O'Reilly logo

TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001 by Shawn Porter, Debra Littlejohn Shinder, Mike Chapple

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Case Study: Hacker Attack!

SCENARIO

ESSENCE OF THE CASE

Here are the essential elements in this case:

  • Determine the nature of attack.

  • Declare an incident and convene CIRT.

  • Follow incident-handling procedures.

Richard is the overnight system administrator for Needmore Security, Inc. At approximately 8 p.m., he began to receive alarms from Needmore's intrusion-detection system indicating a high level of IP sweep and port-scanning activity. Following proper procedures, Richard made note of this activity in the security log and increased his level of vigilance.

At 9:45 p.m., Richard received a telephone call from one of Needmore's executives traveling overseas. He said that he was having difficulty locating some of his files and wanted to know whether ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required