Lockheed Martin Containment Strategy

784 Words2 Pages

Containment is the most important role to be played in an incident respond. These are the practice of the strategies which gets followed when there is an attack like Distributed Denial of Service Attacks ("Uf it security," 2011). In our Lockheed Martin company, we prepare ourselves for any circumstances so our employees can act upon the situation. Instead of wasting time in what needs to be done now we prepare ourselves for future attacks. The way containment process needs to be followed is to first determine which part of the system contains malware viruses and detecting this issue would be the first task in incident response strategy. The time when that one system is detected then our company will be isolating that specific system to limit …show more content…

The job of NBA is to enhance the security and to determine any unusual actions in the network which could lead to DDos attack. It monitors everything which are causing any rare traffic flow and mark any rare activities on the network. It has the best potential to monitor any change in bandwidth and to find any dangerous website which may have an impact on the network (Beal). It leverages the time of administrator to take care of issues which are detected. In addition, it is always a good idea to have more bandwidth because it gives the users more time to defend their network even if DDos attack is still going to occur but it extends the …show more content…

Network modification is one of the action to be considered when DDoS attack occurs. In this situation incident response team could switch to different network by using domain name system (DNS). IP address are translated through DNS by their domain name and DNS and DNS responsibility is to allow the user to securely browse into any websites. Also, DNS allows to send and receive emails through any web browsers in any website. Incident team should distribute the attack traffic across the network of data center so it will delay the DDoS attack in spreading into other networks. At last, traffic should be sent to high capacity networks so it can go through scrubbing services. Depending on the circumstances of an attack, we will be enabling Virtual Private Network (VPN) which will provide secure network over the internet. It will be beneficial for the company because communications and messages will be encrypted if they are receiving or sending it to the remote users of the company (Henry, A). By controlling the traffic can slow down DDoS attack if unwanted connections are blocked which are not needed on the servers. These are the steps which our company will take to contain the data of our

More about Lockheed Martin Containment Strategy

Open Document