IT

5 pts.
Tags:
Security
Security management
If company A attacks company B, how should the company A address the issue? What is the possible solution?
ASKED: November 3, 2013  9:56 PM
UPDATED: November 7, 2013  4:17 PM

Answer Wiki

Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Discuss This Question: 6  Replies

 
There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when members answer or reply to this question.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • CharlieBrowne

    Please explain what you mean by attack.

    Also give us the business case for this question.

    39,875 pointsBadges:
    report
  • Subhendu Sen
    What OS r u using now! This is important. What kind of apps r already loaded and environment plz  disclose to get proper idea.... however for ur info
    Backdoors /Trojans may install on pc and they allow hackers to gain access this pc. Be careful when using IRC client this is a common way to hack. May password change/ all of a sudden/sometimes network activity can too high that out of normal behavior. Spam being sent/ automatically install some add-ons in browser. The lists r numerous. These r some common signs of computer malfunctioning. These r not solutions. Proper  opinions depend on OS/  type of applications/ environment/ type of users (like simple user / admin) etc.etc r required.
    26,100 pointsBadges:
    report
  • Kevin Beaver
    The best way to respond to a security incident is to use the incident response plan/procedures you've already developed. A template and other recommendations for developing an incident response plan here.
    15,080 pointsBadges:
    report
  • AndreaF
    Sounds like a homework question......?
    7,590 pointsBadges:
    report
  • TomLiotta
    Without specifics, there is no good answer. An attack could be through social media, through financial manipulations, through competitive pressures, or various other means. -- Tom
    125,585 pointsBadges:
    report
  • ToddN2000
    If you are "attacked" it points out flaws in your own security. What was the target of the attack, what files and systems took a hit? It may not be critical data, but shows some vulnerability you need to plug. Depending on the type of attack and it's source you may need to tighten up your network. Was entry point e-mails, flash drives or browser related sites or SQL injection? Recently there was a virus that was spreading to networks via a .ZIP file attachment sent via e-mail. Seeing as e-mails can be spoofed, the proof of who "attacked" may not be valid. Even knowing your sender is not safe. Check it out all email details before you open it. Recently I had an e-mail supposedly sent from my sister. Funny thing was it was sent around 3AM. I know she was sleeping so I did not open it until I talked to her. She did not send it. I found out her PC was sending out bogus, infected e-mails to everyone in her address book. Common sense goes along way in preventing  these kinds of issues.
    6,495 pointsBadges:
    report

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following