Cyberattack: The Maersk Global Supply Chain Harvard Case Solution & Analysis

Cyberattack: The Maersk Global Supply Chain Case Study Solution

Replacement of IT system at Maersk:

The requirement of the replacement of Maersk’s network was important to the unloaded hulk containers i.e. no less than 800 trucks had lined up and were unable to move. However, the management of the shipping orders was difficult to be managed manually. But, the employees demonstrated and supported the organization in the management of its operations.

Recommendations:

Changes in IT Policy:

The management of the system should inspect the system upgrades to ensure the security of data to prevent loss of data. Back-up servers i.e. controller domains to be separated linked with the server node. And, Keep the manual record of the operational services offered to the clients associated with the shipments, orders, and payments to prevent the data loss.

Attack Prevention:

The increase in the adoption and implementation of machine learning has increasedin the domains of cybersecurity to strengthen the monitoring and threat detection of the operating systems in the organization. (Davy Preuveneers, 2018)Despite the encryption of the hard drives, the computer systems were rebooted, the information and the data of Maersk wererecovered through the controller domain sites that had been used by the management of Maersk. (Reyner Aranta Lika, 2018 ) The deployment of the recovery of the information in the operating system regarding the operations and the structures of the organization was done through the use of the internet. This was one of the risk approaches that had been implemented by the Maersk to recover its data. Despite an emergence of such issues, the data of the organization was restored with some loss of the information. After such an event, new systems, servers, and applications were replaced by the management.

Appendices:

Appendix A –Comparison between usual Ransomware attack and NotPetya

Usual Ransomware NotPetya
·         True Ransomware program

·         Requires payment of decryption code

·         Renames the files and documents to ensure the victim about the harm

·         Not true Ransomware program

·         Often requires payment for decryption code

·         Permanently destroys the system

.............................

This is just a sample partical work. Please place the order on the website to get your own originally done case solution.

Share This

SALE SALE

Save Up To

30%

IN ONLINE CASE STUDY

FOR FREE CASES AND PROJECTS INCLUDING EXCITING DEALS PLEASE REGISTER YOURSELF !!

Register now and save up to 30%.