Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Introduction
The Sequential Label and Supply Company (often referred to as SLS) is a . national supplier of stock labels as well as a manufacturer of custom labels and distributor of supplies often used in conjunction with labels, such as envelopes, adhesive tape, mailing cartons, and related office supplies. The company was founded by Fred Chin in 1992 and has grown steadily in the intervening years.
As the case study begins, the company has recognized its growing dependence on information technology and has organized its information technology group as shown in Figure D-1. (FOUND ON LAST PAGE) Trouble It started out like any other day for Amy Windahl at Sequential Label and Supply Company. She liked her technical support job at the help desk.
Taking calls and helping the office workers with PC problems was not gla-morous, but it was challenging and paid pretty well. Some of her friends worked at bigger companies, some at higher-tech companies, but everyone kept up with each other, and they all agreed that technology jobs were a good way to pay the bills.
The phone rang. This was not a big deal for Amy. She answered her phone about 35 times an hour, 315 times a day, nine days every two weeks.
The first call of the day started out the same as usual, with a worried user hoping Amy could help him out of a jam. The call display on her screen gave her all the facts: the user's name, his phone number, the department in which he worked, where his office was on the company campus, and a list of all the calls he'd made in the past.
"Hi, Bob," she said. "Did you get that document formatting problem squared away after our last call?"

"Sure did, Amy. Hope we can figure out what's going on today."
"We'll try, Bob. Tell me about it."
"Well, my PC is acting weird," Bob said. "When I go to the screen that has my e-rnail program running, it doesn't respond to the mouse or the keyboard."
"Did you try a reboot yet, Bob?"
"Sure did. But the window wouldn't close, and I had to turn it off. Once it finished the reboot, and I opened the e-rnail program.Tt's just like it was before-no response at all. The other stuff is working OK, but really, really slowly. Even my Internet browser is sluggish."
"OK, Bob. We've tried the usual stuff we can do over the phone. Let me open a case, and I'll dispatch a tech over as soon as possible."
Amy looked up at the LED tally board on the wall at the end of the room.
She saw that there were only two technicians dispatched to desks ide support at the moment, and since it was the day shift, there were four available.
"Shouldn't be long at all, Bob."
She clicked off the line from Bob and typed her notes into ISIS, the com-pany's Information Status and Issues System. She assigned the newly gener-ated case to the deskside dispatch queue, knowing the roving desks ide team would be paged with the details and would attend to Bob's problem in just a few minutes.
A moment later, Amy looked up to see Charles Moody walking briskly down the hall. Charlie was the senior manager of the server administration team. He was being trailed by three of his senior technicians as he made a beeline from his office to the door of the server room where the company servers were kept in a controlled environment. They all looked worried.
Just then, Amy's screen beeped to alert her of a new e-mail. She glanced down. It beeped again-and again. It started beeping constantly. She clicked on the envelope icon, and after a short delay, the mail window opened. She had 47 new e-rnails in her inbox. She opened one from Davey Martinez, an acquaintance from the Accounting Department. The subject line said, "Wait till you see this." The message body read, "Look what this has to say about our managers' salaries ... " There was an icon for a file attachment that Amy did not recognize. But, she knew Davey, he often sent her interesting and funny e-rnails. She clicked on the icon.
Her PC showed the hourglass pointer icon for a second and then resumed showing its normal pointer. Nothing happened. She clicked on
the icon for the next e-mail message. Nothing happened. Her phone rang again. She clicked on the ISIS icon on her computer desktop to activate the call management software, and activated her headset. "Hello, Tech Sup-port, how can I help you?" She couldn't greet the caller by name because ISIS had not yet opened the screen on her Pc.
"Hello, this is Erin Williams in Receiving."
Amy glanced down at her screen. Still no ISIS. She glanced up to the tally board and was surprised to see the inbound call counter tallying up waiting calls like digits on a stopwatch. Amy had never seen so many calls come in at one time.
"Hi, Erin," Amy said. "What's up?"
"Nothing," Erin answered. "That's the problem." The rest of the call was an exact replay of Bob's earlier call, except Amy couldn't type the notes into ISIS and had to jot them down on a legal pad. She also couldn't dis-patch the deskside support team either. She looked at the tally board. It had gone dark. No numbers at all.
Then she saw Charlie running down the hall from the server room. He didn't look worried anymore. He looked frantic.
Amy picked up the phone. She wanted to check with her supervisor about what to do now. There was no dial tone.
The next day at SLS found everyone in technical support busy restoring computer systems to their former state and installing new virus and worm control software. Amy found herself learning how to install desktop com-puter operating systems and applications as SLS made a heroic effort to recover from the previous day's attack.
1. Do you think this event was caused by an insider or outsider? Why do you think this?
2. Other than installing virus and worm control software, what can SLS do to be ready for the next incident?
3. Do you think this attack was the result of a virus, or a worm? Why do you think this?

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9114447

Have any Question?


Related Questions in Computer Network & Security

Question calculate the total time required to transfer a

Question: Calculate the total time required to transfer a 1.5-MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 KB data, and an initial 2 × RTT of "handshaking" before data is sent: (a) The ban ...

About rsa please answer the following questionsa suppose

About RSA, please answer the following questions. (a) Suppose p=11 and q=7. What is ? (n), where n=p?q? (b) If the public key e is 11, find the private key d. (c) If the ciphertext is 4, what is the plaintext? (d) For en ...

In a short paragraph explain the transmission of data for a

In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one packet. Assum ...

Assignment descriptionproject scope a typical network

Assignment Description Project Scope: A typical network layout diagram of a firm is given below for illustrative purposes only. The service requirements are enclosed. Figure. Network layout of a firm Service requirements ...

If a firms total cost function is given byt c

If a firm's total cost function is given byT C= 115,000Q-500Q2+Q3, what range of output does the firm have economies of scale?

Question do some research and find a case of cyber

Question : Do some research and find a case of cyber harassment or cyberbullying. Explain the case, and discuss the relevant theories of criminal justice associated with the perpetrator(s). Your response should be a mini ...

There are standards in network communication through which

There are standards in network communication through which data is transferred from one system to another. Discuss why these standards are important. Do you think it would be easier to purchase different equipment and so ...

A run in a setting is a substring of length at least two as

A run in a setting is a substring of length at least two, as long as possible, and consisting entirely of the same symbol. For instance, the string abbbaab contains a run of b's of length three and a run of a's of length ...

Objectivesthis assessment item relates to the unit learning

Objective(s) This assessment item relates to the unit learning outcomes as in the unit descriptors. This checks your understanding about configuring and troubleshooting medium-size networks. PART-1 IP Addressing: 1. Subn ...

Security challenges in emerging networksassignment

Security Challenges in Emerging Networks Assignment Description The purpose of this assignment is to develop skills to independently think of innovation. In this assignment students will first learn how to develop knowle ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As