The nature of this event describes an internal breach of security in order to access and manipulate sensitive data. This internal breach was caught by the auditor, but the communications from the auditor to those who’s data was breached was intercepted.

It was determined that authentication and encryption controls as well as a lack of PKI should have been implemented in order to prevent this breach of data.

2. Identify who needs to be notified based on the type and severity of the incident.

Severity of the incident
President of Company
Directly affected and upper management .
IT Department
Must act to close breach.
Directly affected by the breach
& intruder had access to their sensitive files.
Human Resource Depart
It was the HR system that accessed the files and they also need to make sure everything has been corrected. High

3. Outline how the incident could be contained.

This incident could’ve been contained by implementing a multiauthentication system and data encryption. Permissions need to be set although because the attack was done accessing human resource files, that would not have been a direct help. The human resource department would have access to payroll and financial records. Email digital signatures would also have helped so the emails to the auditor would not have been able to be spoofed. 4. Discuss how the factor that caused the incident could be removed.

Implementing better network security standards and creating a communications plan that would include phone conversations would have not allowed the person to access the payroll, make changes, and spoof emails. Utilizing other communication methods would have helped since the attacker could not spoof the auditor. The employee that caused the incident should be not only terminated but also brought up on fraud charges through the local, state, and federal law. 5. Describe how the system could be restored to normal business practice.

The system can be restored to normal business practice by either using a backup that carried the correct data and restored the files that were affected. An incremental restore. The system could also be returned to its normal state with the human resource department going through the payroll and changing the files that were affected back to their normal pay scale. Without adding additional security though, the system is still vulnerable. 5a. Explain how the system could be verified as operational.

The system is verified as operational when all files have been restored to the normal state and the system is running smoothly. Management will need to review the affected files to ensure that the information in them is correct.

1. Identify areas that were not addressed by the IT staff’s response to the incident.

One of the areas that were not identified was how the network system allowed the spoofing and was not caught much earlier. Were permissions already in place? Do they have a network logging system that analyzes the logs? The lack of other system checks were not addressed in this scenario. 2. Outline the other attacks mentioned in the scenario that were not noticed by the organization.

An attack that was not mentioned in the scenario was social engineering. The employee that manipulated the system used social engineering as well to convince the auditor that not only did the emails get sent by the person to whom they were addressed, but that he or she was that person as well.

2a. Describe the nature of the attacks not noticed by the organization.

The nature of the attacks that was not noticed by the organization was human interaction (Peltier, n.d.). Using social engineering, the employee was able to monitor the situation from inside the office as well as spoof emails to the auditor. The auditor put trust in the emails instead of calling or talking to each person affected personally. This allowed for the social engineering attack to continue.

2b. Describe how these additional attacks can be prevented in the future.

These attacks can be prevented by offering employee training of different security awareness. Security policies should be updated to include additional actions to be taken to ensure that sensitive emails are indeed coming from the correct person by using a phone call or by talking to that person physically. 3. Recommend a recovery procedure to restore the computer systems back to their original state prior to such attacks.

Since the entire network was not affected, just certain files, I would recommend an incremental backup to restore the changed files back to their original form. Human Resources should verify to make sure that the information is correct. Once the system is restored, place in added security measures and backup the system again.


Peltier, T. (n.d.). Social Engineering: Concepts and Solutions. Retrieved January 27, 2014, from http://www.infosectoday.com/Norwich/GI532/Social_Engineering.htm

We can write a custom essay

According to Your Specific Requirements

Order an essay

You May Also Find These Documents Helpful

The September 11th Terrorist Attacks

Introduction; New York City and indeed the whole world were shocked by the deliberate crashing of two commercial planes into the World Trade center in downtown Manhattan on the morning of September 11th 2001. Nineteen terrorists had hijacked and commandeered these planes to their deadly target. The total number of planes hijacked was four; one other plane crashed into the Pentagon building in Washington D.C’,...

The Effects of 9/11 on the US...

The terrorist attack of September 11, 2001 on the World Trade Center, New York City resulted in huge losses of life and property and had a major impact on the economy of the United States. The total loss in the US economy due to the 9/11 terrorist attacks can be studied on the nature of costs involved (direct or indirect) and on the time period...

The Impact of September 11 on Defense...

The impact of the World Trade Center tragedy of September 11 on the economy of the USA The September 11 attacks in New York and Washington have already cost America thousands of lives and billions of dollars in damages. But those are only the direct costs. September 11th economists from the National Bureau for Economic Research announced that as of March, 2001, the economy was...

Terrorist Attacks in the United States of...

            Terrorism is one of the major problems that are adversely affecting the world today. This kind of dilemma is not only observable in countries under war or chaotic situations but rather it is affecting even developed countries with stable government systems. The United States of America is no exception because they also experienced this same catastrophic event in their history. The most recent among...

Al-Qaeda attacks the United States of America...

The Attack, Part II             Americans are still left in the dark.  Even the White House is clueless about the events that will transpire.  The Pentagon, in its routine security check, is in its usual suspicious mode. It never hurts to be extra careful.  Since the 9/11 attacks, the Pentagon has been ordered to be alert to all possibilities of terrorist activities within the country. ...

Get Access To The Full Essay
Materials Daily
100,000+ Subjects
2000+ Topics
Free Plagiarism
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access

Become a member

Your Answer Is Very Helpful For Us
Thank You A Lot!


Emma Taylor


Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59
Become a Member