Late one night not long ago, George Corday, SCM’s Senior Manager of Information Systems noticed some heavier than usual traffic moving between three operational sites; Tokyo, Milan, and Tampa. As usual Tom was at his desk when the call came in; some people claimed Tom slept and ate there. Tom answered “Hello, CSO Tom Brown speaking.” George answered: “Hi Tom, have you got a minute? I noticed something odd with our net traffic and wanted you to look at it.” Tom replied with a scripted answer, the first entry in the company incident response plan, “What do you think you saw, where and at what time or times?” George gave Tom the information he had observed. A few hours later Tom called George back to give him the initial report that someone had tapped into their system and was using it to transmit data around the world. The data was embedded in some typical transactions; however, the attacker had placed a worm in the system, which apparently had the potential for causing damage well beyond the company’s system. He suggested to George that they could employ a track and trace procedure to attempt to isolate the attacker. Tom said he wanted to isolate those links in the system to prevent the attacker from launching attacks to other sites or hopefully to prevent the attacker from using their system to launch system attacks on the vendor and supply chain. Tom said he was more concerned over the ability of this worm to infiltrate their government contractors linked via VPN, which may have access to sensitive data and sites. The surprising part of the conversation turned out to be that an SCM laptop was being used to access the network. In this phone call to Tom, George OK’d the use of the track and trace system Tom had created to find the attacker and disable their ability to use SCM’s network. He wanted the identity of who had use of the laptop, and wanted to know if there was any potential for proprietary data being removed from their network of if the network was just being used as a carrier. George also informed him that he would communicate the illegal use of their network to Takio Sumi, CIO, as soon as Tom had removed the attacker’s ability to use their network.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more