Discuss in detail the role that an ids or ips would play

Assignment Help Computer Engineering
Reference no: EM131963778

Assignment: Incident Response (IR) Revamp

Imagine you have just taken over the manager position for your organization's incident response team, after coming from another division in the company. Your first realization is that proper procedures, best practices, and sound technologies are not being utilized. You decide to revamp the team's efforts.

Write a two to three page paper in which you:

1. Explicate the main efforts that would be included in the incident response efforts, including but not limited to personnel and team structure, tools and utilities, and proper procedures.

2. Discuss in detail the role that an IDS / IPS would play in the IR efforts, and explain how these systems can assist in the event notification, determination, and escalation processes.

3. Explain how the NIST SP800-61, Rev. 1 could assist the personnel in classifying incidents so each is identified appropriately and the proper incident-handling procedures are taken.

4. Explain how the use of log management systems (e.g., Splunk) could be a legitimate and useful component of the IR efforts, and describe the potential issues that could arise if not utilized.5.Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Summarize the various types of disasters, response and recovery methods.
• Describe detection and decision-making capabilities in incident response.
• Use technology and information resources to research issues in disaster recovery.
• Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.

Reference no: EM131963778

Questions Cloud

What salary represents the 15th percentile : What salary represents the 15th percentile? You MUST show what went into the calculator and then your final answer.
Design a web scraping program by python to collect : Design a web scraping program by Python to collect weather forecast report data of a city from a website.
Describe the costs associated with software quality work : Describe the costs associated with software quality work? What practices should software engineers follow to enhance quality of software produced by their team?
Number of deliveries than the second delivery truck : Can we assert at the level of significance a = 0.05 that the first delivery truck on its route makes a larger number of deliveries than the second delivery.
Discuss in detail the role that an ids or ips would play : Discuss in detail the role that an IDS / IPS would play in the IR efforts, and explain how these systems can assist in the event notification.
Identify responsibilities of the decision maker : Consider the impact of the options on the stakeholders (consequences, risks, benefits, harms, costs).Identify responsibilities of the decision maker.
Describe method of establishing compliance of it security : Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations.
What is the HPR on each of the two bonds : What is the HPR on each of the two bonds if the interest rate after one year is 4%?
What is the price of the bond today : Suppose you invest in a 5 year coupon bond, with a coupon rate of 5%. What is the price of the bond today?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe a sequence of accesses to an n-node splay tree t

Describe a sequence of accesses to an n-node splay tree T, where n is odd, that results in T consisting of a single chain of internal nodes with external node.

  Main window with a game menu

Change your code so that when the purchase button is pressed, a dialog box appears to allow the user to enter purchasing information and to confirm the purchase.

  How do you search for the pattern include in a file

How do you search for the pattern include in a file and repeat the search? What is the difference between this repeat command and the dot command?

  Program which operates as a generic simple json parser

Create a program which operates as a generic Simple JSON parser. Simple JSON is our version of JSON that only supports variables with values of type: String or Simple JSON.

  What are three levels of concurrency in programs

can someone please explain to me what are the three levels of concurrency in programs.

  Create a separate proj directory in the root directory

You'll need to create a separate proj2 directory in the root directory of your repository. You will need alarm working for project 2, therefore you will need to setup using on of the two following ways: Copy and paste the contents of pintos-base re..

  Design a 3 bit uniform quantizer

Design a 3-bit uniform quantizer (specify the decision boundaries and representation levels) for a source with a Laplacian pdf with a mean of 3 and a variance of 4.

  What is the purpose of AVL trees

What is the purpose of AVL trees? How much slower, on average is searching a random binary search tree than is searching completely balanced binary search tree?

  What types of issues employees have when installing code

What types of issues might employees have when installing the code, and what could you do to troubleshoot those issues?

  Compute a minimal spanning tree in a network works

Kruskal's algorithm to compute a minimal spanning tree in a network works by considering all edges in increasing order of weight.

  Rebooting the system in an attempt to fix a problem

The plan of removing components to return a computer back to a basic configuration is designed to eliminate variables that may make a computer problem more difficult to solve.

  Types of exploitation that prevalently occur over internt

Identify at least three (3) types of exploitation that prevalently occur over the Internet

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd