ChiefFrogPerson805 Summary of the case Stakeholders involved directly &…Summary of the caseStakeholders involved directly & in-directly with the case3 Main problems or concerns of the caseHow the organization has reacted or planned to avoid the issue?How does it relate to data analysisWhat could have been done better to avoid those issues?Recommendations / Suggestions & strategies with valid referencesConclusions with a complete reference listTOPIC: CYBER ATTACK AT THE UNIVERSITY OF CALGARY Image transcription textIVEy Publishing UNIVERSITY OF CALGARY HASKAYNESCHOOL OF BUSINESS W21012 CYBER ATTACK AT THEUNIVERSITY OF CALGARY Naor Cohen and Catherin… Show more… Show moreImage transcription textAusten was the associate director, infrastructure operation andsustainment at the University of Calgary {U of C), and his portfolioincluded the operations centre, which, as the nerve ce… Show more… Show moreImage transcription textThere were six types of post-secondary institutions in Canada:comprehensive academic and research universities,comprehensive community colleges, independent aca… Show more… Show moreImage transcription textEMERGENCY RESPONSE TEAM RESPONSE TOENFRASTRUCTURE FAILURES Austen had started his career oncampus in 1989, running the microcomputer store. His… Show more… Show moreImage transcription textwas called around 4:30 am. As the duty director for the ERT,Heggerud’s role was to take responsibility for the IT staff duringany emergency and to safeguard the incident comman… Show more… Show moreImage transcription textSince the propagation method was unknown, Austen risked hisprofessional reputation and recommended disconnecting thenetwork to prevent further spreading of the virus. As … Show more… Show moreImage transcription textwere encrypted, and email had come to a grinding halt. More than9,000 email addresses had bee-n lost, which made communicationon campus a true challenge. The immediate solution w… Show more… Show moreImage transcription textLuckily, the U of C website landing page was still operational, andthe university had a Twitter account, allowing for someinformation sharing. As the days went by, speci?c com… Show more… Show moreImage transcription textplace for specialized services such as the team from theconsulting ?rm, the breach coach, and a public relations agency.This had been challenging because the university had … Show more… Show moreImage transcription textNotoriously sophisticated, SamSam used operating systemfeatures to compromise its victims” networks. This malwareexploited vulnerabilities in the systems to penetrate n… Show more… Show moreImage transcription textThe attackers provided instructions on how and where to buybitcoin in their ransom notes. Victims could con?rm payments andreceive decryption instructions via a payment site hos… Show more… Show moreImage transcription textEXHIBIT 1: UNIVERSITY OF CALGARY ORGANIZATIONALCHARTS VP University VP VP Finance & VP ResearchProvost Relations Development Services SLT AVPs AV… Show more… Show moreImage transcription textEXHIBIT 2: UNIVERSITY OF CALGARY RANSOMWARE ATTACKTIMELINE Friday May 27, 2016 IT operations noticed suspiciousactivity on university servers. 1:00 a.m.: Kevan Austen … Show more… Show moreImage transcription textEXHIBIT 4: UNIVERSITY OF CALGARY-IT CAPITAL BUDGETFOR 2016-2017 Information Funding Request TechnologyDescription Areas of Focus Focus Areas CAS millions) … Show more… Show moreImage transcription textEXHIBIT 5: PERCENTAGE OF SAMSAM VICTIMS GOINGPUBLIC, BY SECTOR 100% 78% or P 38% 0% EducationHealthcare Government Private Sector urce: Adapted … Show more… Show more BusinessBusiness – Other