Computer security incident response team

Assignment Help Basic Computer Science
Reference no: EM132715406

Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court. 

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks 

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

? Description of information required for items of evidence

? Documentation required in addition to item details (personnel, description of circumstances, and so on)

? Description of measures required to preserve initial evidence integrity

? Description of measures required to preserve ongoing evidence integrity

? Controls necessary to maintain evidence integrity in storage

? Documentation required to demonstrate evidence integrity

Reference no: EM132715406

Questions Cloud

General divisions of canadian banks : What are the general divisions (department) of Canadian banks? Show details
Memory forensics is important form of cyber investigation : Memory forensics is an important form of cyber investigation that allows a digital investigator to identify unauthorized and unusual activity on a computer
What is Staples Inc asset turnover and profit margin : Suppose it had net income of $721 million and sales of $24,002 million in 2017. What is Staples Inc asset turnover and profit margin
Form cost of preferred stock financing-nature food inc : Nature Food Inc. needs to estimate the cost of financing on preferred stock. The firm has preferred stock outstanding that pays a constant dividend
Computer security incident response team : After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT).
Differences carrying amount and tax bases of company assets : Swiftsure Ltd has carried forward a deferred tax liability of 170000, arising from differences between carrying amount and tax bases of the company's assets.
What is his realized percentage return : Suppose an investor bought the bond on Oct 1, 2018 and sold the bond on Oct 1, 2019. What is his realized percentage return? and Explain the result
Compute probability index of projects : Maslow's restaurant is considering two mutually exclusive projects with the following cash flow streams.
Significance of formulating adequate policies : Discuss the significance of formulating adequate policies and procedures in an organization

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Section-cost and measurement analysis

Identify two non-current assets and comment on how Yahoo values these two assets in the balance sheet. Does the Yahoo have other alternatives as to how they could value the two assets?

  How to convert power to decimal

How to convert 82 to the 16th power to decimal

  Layers of security controls placed throughout it system

Defense-in-Depth, an IA concept refers to multiple layers of security controls placed throughout an IT system.

  Is it possible for an unbounded optimization problem

Is it possible for an unbounded optimization problem to have a bounded feasible region?

  Project manager not managing the project properly

They feel the focus should be for everyone to just get down to doing the work and that no training or other intervention is required.

  The organization suffering financial losses

Describe the impact of the problem. In other words, is the organization suffering financial losses? Discuss the gaps that you will need to bridge.

  Policy analysis-systems modeling and simulation models

Discussed many concepts to help with policy making such as Policy Modeling, Policy Analysis, Systems Modeling, Simulation Models, and Stakeholder Engagement.

  Discuss how server virtualization

From the e-Activity, discuss how server virtualization, architecture, and Hyper-V can create advantages and efficiencies for an enterprise, including considerations for how to decide what an enterprise should factor in when calculating Return on Inve..

  Typical application structure in windows azure

What type of communication is used to exchange data between application components and why? (Cloud computing)

  Propose a new information system

The CEO and CIO in your company wants to propose a new information system that may have a strategic impact on the business. They believe that by gathering data on competitors' customers, the business will gain a significant competitive advantage. ..

  Directory search using a binary search tree

Implement the same telephone directory search using a Binary Search Tree.You can use existing Java code (or libraries) to model the BST, however, your program should be customized to use the BST structure appropriately.Demonstrate that your progra..

  Explaining why the process needs to be undertaken

Explaining why the process needs to be undertaken. Providing details regarding the information gathering process. How your employees themselves should be involved in the process, both during and AFTER the information is gathered.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd