CHAPTER 2User and Network Infrastructure Planning and Management

Alan, the senior IT engineer for Major Motors, Inc., is spending a relaxing Thursday night at home playing his favorite video game. His company’s TeamTalk remote collaboration tool pops up in his screen’s right-hand corner during the gaming session. That’s weird, he thinks. He had used TeamTalk earlier in the day while working remotely from home. He had used the tool to discuss with his team how they would integrate the networks of the company’s biggest acquisition to date, its former chief parts supplier Acme Motor Manufacturing.

But the meeting ended hours ago. Alan looks at the TeamTalk tool, and no one is there in the meeting room. Maybe he accidentally clicked the TeamTalk icon, he tells himself, and closes the TeamTalk window to return to his game.

When he shows up at the office the following day, everything is in chaos. The company’s manufacturing system has been hacked, and the attackers are systematically erasing the firmware for some assembly line servers. Everyone is running around trying to figure out what to do.

It takes the company all day to recover from what was a sophisticated, ...

Get Cybersecurity Risk Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.