CCE 3070: Network Management - Disaster Recovery and Risk Assessment

Verified

Added on  2023/04/11

|6
|297
|438
Report
AI Summary
This report provides a disaster recovery plan for network management, addressing potential threats like ransomware. It outlines steps for data backup, recovery, and system protection, including the importance of regular system scans, software updates, and user training. The report details how to respond to a ransomware attack, including immediate actions, identifying the compromise, assessing the loss, and deciding whether to pay the ransom. It emphasizes the need to check shared resources, identify key data for restoration, and evaluate the recovery process. The report also references several sources that support the strategies and recommendations provided. Desklib offers this report to students as a resource for understanding and implementing effective network security measures.
Document Page
CCE 3070 Network
Management: Design
and Support
A disaster recovery plan: Ransomware
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
We have locked you out of access
to all of your company’s systems
files and other data. To have access
restored, please deposit $50,000 in
the following bitcoin account.”
RANSOMWARE
Document Page
How does it spread?
[1]Keep-it-safe ransomware recovery report
Document Page
How to defend? [2]
A comprehensive plan for data backup and recovery and the
backup of the data id to be implemented.
The attached networked devices need to be regularly scanned
and being tested periodically.
All the software and the installed operating system onto the
device must be kept updated.
Isolate infected devices quickly
Filter for .exe attachments in e-mail
Disable files running from App-data folders
Disable remote desktop protocol
The staff must be properly trained and tested for readiness to
any attack.
[2] Fisch, White, G.B., Pooch and E.A. 2017. “Computer system and network security”. CRC press.
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
How to recover?
1. Shut down your users and prevent the intruder immediately.
2. Check the cross-contamination
3. Identify the compromise
4. Calculate the loss
5. Decide whether to pay or not the ransom amount
6. Check all the shared resources
7. List the key data to be restored
8. Check the back-ups
9. Recovery process to be evaluated
[1] Keep-it-safe ransomware recovery report
Document Page
References
[1] Keep-it-safe ransomware recovery report
[2] Johansson, K.H., H. Amin and Sandberg, 2015. “Cyber-physical security in
networked control systems: An introduction to the issue”. IEEE Control Systems
Magazine, 35(1), pp.20-23.
[3] Fisch, White, G.B., Pooch and E.A. 2017. Computer system and network security”.
CRC press.
[4] Chris Preimesberger.2017.“Ransomware Recovery Report 101”.e-week.com
[5] Aghababaei-Barzegar, R., Cheriet, M. and A. Shameli-Sendi.2016. “Taxonomy of
information security risk assessment (ISRA)”. Computers & security, 57, pp.14-30.
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]