Describing what circumstances may have

Assignment Help Management Information Sys
Reference no: EM133438373

Question: Given that Berwicq has no current incident response plan, you will need to create a basic incident response plan in order to begin your response and make recommendations to prepare for future incidents. Check out What is an Incident Response Plan and How to Create One (varonis.com) for why this is important. Make sure you address all six recommended steps of incident response (preparation, identification, containment, eradication, recovery, and lessons learned - see the Incident Handlers Checklist on page 11 of Incident Handler's Handbook | SANS Institute for more information) The California Department of Technology has provided a template. You are free to find and use other examples. Please customize any templates or examples you have to fit to Berwicq.

a)Write up a brief for CTO Nabil describing what circumstances may have allowed this data breach incident to occur, or could allow a similar incident to occur in the future - make sure you address what risks, threats, and/or vulnerabilities are present. This is where your Root Cause Analysis documents will be a great resource!

Reference no: EM133438373

Questions Cloud

How might the cultures of the pacific : How might the cultures of the Pacific and the Americas have developed if they had not been invaded and conquered by Europeans?
About her symptoms : What are some standard questions that you might ask her about her symptoms? Why is this information so important for the doctor.
What is privacy and how private is private : What is privacy and How private is private? Is your private information really as private as you believe? Come take a look at privacy concerns and the Internet
Partial outsourcing of information technology : Find an article in the literature that outlines either the advantages and disadvantages of either a full or partial outsourcing of information technology (IT).
Describing what circumstances may have : Write up a brief for CTO Nabil describing what circumstances may have allowed this data breach incident to occur, or could allow a similar incident
What should the early childhood student practitioner do : What should the early childhood student practitioner do? Why. How could this situation have been handled?
Discuss strengths and weaknesses of the various systems : Differentiate among classifications, nomenclatures, and terminologies. Discuss strengths and weaknesses of the various systems.
What similarities do you see among the vendors : What similarities do you see among the vendors you listed in terms of who they market their services to, what services they provide, and how they structure
Create crisis management plan : find on the company and any past issues/breaches the company has gone through, create Crisis Management Plan

Reviews

Write a Review

Management Information Sys Questions & Answers

  Importance of balancing security and business functionality

Discuss in your own words the importance of balancing security and business functionality. Determine why upper management buy-in for a security program is essential for the program's success and compliance of end users.

  Create two virtual machines each running a different

Create two Virtual machines each running a different but the latest distribution of Linux .

  Create a research topic for your traditional research

Create a research topic for your traditional research. Focus on all attributes that make good topic and remember to narrow down your topic to particular group.

  Description strategies of customer journey

CIS8004 - Enterprise Planning and Implementation Assignment. Description strategies of Customer Journey; Descriptions and justifications of solution design

  Why is it important to install memory sticks in pairs

Build a computer using a list of unique specifications and troubleshoot any problems that may come up during the building process.

  Analyze most of enactment of health insurance portability

From the first and second e-Activities, analyze the importance of the enactment of the Health Insurance Portability and Accountability Act (HIPAA), and appraise the overall impact of HIPAA on patients' medical records.

  What does the confidence of each rule represent

After generating the top 10 mining rules using the Apriori algorithm, explain each of the top 10 rules.

  What the effectsof electronic health record on health care

What are the effectsof Electronic Health Record on health care

  How the processes of transportation economics play

Explain how the processes of transportation economics play a major role in transportation decisions of the organization - Describe how the supply chain of this company contributions to customer service levels.

  What factors should be considered

Why is selecting computer hardware and software for the organization an important business decision? What factors should be considered? Respond to at least two of your classmates' postings.

  Compare a use case description and an activity diagram

Consider a system needed to store information about computers in a computer lab at a university, such as the features and location of each computer. Ascertain the domain classes that might be included within the domain model. Discuss whether or no..

  What role does technology play in a leadership role

What role does technology play in a leadership role?How can a leader use technology to communicate the organization's mission and other important information regarding the organization?What are some pros and cons of a leader using technology?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd