Describe procedures sharing information with outside parties

Assignment Help Computer Engineering
Reference no: EM133547640

Assignment: Computer Science- Incident Response Plan

Background:

You were just hired as the new chief information security officer for Multiple Unite Security Assurance (MUSA) Corporation whose security posture is low. The first thing your chief executive officer tells you is that they have recently seen a presentation by one of the information security team members emphasizing the importance of having a security awareness program. As a result, you have been asked to develop a security awareness program for MUSA Corporation based on the following 10 security gaps:

A. No annual cyber security awareness training, which is causing high phishing and social engineering attacks
B. No configuration change management policy (to reduce unintentional threats)
C. No intrusion detection/prevention system
D. Logs are not being collected or analyzed
E. No media access control policy
F. No encryption or hashing to control data flow and unauthorized alteration of data
G. Vulnerability assessment is conducted every three years; unable to assess the security posture status
H. High turnover and low morale among the employees (due to lack of employee readiness programs and work planning strategy)
I. High number of theft reports and security incidents; possible unethical/disgruntled employees
J. No segregation of duties or mandatory vacation policies (to mitigate intentional threats)

To that end, you will make recommendations for enhancing security policies, practices, and processes that are currently contributing to a dysfunctional security culture. Your chief goal is to build a program that will foster a healthy security culture and ensure continuous improvement.Your task is to develop a security awareness program that consists of four major components:

1. Proposal Introduction
2. Security Policies Development
3. Continuous Monitoring Plan
4. Communication Plan

Prompt

In the Case Document, one of the security gap analyses indicated a high number of laptop thefts and a high number of security incidents. Because of this recent increase in theft and security incidents, the chief information security officer asks you to develop an incident response plan. Submit a plan including the eight basic elements of an incident response plan, and procedures for sharing information with outside parties. See the Oregon state incident response template as a sample, but all work should be original.

Specifically, the following critical elements must be addressed:

A. Include the eight basic elements of an incident response plan.

B. Describe procedures for sharing information with outside parties.

Reference no: EM133547640

Questions Cloud

Discuss using examples what is the path-goal theory : explain and discuss using examples what is the Path-Goal theory, developed by Robert House (1971). Explain what is the Goal - Setting Theory and any limitations
How you provide access to network based on user credentials : How you can provide access to the network based on user credentials, maintain control over access points, and detect access attempts by unauthorized users.
How would use the program administration scale : How you would use the Program Administration Scale as an administrator to inform your work as an administrator of an early childhood program.
Key differences between leadership and management roles : CIPD 5OS06 Leadership and management development - developing the right culture and behaviours to establish a working environment which cohesive, diverse
Describe procedures sharing information with outside parties : Include the eight basic elements of an incident response plan. Describe procedures for sharing information with outside parties.
What are their claims on michelin : Canada received its first Michelin-stared restaurants. All were in Toronto. Who are Michelin's Red Guide stakeholders? 3. What are their claims on Michelin?
Explain gaps in his employment history : ask the buyer/borrower about his/her religion or national origin. ask the buyer/borrower to explain gaps in his/her employment history. use a credit report
Problem based on the current health insurance climate : Based on the current health insurance climate and the research you conduct demonstrate your understanding of the impact of the ACA.
Describe the configuration of whitelisting and blacklisting : Describe the configuration of whitelisting and blacklisting. Summarize the key aspects of monitoring, logging, and alerting using intrusion detection systems.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Undirected weighted graph with distinct edge weights

In an undirected weighted graph with distinct edge weights, both the lightest and the second lightest edge are in some MST (Minimum Spanning Tree). Is this true or false?

  Consider the past couple days you have worked on the

write a 200- to 300-word short-answer response to the followingconsider the past couple days you have worked on the

  Discuss the importance of network monitoring software

In discussions with the IT Director you discover that previous requests for network monitoring software were denied despite the large number of devices.

  When does quicksort work best and when does it work worst

When does quicksort work best, and when does it work worst? Write a recursive procedure to implement the insertion sort algorithm.

  How to connect a visual basic application to a access

Provide an example of how to connect a Visual Basic application to a Microsoft Access database and then display the information.

  Describe how you would use weka to find the best feature

Describe how you would use Weka to find the best feature subset to classify virginica and versicolor classes. Suppose we are choosing between sepal-length

  When would it be unwise to use either of these methodologies

Would you consider using an Agile methodology such as Scrum or XP in one of your projects

  Discuss how net neutrality will affect data networks

Base on your article review and the assigned reading, discuss how net neutrality will affect data networks and the availability of information to businesses.

  Explain data types requirements for each graph type

Use your tool of choice (RStudio, Excel, Python) to generate a word document with simple graphs of the following data set in the week 3 content folder.

  Write a program to compare how long it takes to sort a list

Write a program to compare how long it takes to sort a list, using various sorting methods. Create a 3x3 element 2D results arrays that will hold the time.

  What is the channel capacity

Plot the capacity of an additive white Gaussian noise channel with a bandwidth of W = 3000 Hz as a function of PI No for values of PI No between -20 dB.

  How technology used to improve information management

This week you will be creating the body of the paper. Your paper should include the following items: 5-7 pages that explain how technology has been used.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd