Describe procedures sharing information with outside parties

Assignment Help Computer Engineering
Reference no: EM133547640

Assignment: Computer Science- Incident Response Plan

Background:

You were just hired as the new chief information security officer for Multiple Unite Security Assurance (MUSA) Corporation whose security posture is low. The first thing your chief executive officer tells you is that they have recently seen a presentation by one of the information security team members emphasizing the importance of having a security awareness program. As a result, you have been asked to develop a security awareness program for MUSA Corporation based on the following 10 security gaps:

A. No annual cyber security awareness training, which is causing high phishing and social engineering attacks
B. No configuration change management policy (to reduce unintentional threats)
C. No intrusion detection/prevention system
D. Logs are not being collected or analyzed
E. No media access control policy
F. No encryption or hashing to control data flow and unauthorized alteration of data
G. Vulnerability assessment is conducted every three years; unable to assess the security posture status
H. High turnover and low morale among the employees (due to lack of employee readiness programs and work planning strategy)
I. High number of theft reports and security incidents; possible unethical/disgruntled employees
J. No segregation of duties or mandatory vacation policies (to mitigate intentional threats)

To that end, you will make recommendations for enhancing security policies, practices, and processes that are currently contributing to a dysfunctional security culture. Your chief goal is to build a program that will foster a healthy security culture and ensure continuous improvement.Your task is to develop a security awareness program that consists of four major components:

1. Proposal Introduction
2. Security Policies Development
3. Continuous Monitoring Plan
4. Communication Plan

Prompt

In the Case Document, one of the security gap analyses indicated a high number of laptop thefts and a high number of security incidents. Because of this recent increase in theft and security incidents, the chief information security officer asks you to develop an incident response plan. Submit a plan including the eight basic elements of an incident response plan, and procedures for sharing information with outside parties. See the Oregon state incident response template as a sample, but all work should be original.

Specifically, the following critical elements must be addressed:

A. Include the eight basic elements of an incident response plan.

B. Describe procedures for sharing information with outside parties.

Reference no: EM133547640

Questions Cloud

Discuss using examples what is the path-goal theory : explain and discuss using examples what is the Path-Goal theory, developed by Robert House (1971). Explain what is the Goal - Setting Theory and any limitations
How you provide access to network based on user credentials : How you can provide access to the network based on user credentials, maintain control over access points, and detect access attempts by unauthorized users.
How would use the program administration scale : How you would use the Program Administration Scale as an administrator to inform your work as an administrator of an early childhood program.
Key differences between leadership and management roles : CIPD 5OS06 Leadership and management development - developing the right culture and behaviours to establish a working environment which cohesive, diverse
Describe procedures sharing information with outside parties : Include the eight basic elements of an incident response plan. Describe procedures for sharing information with outside parties.
What are their claims on michelin : Canada received its first Michelin-stared restaurants. All were in Toronto. Who are Michelin's Red Guide stakeholders? 3. What are their claims on Michelin?
Explain gaps in his employment history : ask the buyer/borrower about his/her religion or national origin. ask the buyer/borrower to explain gaps in his/her employment history. use a credit report
Problem based on the current health insurance climate : Based on the current health insurance climate and the research you conduct demonstrate your understanding of the impact of the ACA.
Describe the configuration of whitelisting and blacklisting : Describe the configuration of whitelisting and blacklisting. Summarize the key aspects of monitoring, logging, and alerting using intrusion detection systems.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd