How the use of log management systems could be a legitimate

Assignment Help Management Information Sys
Reference no: EM132067917

Assignment : Incident Response (IR) Revamp

Imagine you have just taken over the manager position for your organization's incident response team, after coming from another division in the company.

Your first realization is that proper procedures, best practices, and sound technologies are not being utilized. You decide to revamp the team's efforts.

Write a two to three (2-3) page paper in which you:

1. Explicate the main efforts that would be included in the incident response efforts, including but not limited to personnel and team structure, tools and utilities, and proper procedures.

2. Discuss in detail the role that an IDS / IPS would play in the IR efforts, and explain how these systems can assist in the event notification, determination, and escalation processes.

3. Explain how the NIST SP800-61, Rev. 1 could assist the personnel in classifying incidents so each is identified appropriately and the proper incident-handling procedures are taken.

4. Explain how the use of log management systems (e.g., Splunk) could be a legitimate and useful component of the IR efforts, and describe the potential issues that could arise if not utilized.5.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Summarize the various types of disasters, response and recovery methods.

• Describe detection and decision-making capabilities in incident response.

• Use technology and information resources to research issues in disaster recovery.

• Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.

Reference no: EM132067917

Questions Cloud

Describe the process of performing a risk assessment : Imagine that a software development company has just appointed you to lead a risk assessment project. The Chief Information Officer (CIO).
List three authentication questions : List three authentication questions (but not the answers) your credit card company could ask to authenticate you over the phone.
Why the team performed so well or so poorly : Discuss the team dynamics for a highly effective or ineffective team of which you were a member. Can you explain why the team performed so well or so poorly?
Gain the trust of the department heads by offering a clear : Write a memo to the department heads of Pegasus to describe the goals of the change initiative, which is the reorganization.
How the use of log management systems could be a legitimate : Imagine you have just taken over the manager position for your organization's incident response team, after coming from another division in the company.
Analyze the costs and benefits of various practices : Detail, discuss, analyze the costs and benefits of various practices upon the environment e.g. cutting down trees in the Amazon delta
Develop the appropriate model view controller : Develop the appropriate Model View Controller (MVC) architecture patterns. Provide a summary that explains whether you want to apply the refactoring concepts.
What are the main market entry barriers : What are the main market entry barriers that Chateau Camargue faces in entering the Indianwine market? What is specific challenge of EACH barrier?
Describe the process of performing a risk assessment : The CIO has asked you to prepare a short document before your team begins working. Describe the process of performing a risk assessment.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Provide recommendations for mechanisms

Provide recommendations for mechanisms that can be applied to reduce the spread and impact of each. How would you integrate and incorporate those mechanisms into an existing network environment?

  Explain the costs involved in the creation of the system

Describe all the necessary equipment. Explain the costs involved in the creation of the system. Describe the ongoing maintenance that will be required.

  Analyze the security controls measures

802.11 standards continue to advance at a fairly rapid pace. Analyze the significant changes that have taken place over the past decade from a business and a technological perspective. Assess why organizations are often slow to adopt wireless tech..

  Discuss about the golden age for intelligence

What is your answer to the following question: "As we create new and better ways to collaborate- what happens to information security?"

  Examine five issues that the it department is likely to face

Examine five issues that the IT department is likely to face when it comes to supporting virtual teams. Describe five advantages and five disadvantages of using virtual teams for the organizations described in the scenario.

  Charts and time management1 gnatt charts are they usefull

charts and time management1. gnatt charts are they usefull or useless in organizations? please explain2. when

  Research and describe the pros and cons of virtual reality

Research and then describe the Pros and Cons of Virtual Reality.

  The security aspects of social networking

Ethical issues associated with certain information security law or regulation (can be at international, national, state, or organizational level)

  What changes could be made at a very low cost

What changes could be made at a very low cost? Why is the work climate of an organization important to nurse leaders and managers?

  The network security and users requirements

Identify the hardware and software needed to meet the network security and users requirements.

  Address the new strategy in a three-phase rollout plan

The CIO wants to address the new strategy in a three-phase rollout plan and wants your feedback on LAN and MAN technology.

  Debate in the soa community about what approach to building

Choose one of the approaches, describe it, and discuss why your choice is the best to use. Support your argument with at least two scholarly articles.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd