Reference no: EM132647879
Principles and Policies of Information Assurance
For this assignment, let us delve into an international standard, in particular the ISO/IEC 27002 to answer these case studies. Please use ISO/IEC 27002:2013(E) standard in basing your answers to these case studies.
Case Study I: Fraudulent Digital Certificates
For this case study you are taking a step back in time to evaluate a real event.
1. Who is TURKTRUST?
2. Explain what happened and why this is a potentially dangerous situation.
3. Research this event. Did any other organizations issue advisories?
Case Study II: An Exercise in Cybercrime Incident Response
Day 2 Questions:
1. What do you suspect is happening or has happened?
2. Who (if anyone) external to the organization should be notified?
3. What actions should be taken to contain the incident and minimize the impact?
4. What should be done post-containment?
5. What lessons can be learned from the day's events?
Day 2 Report
It is now 11:00 a.m. An emergency meeting of the Board of Directors has been called for 3:30 p.m. You are tasked with preparing a written report for the Board that includes a synopsis of the incident, detailing the response effort up to the time of the meeting, and recommending a timeline of next steps.
Day 2: Presentation to the Board of Directors 3:30 P.M. (include the below in your report)
1. Present your written report to the Board of Directors.
2. Be prepared to discuss next steps.
3. Be prepared to discuss law enforcement involvement (if applicable).
4. Be prepared to discuss consumer notification obligations (if applicable).
Case Study III: The Role of Social Media in a National Crisis
1. Document how social media was used as an emergency communication tool during the aftermath of the Boston Marathon bombing.
2. Make a recommendation as to whether businesses should use social media as a communications tool during a disaster situation. Be sure to include both pros and cons.
3. Would your answer be different if the assignment were to make a recommendation as to whether colleges and universities should adopt social media for communicating about a disaster? Why or why not?
Case Study IV: Using Log Data to Identify Compromise Indicators
1. Describe what is happening.
2. Is the log information useful? Why or why not?
3. Research the destination IP address (dst) and the protocol/port (proto) used for communication.
4. Can you find any information that substantiates a malware infection and data exfiltration?
5. What would you recommend as next steps?
Attachment:- Principles and Policies of Information.rar