Preview

Incident Report

Good Essays
Open Document
Open Document
427 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Incident Report
Incident Report

Report on analyzing network problem for DHS, Nov 14th
Summary
On Nov 13th, I was sent to Helijet, Victoria by Director Darren Hasselhoff for an emergency of the government offices in the Department of Human Service. The emergent problem was assumed as malware-leading hacking and attacking at first and perplexed me yesterday. However, today I figured out that the problem is caused by the factory defect of network cards in their computers and solved it, then I returned right after that.

I recommend that we making choices of installing hardware more carefully.

Background
Yesterday morning DHS reported to us that they detected some extremely high data feeding from the network interface cards on some computer, like being downloading from outside the company, which may deal serious damage to the data security. They also found malwares in their computers. Therefore, Darren Hasselhoff arranged a helicopter to transport me to Helijet for DHS’s problem. I arrived there at about 12:35 AM.

Incident
In the first day I went DHS, Sissy Hofferer, DHS’s network administrator, described the detail of the problem: The Norton Symantec anti-virus and firewall detected two malware and deleted them, and then 13 of their new computers are flagged by security protocol as having incredible large amount of data being downloading. They considered this issue as an assaulting by hackers. When I started scanning, however, I actually found nothing had been downloaded from outside the company’s network, those malware are irrelevant and this firewall are unbroken.
My experience of maintaining told me that the problem is possibly related to the computers themselves, so today I tried to swap network cards between a compromised computer and a secure computer, as I did so, the different results of showing data downloading, swapped too. Then I totally confirmed the problem is about the network cards, solved it and came back to company.

Outcome
Following the incident

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 4 Assignment 2

    • 1005 Words
    • 5 Pages

    Internet use creates the possibility of virus attacks or allowing any unauthorized people to get into our system with the potential of accessing company’s confidential information.…

    • 1005 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    In 2008 Boeing had made all sorts of headlines in the media, due to some new technological developments in their newly designed 787 Dreamliner. These headlines that splashed across websites were initially brought about due to a FAA “special conditions” report. This topic of this report first appeared in Flight International, and then a few days later it gathered momentum in a critical follow up from Wired Magazine. According to Wired (2008), the FAA states “Boeing’s new 787 may be vulnerable to hacker attack”.…

    • 1124 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3230 Final Project

    • 687 Words
    • 2 Pages

    Integrated Distributors Incorporated is facing a lot of challenges. The IT infrastructure has a lot of outdated hardware and software in multiple locations. This greatly increases security risks and exposes confidentiality, integrity, and availability. Some network compromises have ensued due to the outdated hardware and software. Sensitive and strategic information has been leaked to the public and it is time we put an end to this.…

    • 687 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Aircraft Solutions Project

    • 2440 Words
    • 10 Pages

    Marsan, C. D. (2009, June 9). Hidden Threat on Corporate Nets: Misconfigured Gear. Retrieved April 4, 2011, from CIO: http://www.cio.com/article/494522/Hidden_Threat_on_Corporate_Nets_Misconfigured_Gear…

    • 2440 Words
    • 10 Pages
    Best Essays
  • Satisfactory Essays

    The university network was a victim of a DDoS attack. Whereby a cyber criminal first acquired administrator access. We suspect that the attacker gained access to the network from an internal computer, most likely from a student PC in one of the labs. The attacker likely used keylogger software to discover administrator credentials.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 18

    • 425 Words
    • 2 Pages

    Rob calls the help desk to report that he cannot access any websites on the Internet. While he is still on the phone, you have him try to access a file on his departmental server. In both cases, his attempts fail. Troubleshoot Rob’s computer and determine why he is unable to access the network. The troubleshooting process will be completed when you are able to access the network using Rob’s computer.Completion time20 minutes…

    • 425 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Large numbers of packets caught by your router or firewall's egress filters. Recall that egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because that's a clear sign that machines on your network has been compromised. Unscheduled reboots of server machines may sometimes indicate their compromise. You should be already be watching the event logs of your servers for failed logons and other security-related events.…

    • 563 Words
    • 3 Pages
    Good Essays
  • Good Essays

    FXT2 Task2

    • 825 Words
    • 4 Pages

    It was the HR system that accessed the files and they also need to make sure everything has been corrected.…

    • 825 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 2 Lan

    • 272 Words
    • 2 Pages

    Weekly tasks or assignments (Individual or Group Projects) will be due by Monday and late submissions will be assigned a late penalty in accordance with the late penalty policy found in the syllabus. NOTE: All submission posting times are based on midnight Central Time.…

    • 272 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Scenario Three

    • 791 Words
    • 4 Pages

    Question: How do you think this situation could have been prevented? Could the IT department have conducted regular inventories of the software on each computer to identify missing patches? Could the IT department have implemented a process to ensure that no computer is moved outside the boundaries of the firewall?…

    • 791 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    All rights reserved. Page 5 Types of Threats  Malicious software  Device failure  Application failure  Natural disaster  Intrusive cracker NT2580 Introduction to Information Security © ITT Educational Services, Inc.…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Also large numbers of packets caught by your router or firewall's egress filters. Remember that egress filters prevent spoofed packets from leaving your network, so if your filter is catching them you need to identify their source, because that's a clear sign that machines on your network have been compromised. Unscheduled reboots of server machines may sometimes signify that they are compromised as well. You should already be watching the event logs of your servers for failed logons and other security-related events.…

    • 588 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Police Brutality Report

    • 202 Words
    • 1 Page

    The purpose of this paper is to examine the rationale behind police brutality in correlation to social perception of immunity for law enforcement. There have been multiple reports where civilians have stated that they did not get involved in a crime in progress or an incident of police brutality because they feel that the officer will not be punished. This presumption leads to not only a lack of accountability on the part of the officers, as they fear no reprimand, but also on behalf of the bystanders who subsequently facilitate a means for these behaviors to continue. Instead, these bystanders pull out their camera in hopes of attaining 15 minutes of fame. While fear may take precedent over all other reasons for not getting involved, for these…

    • 202 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Lab 4

    • 1087 Words
    • 3 Pages

    a. There was almost a 60% shift from a SMB type attack, towards an HTTP-based attack. In addition, nearly 100% of the observed attacks are automated, botnet, or worm-based attacks.…

    • 1087 Words
    • 3 Pages
    Powerful Essays