How the incident response policy supported your actions

Assignment Help Basic Computer Science
Reference no: EM132387319

ABC Company is a manufacturing company that produces new technology that sells online directly to customers and retailers. The system they use is a core transactional Enterprise Resource Planning system called NEDS. NEDS is similar to many core systems that provide integrated applications on a common platform for financials, managing materials, sales distribution, and production planning (similar to Oracle or SAP). NEDS is located in the Netherlands, while ABC Company is located in Florence, Kentucky. On June 15, 2016, James Hurd (ABC's Global Security Director) was notified that NEDS was burglarized during business hours involving individuals stealing equipment including blackberries, iPhones, laptops and hard drives. Local police were notified and the incident was reported on that date. A police report only included identification of specific hardware that was stolen and several bicycles.

The burglary notification that was mailed was sent to a branch office of ABC Company in Mexico. James Hurd was notified by the Mexico office via email which included an attached electronic version of the burglary notification and police report on June 20, 2016. James Hurd recognized that the incident actually occurred 5 days earlier.

The letter contained the following information about the incident:

· The incident occurred in the application area that provides custom application development and reporting for the ABC Company.

· The area that was impacted involved "potential data" used for sales analysis. Data from the ABC Company had been placed on laptops while some diagnostics were being carried out.

· Compromised data could have included customer or retailer information from 2002-2014 consisting of names, address, bank account data or credit card numbers, SKU product numbers, descriptions, quantities, Purchase Order numbers, and purchase price.

You are James Hurd and need to respond to this incident by taking action immediately.

You will need to complete the following:

I. Develop an Incident Response Policy for ABC Company that will be used as your reference for your evaluation of this potential data incident (this is an attachment that should be included in your paper and referenced in your presentation).

II. Upon developing ABC Company's Incident Response Policy, evaluate the incident described above:

- Summarize the data incident and potential level of risk, include why?

- Upon identifying the types of data that could potentially be impacted and what laws/regulations could be in violation of non-compliance if this data was breached

- Develop your action plan to evaluate this data incident (include your rationale for why the steps were necessary)

- Describe how the Incident Response Policy supported your actions

- Identify any issues that made the evaluation more difficult

- Identify areas of future risk mitigation actions should a similar incident occur (look at the gaps or issues with this scenario)

- Close the incident (NOTE: The outcome of the incident did not surface any major risks or data breach to the company but it took the evaluation to get to this conclusion)

This presentation must be support by the research paper.

Please note the following criteria:

Research paper:

Research Paper must be in APA Style

Research Paper must have at least 5 works cited of which 2 must be peer reviewed works/articles (note your book can be included as a reference)

Must be at least 5 double-spaced pages

The Policy will be an Attachment and not count toward the 5 Page requirement

Graphs, illustrations and spreadsheets are allowed, but will not count toward the 5 Page requirement

Grading criteria will include the following as this represents 40% of your grade:

Presentation will be 100 points and based on the following:

Completeness of the Topic (Policy, Processes, Action, Conclusion)

Presentation Delivery

Alignment of policy

Paper will be 100 points:

- Meets Standard Criteria

- Completeness/content

- Incident Risk Policy as Attachment

- Logic of Processes and Actions (Thoroughness)

- Alignment of the Incident Risk Policy components in completing and supporting the evaluation

Reference no: EM132387319

Questions Cloud

Small business networks in australia or your home country : How can social media such as LinkedIn, Facebook, and Twitter be used to improve knowledge sharing, build social capital, support innovation
What type of cancer would you target : You are starting a non-profit organization to raise money for cancer research. What type of cancer would you target, or would you target cancer as a whole?
Most critical tasks of all managers : Human Resource Management is one of the most critical tasks of all managers. Why?
How might selected theory and leadership style fit together : In this unit, we consider how theory guides group leadership. The authors of the Group Counseling: Concepts and Procedures text (linked in Resources).
How the incident response policy supported your actions : Describe how the Incident Response Policy supported your actions. Identify any issues that made the evaluation more difficult.
Key phases of disaster recovery : Discuss disaster recovery phases in chapter 10 and relation to lessons learned from Hurricane Sandy article. I need to see information systems related planning.
What are possible negative consequences for an organization : What are the possible negative consequences for an organization that does not embrace diversity? What strategies can managers implement to enhance cultural.
Explain negative effects of poor communication : Explain negative effects of poor communication in workplace and public sector.
How your emotional intelligence impacted your professional : How has your emotional intelligence, or lack of emotional intelligence, positively or negatively impacted your professional or personal relationships?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd