Application-incident response

Assignment Help Basic Computer Science
Reference no: EM131626781

Application: Incident Response

Even with the best security system, an organization's information systems are never fully safe from outside attacks or malicious activities from insiders. As a result, an organization must be prepared to take curative measures when an incident occurs. As a security professional, you should have knowledge and expertise in incident response and should be able to explain the necessity of incident response systems to the higher management.

For this Assignment, select an arbitrary organization. You may choose one with which you are familiar, but you do not need to disclose its identity. Assume you are the IT security manager. You frequently find traffic to and from suspicious websites which could indicate malware, a configuration problem, or misuse. You think that, as a starting point, having an incident response plan in place would be beneficial. You decide to submit a proposal to your CEO.

Based on your readings and through additional research develop a 4- to 6 page letter to the CEO. Use this as an outline for your proposal:

Begin your proposal by briefly describing the organization and its nature of functions. Again, if it is one with which you are familiar, you do not need to identify it.

Your proposal should include the following sections:

  1. Incident Response Plan Details:
  2. Explain the benefits of an incident response plan.
  3. Identify and explain with reasonable details the steps to isolate, respond, and recover after an attack (incident) is discovered.
  4. Identify the teams that should be involved in the incident response process. Explain their roles.
  5. Incident Communication Requirements:
  6. Identify and explain the type of communication and reporting to different internal stakeholders that will be necessary after you have discovered an attack.
  7. What are the legal, ethical, and other considerations if personal customer data has been stolen?
  8. Considering the breach laws in your home country, at which point would you disclose such a breach to law enforcement and communicate with customers?

Reference no: EM131626781

Questions Cloud

Four key components-processes : Discuss why system analysis and design is important by explaining at least four key components/processes.
Describe the potential implications for calculus : Describe the potential implications for Calculus if they were continue to operate without change
List activities carried out by a data processing system : List activities carried out by a data processing system Define data communication and state at least two characteristics of an effective data communication.
What was the purpose of the wagner act of 1935 : What is a yellow dog contract as described in the Norris-LaGuardia Act of 1932? What was the purpose of the Wagner act of 1935?
Application-incident response : Even with the best security system, an organization's information systems are never fully safe from outside attacks or malicious activities from insiders.
Explain the discrepancy in pay among the current employees : Explain how you will ensure that new hires will be paid equitably both internally and externally.
Provide an appropriate amount of background information : Provide an appropriate amount of background information for the audience given the type of communication. Build your position as an expert or trusted colleague.
Password and interception attacks : The subject is password and interception attacks. describe the various classes of password attacks, including brute-force and dictionary attacks.
Device perform multiple defense functions : Can one "black box" device perform multiple defense functions as well as multiple devices that are programmed to run a single function? Justify your response.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Unit integration and system testing

Create a testing plan that includes unit integration and system testing. Ensure the criteria is carefully documented. Explain the installation process and include guidelines for all concerned.

  In the style li b {color: blue}, b is the ____ element.

In the style li b {color: blue}, b is the ____ element.

  Different kinds of productivity software in the cloud

Write a comparison paper of the different kinds of productivity software in the cloud, their features and functionality. (iWork/Office 365/Googleapps/Dropbox)

  Explain in detail what the switches know

Do switches know the entire data link path between the sending and receiving host, explain in detail what the switches know?

  Business intelligence and data warehouses

Business Intelligence and Data Warehouses

  Program you must expose the data member

To expose a data member to a program you must expose the data member to which section of the class?

  Large volume of works of art

An art museum owns a large volume of works of art. Each work of art is described by an item code (identifier), title, type, and size; size is further composed of height, width, and weight. A work of art is developed by an artist, but the artist fo..

  Create to start this assignment

We will be working on only the GUI for the calculator this week. There will not be any code to make the calculator calculate. What classes will we need to create to start this assignment?

  Compare time complexity-convolution using direct convolution

Compare time complexity of convolution with n x n kernel when using: direct convolution with 2-D mask, and separable kernel.

  Examination with straightforward decision making

An out-of-town patient presents to a walk-in clinic to have a prescription refilled for a nonsteroidal anti-inflammatory drug. The physician performs a problem-focused history and physical examination with straightforward decision making. Report c..

  Interest on the original principal

If you deposit $10,000 into a retirement account earning 8% annually, how much total interest have you earned after 20 years

  Generate a length-20 hann window

Compute and plot the DFT of x[n] using 20 samples (0 ≤ n ≤ 19). From the plot, can the two non-dc exponentials be identified? Given the amplitude relation between the two, the lower-frequency peak should be twice as large as the higher-frequency p..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd