Creation of incident timelines and investigatory scope

Assignment Help Computer Engineering
Reference no: EM132017663

Question: The LMJ-Ad corporate management has been informed by the network administrative team there was a malware/ransomware attack and infection overnight requiring the incident response team to take immediate action. The infection came from a malware attachment on a phishing email, and was reported by a user with a priority trouble ticket. Initial interviews suggest the incident may have come from an internal employee.

• In this first phase of the incident response process the incident response team must perform an incident review. Describe in detail each item below as part of the initial investigative process only to be applied to this incident:

Step 1: Review of notes taken from user interviews

Step 2: Performing risk assessments

Step 3: Creating data collection checklists

Step 4: Creation of incident timelines and investigatory scope.

Step 5: Drafting of the forensics incident response plan

As part of your descriptions, provide the specific tasks that you need to perform for steps 1 through 5. In later Units we will discuss in detail the specific investigative approach to identify, collect, preserve, analyze, and report on the incident.

Prepare a 5-6 page Word document that is APA formatted. Be sure to include all necessary aspects.

Please submit your assignment.

For assistance with your assignment, please use your text, Web resources, and all course materials.

Reference no: EM132017663

Questions Cloud

Identify what the class in question represents : Create one (1) original example of a class with at least one (1) attribute and one (1) method. Identify what the class in question represents.
Enough funds for retirement goals : How much must he save this year in order to have enough funds for his retirement goals?
Discuss the use of seismic imaging technology : Do some Internet research on Chevron's use of seismic imaging technology. Briefly explain how it works and how it has helped Chevron discover new oil.
Constructing a workable methodology : You will need to describe the overall process and the main elements i.e. the main stages or phases, the main techniques and when they would be used
Creation of incident timelines and investigatory scope : In this first phase of the incident response process the incident response team must perform an incident review. Describe in detail each item below as part.
How you do or could use operations security : Describe how you do or could use operations security in your current job. If you are currently unemployed or in a job in which you are not able to apply.
List the main ideas and sections of your paper : List the main ideas and sections of your paper and the pages on which they are located. The illustrations should be included separately.
Discuss the cia triad : Discuss the CIA triad? What does it stand for? How does it fit in within cryptography? The response must be typed, single spaced.
Why taking over the responsibility for accounts payable : Describe and explain the pros and cons of subcontracting logistics for a building or moving enterprise.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain how migration files help a developer manage database

Describe briefly an MVC application. Explain how migration files help a developer manage a database.

  Discuss about the general sampling

Write a report addressed to Mason & Jarr stating whether they did or did not observe the essential elements of auditing standards in each case.

  Write a for loop to print all elements in course grades

Write a for loop to print all elements in courseGrades, following each element with a space (including the last). Print forwards, then backwards.

  Is a shift toward dna based identifications a good idea

What are some of the benefits and limitations of using DNA to identify victims of mass causalities. When answering take into account available resources, types of attacks, evidence collection and preservation, etc.

  Reconfigurable computing

Implement the Boolean function given below using minimum number of function generators (F, G) of XC2000. Draw the K-maps for the function and write the expression.

  Describe the real-world system and the architectural style

Describe the real-world system and the architectural style. Justify why this architectural style is well-suited for the selected real-world system.

  Suggest a method for consolidating core network services

Suggest a method for consolidating Core Network services. Provide a plan for integrating both AD forests eliminating duplication of service wherever possible.

  Create a flowchart of the preliminary investigation overview

Create a flowchart of the Preliminary Investigation Overview, should be used along the decision lines

  Explain what are the benefits and possible challenges

Explain what are the benefits and possible challenges of emulating/simulating microcontroller board applications. You can also cite references about this

  Use the construction from class to give a diagram

Give a nondeterministic Turing machine which recognizes the language of binary strings of integers nsuch that n is a product of integers x and y both of which are greater than 1. You can give a high level description of your NTM.

  Make a stacked bar chart that shows the total cost

Make a stacked bar chart that shows the total cost, including the design, implementation, and maintenance costs over an expected system life of seven years.

  Develop a simplified P2P file sharing system

In this part, you are to develop a simplified P2P file sharing system. The assumptions on the system are specified as follows

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd