You are on page 1of 5

Wayne Enterprises

Date: September 18, 2017

TO: Bruce Wayne

FROM: Bibek Chhetri

SUBJECT: Report on Cyberattack to our Internal Security Systems.

Introduction

As we have built our company with the mission and value all our employees safety as an
utmost priority and we assure everyone about the seriousness to take responsibility in any kinds
of unfortunate events or occurrences. This Report is documented after an investigation done by
our Tele-Security officers to notify you a serious incident that has been detected as a cyber-
attack on Wayne Biotech Labs security system. After counterattacks to this occurrence, we
could gain control back of our systems and there is no sign of any kinds of cyber threat as we are
thoroughly monitoring all the running systems of Wayne Enterprises.

Details and brief narratives of the incident

On September 19, 2017 at 3:15 pm, we received the counterfeit proposal email to our
official Wayne enterprises email regarding the recent partnership agreement that we have
accepted with the S.T.A.R Labs last week. During that shift of operations, a monitoring of email
was given to our recent intern of our IT department, Mr. Ron, who happens to be unaware of the
filtrations procedures of our internet security; nevertheless, he opened two of the attachments of
that email. Upon downloading that attachments, the computer got infected with three different
unknown viruses and worms targeting our security networks and access to our blue prints of new
weapon BatBombs. After an hour of attack at 4:15 pm, the infected computer WL4
transferred its files to the main frame network WN1 which become the passage for viruses and
worms. It crashed the networking system of the Wayne BioLab and the Weaponry Labs system
targeting to gain access. We were unware of the fact due to the mocking or Zombies computer
to our system, but still none of our confidential information was affected at the time. Upon
configuring our system every hour at 5:15 pm, our Informational Technology Expertise
experiences the unusual activity and proved the extra layer of security wall and secure all the
files into secretly coded files to avoid spreading it other networks. In the meantime, there are not
any threats and risks to any of our networking system.

Challenges of the Situation

This recent outbreak of cyberattacks has caused the threat to our confidential information
and risked the security access to an unknown source. Out of many challenges, the first challenge
was to identify the computer source of the virus and worms. It was very hard to locate the virus
existence in the host computer since it did not leave any traces and route was unknown to our
system which transferred the malicious email or any kind of medium. It was possible to do this
because this kind of virus was self-replicating from one file to another. Due to the vanishing
digital footprint, we were challenged to understand the targeted file its looking to execute its
code.

Additionally, on the other side, the worms were self-sustaining running program on the
operating system of the network. It has become very vulnerable to our system, so using fire walls
for which we created WayneWall, collectively for all our noninfected computer networks
prevent the widespread as priority. Malicious hacker has hijacked our computer system as
proxies gave them an opportunity to modify the information which made us unaware of the its
target. Following that, the actual difficult challenge our engineers faced was to find its attribution
or location where the virus was generated. Since, the attacker changed the source field and able
to misdirect our systems attacks. Consequently, to create complications hackers used the method
of spear phishing to installed malware for an attack to our system.

Possible Solutions

In response to this Cyber intrusions, for an immediate action, the Wayne Technological
Safety Team has implemented only the safe mode computer applications running to investigate
our all networks. For that purpose, the team has begun conducting all the computer to scanned
through newly designed anti-virus and malware software test, filter all the data from the past to
existing to eliminate any new unidentified files, and securely reformed all the access to the
networking system and only few officials are allowed with override directly from the department
head to ensure that all networks are in control and supervision. Besides an immediate action, our
team has laid out possible solutions that will help us to prevent the cybercrime before any attacks
which gives us crucial advantage in defending are as follows:

We are working actively to make our recently developed antivirus system WayneWall
even more sophisticated to prevent the further attacks.
In our immediate conference with the Department of Homeland Security, The U.S. Secret
Service has extended help to our companies in defending the cybercrime and attacks with
the partnerships with Cyber Crime Center (C3).
A recent proposal of building the new unnamed Cyber Security System has been
approved by our IT professionals in regarding the replacing the affected ones to be able
to backup all our files securely.
More business security framework has been implemented to give solid control over in
any events of attacks in collaborations with IT security industry, ICT industry and
National Security Experts.
Along with all programmatic and technical solutions, some basic safe cyber use habits
can prevent big cyber-attacks effectively, such as:
Protect your computers by regularly checking on installed antivirus programs,
installed firewalls, upgrading the operating systems, back-up information
regularly, install intrusion detection, and restrict access to the sensitive
information for solid security.
Maintain good and known relationship with people around you who are likely to
be around on your workstations.
Be extremely cautious about the email attachments and weblinks which you are
not expecting at all.
Keep your work and personal devices separate to be secure neither of them harm
one another inevitably.
Always make sure to run the Safe Scanner machine for any additional devices or
software before connecting to the personal or business computer at workstations
or networks.
Be always conscious and aware of Cyber Security
Cost Analysis of Solutions

The cybercrime does not only possess threats to our confidential information, but also it
comes with the enormous amount of financial cost to the company. This report illustrates not
only the financial cost of the cybercrime, but calculates all the factors which contributes to the
total cost of the attacks. It includes both organizational and technological cost in defending and
preventing against cyberattack. In our recent collaboration with U.S Secret Service and Cyber
Crime Center with our own Crime Defense System, the analysis of the cost is shown in the table
below.

Cyber Crime effects Cost per Percent


employee cost
Productivity Loss $ 1,819, 923 48%
Cost to contain credential compromises $ 81,920 2%
Cost to contain malware $208,174 6%
New Firewall and Security Software $338,098 9%
Defending the recent Spear phishing $1,020,705 27%
attacks.
Risk of Data breach $300,000 8%
Total Cost $3,768,820 100%

Recommendations with conclusions

After analyzing all the situations, challenges, its solutions, and cost analysis, this
outbreak has vitally changed the internet security protocol and its management systems. As
recommended by our IT professionals, an immediate action has been very successful to defend
this unknown cyber-attack, but as for assurance and future security all the possible actions have
been proposed and approved by our Board of Directors. Additionally, the U.S Department of
homeland Securitys approval for the use of our WayneWall is the best recommended defense
for global internet security. We will be highly appreciating for any kinds of further suggestions
and comments to our actions and make the solid cyber protection for the safeguard our valuable
information and credentials and avoid such huge cost to our company.
References

https://www.csoonline.com/article/2989302/cyber-attacks-espionage/average-business-
spends-15-million-battling-cybercrime.html
https://www.csoonline.com/article/2975807/cyber-attacks-espionage/phishing-is-a-37-
million-annual-cost-for-average-large-company.html
https://www.dhs.gov/topic/combating-cyber-crime
http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.7621r1.pdf
http://www.global-economic-symposium.org/knowledgebase/the-global-
polity/cybercrime-cybersecurity-and-the-future-of-the-internet/proposals/dealing-with-
cyber-crime-2013-challenges-and-solutions

You might also like