DOC PREVIEW
NU MSIT 458 - Hacked

This preview shows page 1-2 out of 6 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 6 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Slide 1Who Are We?And Then…Legal Recourse?Tech Issues?Business ImpactYou’ve been hacked, now what?by Wild Wild WestEngineering firm that makes speakers.Startup, new game changing product with Twatter technology.40 PeopleEstimated that we’re all gonna be billionairesSecurity?Who Are We?And Then…We got hacked.Seemingly innocuous spam server.Ghost user accountsAll of our servers accessibleLegal Recourse?Local law enforcementState/Federal Law EnforcementCivil/Criminal legal actionTech Issues?How do we fix our hacked network?Patch our servers?Check our logs?Restore from backup?Which servers are compromised?Business ImpactFirst to market advantage at riskLoss of R&D investmentNegative publicity / brand equityDisgruntled angel


View Full Document

NU MSIT 458 - Hacked

Documents in this Course
Snort

Snort

25 pages

Hacked

Hacked

23 pages

Firewalls

Firewalls

52 pages

Load more
Download Hacked
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Hacked and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Hacked 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?