Computer security incident response team

Assignment Help Basic Computer Science
Reference no: EM132862980

Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

Consider the following questions for collecting and handling evidence:

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

 Description of information required for items of evidence

 Documentation required in addition to item details (personnel, description of circumstances, and so on)

 Description of measures required to preserve initial evidence integrity

 Description of measures required to preserve ongoing evidence integrity

 Controls necessary to maintain evidence integrity in storage

 Documentation required to demonstrate evidence integrity

Reference no: EM132862980

Questions Cloud

What is broadcast domain and collision domain : What is a broadcast domain and collision domain? Why are these important to networking, and how do they relate to switches and VLANs?
Explain crm framework functions : 1. List nd explain 5 CRM framework functions
What is VLAN : Provide an example of VLSM, make sure to include IP address, subnet mask, number of networks and number of hosts. What is a VLAN?
Describe the Dark Web : Describe the Dark Web. What type of content is generally found on the Darknet?
Computer security incident response team : After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT).
Examining the differences between serial and mass murderers : Examining the differences between serial and mass murderers always has been challenging. One way to distinguish serial murderers from mass murderers
Identify a recent crime that received news coverage : Identify a recent crime that received news coverage and for which there is information about the offender's background and motives.
What is association in data mining : How does data and classifying data impact data mining? What is association in data mining?
Articulate project management outcomes and communicate : Articulate project management outcomes and communicate using a range of media to diverse stakeholders representing differing expectations

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Balanced scorecard to improve efficiency

Evaluate how Apple® could use a balanced scorecard to improve efficiency.

  Sort the array into descending sequence

Call an iterative sum method to sum the values in the array. Print this total and use it to desk check the total developed by the recursive sum method.

  The approaches of the ethical egoist and the utilitarian

How would Kant's approach to this kind of example differ from the approaches of the ethical egoist and the utilitarian?

  Proof of the correctness of construction

Do so by letting M = (Q, {0, 1}, δ, q0, F) be a DFA accepting A and then specifyclearly-via specifying its components, (Q0, {0, 1}, δ0, q00, F0)-an NFA accepting LA. Youdo not have to include a proof of the correctness of your construction, but it..

  Plot also the original data as black circles in both plots

Plot also the original data as black circles in both plots. The titles for the subplots should include the degree of the fitted polynomial. In addition, include appropriate x and y labels for the plots.

  United states affect the market equilibrium rate

How would a recession in the United States affect the market equilibrium rate (dollar price of the Deutsche Mark)

  Estimate the cost of the system

What capabilities beyond the minimum do you need now and so that your computer does not become obsolete, what additional features do you think you will need within the next 2 or 3 years?

  Differences between ntfs disk quotas and fsrm quotas

What are the differences between NTFS disk quotas and FSRM quotas? How do each actually determine usage?

  Elastic-inelastic products

Discuss the 3 types of elasticity with their 3 numbers, and give 2 examples each for elastic & inelastic products.

  Design perspectives used in teradata

What are the different design perspectives used in Teradata?

  What is the inflation rate

a) What is the inflation rate? b) What is the real interest rate. c) What is the money growth rate?

  Draw a decision tree for an algorithm that solves problem

Draw a decision tree for an algorithm that solves the classic version of the problem-that for n = 12 coins in three weighings (with no extra coins being used).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd