Respuesta :
Answer:
In the explanation section, the further description of the problem is defined.
Explanation:
(1) According to the above paragraph, this isn't obvious what kind of assault it would be, It could be an attacker or maybe an outsider assault that has contributed to the re-installation and restore of the applications.
(2) Apart from just downloading the SLS malware configuration tool, the records also should be thoroughly checked as well as the server and devices monitored and the new virus, ransomware defenses enabled, and also the authentication method should be followed to avoid such future attacks.
(3) Sure, this intrusion may have been due to malware that infected the documents as well as the network.
It could also be attributed to data theft, due to which networks have not responded as a consequence from which the devices have been reinstated.
So, it's the right answer.
I would say that the attack was caused by an outsider because everyone in technical support were affected.
What is information security?
Information security can be defined as a preventive practice which is used to protect an information system (IS) that use, store or transmit information, from potential theft, attack, damage, or unauthorized access, especially through the use of a body of technology, frameworks, processes and network engineers.
Based on the scenario, I would say that the attack was caused by an outsider because more often than not cyber attacks are mainly orchestrated by external actors (hackers).
Aside installing virus and worm control software, SLS can prepare for the next incident by adopting the principle of least privilege and use an intrusion prevention system (IPS).
In conclusion, I strongly think the attack was the result of a worm because it seems the threat spread from a standalone malware computer program to other workstations.
Read more on information security here: https://brainly.com/question/14286078