John Peach Case Summary

983 Words4 Pages

15th October 2014
According to the incident that occurred on the 15th of October, John Peach the alert system administrator discovered an unusual high network traffic on one server, investigation brought to light that the bank’s firewall software was recently upgraded and has allowed unauthorized traffic to access a restricted and protected port. The system administrator checks the server and finds the additional files which includes the credit card details of clients and suspects the information systems may have been compromised.
The scenario identified the vulnerabilities within the company’s information systems, network and the administrator. These vulnerabilities were exploited which lead to some potential problems (threats and risks). These vulnerabilities identified includes:
• The upgraded network firewall which granted …show more content…

• Deployment of intrusion detection system (IDS): as cited by Carasik and Shinder (2003), An Intrusion Detection System (IDS) is the high-tech equivalent of a burglar alarm—a burglar alarm configured to monitor access points, hostile activities, and known intruders. Though there was a firewall in the network architecture, but the present of a network intrusion detection device prevents unauthorized traffic to the network hosts.
• Establishing an information security management system (ISMS): According to Iso.org, (2014), An ISMS is a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes and IT systems by applying a risk management process. The ISMS ensures that the security arrangements are fine-tuned to keep pace with changes to the security threats, vulnerabilities and business impacts.
• Set up a policy for information protection and information security incident

More about John Peach Case Summary

Open Document