How cloud-based services change incident response

Assignment Help Computer Engineering
Reference no: EM132210040

Discussion topics - around 200 words each topic

1. "Disaster Recovery (DR), Business Continuity Planning (BCP), and Software as a Service (SaaS) Options" Please respond to the following:

• Explain in your own words the difference between disaster recovery and business continuity planning efforts and whether or not you believe these planning efforts overlap.

• Determine whether or not cloud and SaaS services can assist and benefit an organization in its business resumption panning (BRP) efforts, and whether or not this option is available and feasible to all sizes of organizations at this point in time. Provide a rationale to support your answer.

2. "Cyber Storm" Please respond to the following:

• From the e-Activity, explain in your own words the benefits of the DHS's efforts with Cyber Storm and whether or not you believe this is a necessary and useful activity in terms of incident response preparedness.

• Determine whether or not the efforts of Cyber Storm can help all types of organizations, regardless of size and independent of industry, for incident response and preparedness planning. Provide a rationale to support your answer.

3. "To IDS or to Not IDS?" Please respond to the following:

• Suppose you were proposing the implementation of an IDS to your manager as a new initiative for your organization. Explain how you would make a business case for obtaining the funds in order to fully implement this initiative.

• Propose the top three reasons for why organizations would NOT choose to implement IDS / IPS systems, and analyze each of these reasons to determine whether you believe they are valid concerns or improper conclusions.

4. "IDS in the Cloud" Please respond to the following:

• From the e-Activities, explain whether or not you believe technologies such as IDS are still relevant and useful as there is a push toward SaaS and cloud-based solutions..

• Discuss from your perspective how cloud-based services change incident response, for better or worse, and determine what you believe to be the greatest preparedness concern with cloud-based services.

5. "Appropriate Standards"

• Select an organization with which you are familiar. Identify the compliance laws that you believe would be most relevant to this organization. Justify your response.

• Define the scope of an IT compliance audit that would verify whether or not this organization is in compliance with the laws you identified.

6. "Using a Hybrid Framework"

• Often, it is necessary to develop a hybrid framework of standards for use within a business. Identify the individual(s) within the company that should be involved in the decision-making process. Justify your choices.

• Describe how the use of a unique set of standards might impact the auditing process.

Reference no: EM132210040

Questions Cloud

Which of the following can be outcome of learning : A multicultural organization. Which of the following can be an outcome of learning?
Why is world trade growth slowing : Why is World Trade Growth Slowing? What are some of the costs and benefits of higher trade growth? How can governments shape trade growth?
Define high-level overview of the project-to-date : An Executive Summary provides a high-level overview of the project-to-date including; results, conclusions, and recommendations. These summaries are written.
Recommend the proper audit controls to be employed : Imagine you are an Information Security consultant for a small college registrar's office consisting of the registrar and two assistant registrars.
How cloud-based services change incident response : Discuss from your perspective how cloud-based services change incident response, for better or worse, and determine what you believe to be the greatest.
Create a hypothetical organization with details : Create a hypothetical organization with details including geographic location(s), number of employees in each location, primary business functions.
Describe the proper procedures and policies : Describe the proper procedures and policies that would be implemented specific to the DR team personnel as well as special equipment that would be required.
Explain how the attacks affected risk management : Explain how the attacks affected risk management in organizations and have prompted an increased justification for recovery-based objectives, initiatives.
Construct a process-flow diagram using given information : Construct a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Computes the wait time in seconds

Computes the wait time in seconds. Calculate the mean and the standard deviation. Locate the shortest wait time and the longest wait time for any number.

  A computer processes jobs on the first-come first-serve

a computer processes jobs on a first-come first-serve basis in a time-sharing environment. the jobs have poisson

  Discuss the main way in which one would use the tools

Identify two to three (2-3) information technology tools that affect privacy. Next, discuss the main way in which one would use the tools

  Discuss the strategies for responding to a cyber-attack

Research and discuss three (3) strategies for responding to a cyber-attack. Discuss the at least three (3) strategies discussed in the article.

  A non-linear circuit problem

Computer program which will calculate the voltage across a resistor in the circuit

  Write a program that displays a numeric keypad

Write a program that displays a numeric keypad that might appear on a phone. Above the keypad buttons, show a label that displays the numbers.

  Find the probability that a total of 7 games are played

Suppose that two teams are playing a series of games, each of which is independently won by team with probability p and by team B with probability 1-p.

  Prepare a report on qualitative risk analysis

Prepare a report on qualitative risk analysis and management tool - Explain basic components of risk analysis and management processes

  Review of article where physical security failed

You must use APA in this assignment posts and is very similar to using APA in a paper. And it helps to think of your assignment response as a short APA paper.

  How various blocks of main memory are there

A computer using fully-associative cache has 2^32 words of main memory and a cache of 1024 blocks. Each cache block includes 32 words.

  Identify a specific type of variable that stores a number

Identify a specific type of variable that stores a number. Compare the variable type that you selected to at least one other type of variable that also stores numbers

  Prepare power point presentation on different conflicts

PowerPoint Presentation based on four different conflicts you have encountered. These conflicts can be work related or personal conflicts.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd