Create an incident response plan for the company

Assignment Help Computer Engineering
Reference no: EM132478749

Assignment: 1: Find a company that has suffered a security breach in 2019. Provide background information on the company such as the type of business, their services, public or private, locations, etc. The reader should have a good understanding of the company after reading the bio. Next, provide information on the security breach; the Who, What, When, Where, Why, and How.

2. Create an Incident Response Plan (IRP) for the company. You can use the breach as a foundation if desired. The IRP should be a professionally looking document that is included as an attachment to step 1 (appendix is acceptable).

3. Create a Disaster Recovery Plan (DRP) for the company. Again, you can use the previous breach as a foundation if desired. The DRP should be a professionally looking document that is included as an attachment to step 1 (appendix is acceptable).

The submission needs to be 1 file, coming from your fictitious consulting company. The document you are preparing will be handed to senior executives in the company. It needs to be a minimal of 15 pages total (including the two plans). You need to use a minimal of 5 scholarly resources. Remember, the IRP and DRP need to be something a company would publish internally and implement without changes.

Reference no: EM132478749

Questions Cloud

Formation of unions historically : Can you explain to me what factors precipitated the formation of unions historically?
How different auditing and monitoring techniques are used : Research and discuss how different auditing and monitoring techniques are used to identify & protect the system against network attacks.
Determine which of the would not require disclosure : Determine Which of the would NOT require disclosure within the income statement as it is not a material income or expense? why
Supply and demand curves : For the scenarios discussed below, use supply and demand curves and a graph to analyze what will happen to both price and quantity in equilibrium
Create an incident response plan for the company : Create an Incident Response Plan (IRP) for the company. You can use the breach as a foundation if desired. The IRP should be a professionally looking document.
Identifiable net assets method : On December 31, Year 1, P Company purchased, Identifiable net assets method(parent company extension approach), Fair value entity method.
Demonstrate a connection to your current work environment : Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
What is the direct labor price variance for November : During November, Arrow purchased 160,000 pounds of direct materials at a total cost of $304,000. What is the direct labor price (rate) variance for November
Identify any alternative choices you should have made : For tonight's assignment, you will play the Cybersecurity games listed below. After playing each game, you will need to write a short 200-300 word summary.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describes the behaviour of the checkout system

Design and model two classes: Product and CheckoutRegister. Create an activity chart which describes the behaviour of the checkout system.

  Describe a method for maintaining a favorites list l

Describe a method for maintaining a favorites list L such that every element in L has been accessed at least once in the last n accesses, where n is the size of

  Determine the micro operations for the add instruction

Determine the micro operations for the ADD instruction, for the machine of Problem assuming the memory is big Endien.

  What is the round number when the system becomes idle

Explain why worst-case fair WFQ can have the absolute fairness bound and what is the round number when the system becomes idle? When the system is idle? Justify your answer.

  Write a program that prompts the user to input a sequence

Write a program that prompts the user to input a sequence of words, the program then displays a list of unique words.

  Take a position on the idea of ipv6 being hailed as the

take a position on the idea of ipv6 being hailed as the next generation of the internet. support your response with

  How does this watch work with the iphonehow will this be

nbspnbspnbsp bullhow does this watch work with the iphone?nbspnbspnbsp bullhow can this shape future

  What is a misaligned operand

Design a universal programmable interface that can connect almost any peripheral to a 68000 system-even if the peripheral has unusual timing restrictions.

  Assume that the cross section of each strand

A regional telephone company has 10 million subscribers. Each of their telephones is connected to a central office by a copper twisted pair. The average length of these twisted pairs is 10 km. How much is the copper in the local loops worth.

  How would you restore the system to assuming the backups

Suppose something bad happened on April 26th, 2017. How would you restore the system to 4/26/17 assuming the backups run at night?

  What is average number of comparison for unsuccessful search

If we can assume that the keys in the list have been arranged in order. What is the average number of comparisons for unsuccessful search in this version?

  Describe the name and version of potential security scanner

Discuss the importance of installing an application-based security scanner on a personal workstation. In one paragraph, describe the name and version.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd