Computer security incident response team

Assignment Help Basic Computer Science
Reference no: EM133048789

Scenario

After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT). As a security administrator, you have been assigned the responsibility of developing a CSIRT policy that addresses incident evidence collection and handling. The goal is to ensure all evidence collected during investigations is valid and admissible in court.

1. What are the main concerns when collecting evidence?

2. What precautions are necessary to preserve evidence state?

3. How do you ensure evidence remains in its initial state?

4. What information and procedures are necessary to ensure evidence is admissible in court?

Tasks

Create a policy that ensures all evidence is collected and handled in a secure and efficient manner. Remember, you are writing a policy, not procedures. Focus on the high-level tasks, not the individual steps.

Address the following in your policy:

 Description of information required for items of evidence.

 Documentation required in addition to item details (personnel, description of circumstances, and so on).

 Description of measures required to preserve initial evidence integrity.

 Description of measures required to preserve ongoing evidence integrity.

 Controls necessary to maintain evidence integrity in storage.

 Documentation required to demonstrate evidence integrity.

Reference no: EM133048789

Questions Cloud

Explain the positive aspects of a boxer : Explain the positive aspects of a boxer (i.e. Mike Tyson) using a direct impression management to help portray a desirable public image.
Features of mobile app for amazon and alibaba : What are the companies under Amazon and what are the companies under Alibaba with a brief for each one of them?
What is the overall predetermined factory overhead rate : The following data pertain to operations for the most recent period: Actual hours 3,900 MHs. What is the overall predetermined factory overhead rate
Discuss how does the triple-bottom line concept works : 1. Discuss how does the Triple-Bottom Line (TBL) concept works? 2. How does the TBL affect an organization's sustainability?
Computer security incident response team : After the recent security breach, Always Fresh decided to form a computer security incident response team (CSIRT).
Introduction paragraph and conclusion paragraph : How to write essay introduction paragraph and conclusion paragraph for Christopher Grey (2003) The fetish of change.
Calculate the rate of return and the pay back : Using the information below, calculate the Rate of Return and the Pay Back Period for the investment. After presenting your calculations, explain why you think
Identify two potential exit strategies : Continue to research on your perspective country China and analyze these aspects of this initiative:
Determine the number of equivalent units of production : The Converting Department of Worley Company had 1,000 units in work in process at the beginning of the period, Determine the number of equivalent units

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Keylogging or keyboard capturing

Keystroke logging, often referred to as keylogging or keyboard capturing, is the action of recording (logging) the keys struck on a keyboard,

  Articles on telecommuting and other blue work strategies

Find research articles on telecommuting and other "Blue Work" strategies.

  Briefly describe the threat

Locate an article that describes a recent security threat (or attack) on an e-commerce site. Choose a threat or attack that occurred within the last 10 years. Read the article, and then draft a two-page paper to address each of the following:

  Determining when to develop system in-house

Determining when to develop a system in-house or to purchase a COTS system is not always clear.

  What is an easier way of writing expressions

What is an easier way of writing expressions so that they are not ambiguous?

  Development methodology

If you did not use a development methodology what were the problems you encountered?

  Security systems life cycle

Evaluate the key phases that comprise the security life cycle. Analyze the specific steps that occur in each phase.

  Measure for the market power of quadplex cinema

Is the Lerner index an appropriate measure for the market power of QuadPlex Cinema? Please explain your answer briefly.

  Organization making good investment decisions

Capital budgeting is a complicated process that is essential to organization's making good investment decisions.

  Write pseudocode for the following statements

Write pseudocode for the following statements: The variable N starts with the value 1000. The variable T starts with the value 200. The variable B starts with the value 4.

  Advantages and disadvantages for peer-to-peer

What are some more advantages and disadvantages for peer-to-peer?

  Making micro game using unity

Could you make a microgame using Unity? A microgame like a mini game and easy to play.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd