Blue Moon Financial Incident Report

Improved Essays
As a Senior Security Analyst with the most experience in incident response at Blue Moon Financial (BMF), it is my duty to handle this network intrusion attack. When the technician contacted me over the phone about this incident, I have asked and gathered the following information from the technician:
- The technician’s full name and employee ID number.
- Date and time he/she discovered the incident
- Has he/she seen this incident occurred before?
- How did the technician discover the incident?
- What does he/she know about the incident?
Since I have confirmed that the BMF is under an active attack, the first I need to do is to protect my people, and after that proceed onward to things like securing BMF sensitive financial data and assets. Stopping
…show more content…
I then contact BMF Incident Response Coordinator who can contact the Computer Incident Response Team (CIRT) so that they can conduct the initial investigation. The CIRT is a team comprising of BMF employees with experience and knowledgeable from different departments within the BMF. IT staffs are not only personnel that are needed to handle the incidents, but from other technical experts. Each departments should have a representative to be a CIRT member in the team. The following are the main department representatives (Bryce, …show more content…
This incorporates detailing incidents to organizations such as Federal Computer Incident Response Center (FedCIRC) and the CERT Coordination Center (CERT/CC), and law enforcement.
- Human Resource (HR): The HR should define employee policies to oversee proper use of BMF system and network assets. An employee may face counseling and discipline when violate the policies.
- Management: It is crucial to communicate with senior management all through every incident when the severity level is as “high” or “medium”. Management can engage the CIRT by establishing an incident spending plan, the CIRT staffing, delivering incident’s status to Board of Directors, and making critical incident response decisions. It is the duty of the CIRT to respond to the issue rapidly and proficiently. The CIRT needs to stop the attack to prevent further damage. The team can utilize various procedures to fulfill their tasks. Generally, the CIRT will disable the network connections, isolate affected systems, make changes to access control lists on routers and firewalls, as well as patching all systems. The CIRT can perform the following tasks (Suhy,

Related Documents

  • Improved Essays

    Figure 6 shows Internal Security settings that were not set as high as they might have been to aide in threats that require a human response. Lesson 7: Invest in good technological defenses, but do not under invest in people who will be operating this equipment. Another, related lesson learned here is the need to strive to be excellent, rather than average. This stems from the view that we had taken during many simulation results that we were still doing "pretty good" when looked at in the context of all sectors taken together.…

    • 1194 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    These studies might show labor hours needed, hardware and software costs, utility costs and prevention of data lost. Another aspect of computer security is disaster recovery, this might include damage caused by a natural or manmade occurrence. Computer equipment that is damaged might include sensitive information stored on hard drives and these would either need to be recovered or disposed of. The key decision makers in a security project would include: Chief Executive Officer: The most senior corporate officer reports to the board of directors.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Risk: Undetected, unusual and suspicious activity Mitigation Strategies: A. All wires are reviewed monthly, and placed on a spreadsheet that is reviewed quarterly, by the BSA Committee for any suspicious activity. B. Consumer international wires are monitored by the Compliance Manager to assure that the Bank remains exempt from the Remittance Transfer Rule. C. Periodic internal/external audits are performed by third party firms. D. The Bank’s Customer Identification Program (CIP) and Customer Due Diligence (CDD) Program enables the Bank to effectively monitor, identify, and report unusual and suspicious funds transfer activities.…

    • 1287 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Johnson 6 virus, worms, malware or spyware. It’s very interesting if one goes onto google play or the one from Apple, there are numerous applications created to do a phone scan and to check newly installed applications to ensure your phone is protected from viruses. The world wide web is like playing Russian roulette because of the possibility of contracting a virus or worm. Hackers across the globe will forever be a serious threat to citizens around the world and National Security. The Department of Defense along with the Department of Homeland Security oversee security measure to protect the United States from cyber-attacks.…

    • 955 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Given the University’s many diverse systems and disparate departmental roles managing the various systems the overall information security plan was not update to date nor consistent. There were obvious holes in the security plan which allowed a hacker to infiltrate the main domain server. The hacker secured administration rights on the server and they managed to infect other systems attached to the network. Thankfully, a trail of clues were found by the administrators.…

    • 671 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    If an attack necessitates collaboration with outside service providers it will be deemed an escalation priority and high severity to attempt to reach a resolution as quickly as possible. The Network Administrator will inform the Executive Team and Pathways Industries Legal Representatives of the attack in a timely manner. The Executive Team and legal representatives will judge the seriousness of the attack. The appropriate legal action if any will the begin.…

    • 738 Words
    • 3 Pages
    Great Essays
  • Superior Essays

    A number of attacks were overlooked by the IT staff in there evaluation. They missed the fact that a man-in-the-middle attack was used to eavesdrop on the entire network. This is how the disgruntled employee was able to stop and altered the notification email from the auditor to the president and some other employees. They missed the fact that a rouge device was used to carry out the attack.…

    • 1877 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    associate screening, insider employee theft, and failure to update information security methods (Matwyshyn, 2009, p. 584). A breach incident is the unauthorized access to confidential or sensitive information which can result in the compromise or probable compromise of this data. This Information which could be confidential, protected, or sensitive can include personal identity information, health information, intellectual property or professional trade secrets of an organization, and financial data of the organization, customers or individuals. As the use of technology to collect, filter, process, and distribute data becomes more increased so do breaches. Data breaches are increasing among businesses and individuals with considerable financial…

    • 1058 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    The Incident Command System (ICS) is an organizational structure employed by many companies and government agencies in British Columbia, Canada, in order to manage major emergencies, such as an oil spill or railway accident. The Incident Command System origins stem from the 1970 California "wildfires" after many other multi-agency incidents, the incident command system has been widely adopted by both industry and government Company adopted the ICS. The Canadian Petroleum Association Task Force on Oil Spill Preparedness trains their members based on incident command system. The Government of British Columbia has adopted ICS as a standard for site management of a large incident within the Incident Command Post.…

    • 108 Words
    • 1 Pages
    Decent Essays
  • Decent Essays

    Mr Ciesielski Case Study

    • 138 Words
    • 1 Pages

    I concur with the employee's self-assessment, Mr. Ciesielski has exceeded the requirements of this critical element. Mr. Ciesielski has provided Subject Matter Expert (SME) support to Government and contractor entities for any items that dealt with Incident Management. Most significantly, he demonstrated a high standard of effective communication and professionalism while contributing to the INC process and CSI review during the IMWG meeting. He is the NETOPS representative for the review of time-specific deliverables, attending meetings and ensuring that final products met technical standards, quality and designated due dates for the project he was assigned. Most notably, he updated the RCA Hand Off SOP, and developed and finalized the…

    • 138 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    They have a critical job, which consist of obtaining valuable intelligence or information for possible attacks or plans of an attacks. The selected best practices, which are described in the order that they may occur in an interrogation, reveal that an effective interrogation requires an individualized, flexible, rapport based, and information-gathering approach. This group is very successful in what they…

    • 592 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    It is important to know and identify when and how the breach occurred in order to accurately determine who was affected in the breach. Once the breach has been validated, the company needs to assign a manager who will handle the incident and have a response team ready in order to mitigate the problem. This team should handle all actions such as legal, IT, finance, risk management, and even media relations (Privacy Technical Assistance Center, 2012). If the authorities or law enforcement needs to be involved in the breach, then the team will determine whether they need to be contacted for further investigation. Once all the necessary information has been recovered, it is to determine whether the parties involved should be notified and what needs to be done in order to accommodate the persons involved, such as free credit report for a year.…

    • 796 Words
    • 4 Pages
    Improved Essays
  • Decent Essays

    It is highly important that we protect critical infrastructures, because they provides us all with essential services and are all vital to the United States. Critical infrastructures are vital to our security, economy, and survival of the nation. The National Response Team, the Bureau of Alcohol, Tobacco, Firearms, and Explosives, the Transportation Security Administration, FEMA, Federal Air Marshal Service, and all levels of the government should be involved in planning the response to the bombing. It is necessary to have all these agencies together in order to better respond to attacks and protect our critical infrastructures.…

    • 224 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Defining Homeland Security Homeland security (HLS) is an expansive enterprise that includes many agencies and departments at all levels of government. As such, it has been defined in many different but similar ways. For example, in their book Understanding Homeland Security, Noftsinger, Newbold, and Wheeler (2007) define homeland security as “a concerted national effort to prevent terrorist attacks within the United States, reduce America’s vulnerability to terrorism, minimize the damage, and recover from attacks that do occur” (pp. 29-30). In its 2010 Quadreannial Homeland Security Review Report, the Department of Homeland Security (DHS) similarly defined HLS as “a concerted national effort to ensure a homeland that is safe, secure, and…

    • 1218 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays