List the tool your organization would use to detect a breach

Assignment Help Computer Engineering
Reference no: EM133557663

Assignment: Cyber Security

Introduction

It is important for your incident response strategy to meet the requirements of your organizational context. Write a short introduction summarizing your type of organization, and an overview of the business-critical assets your organization relies on. You can use the information you provided in Module 3's ongoing project, or Module 5's online activity submission.

Step I: Prevention

Describe the measures your organization will take to protect against a cyberattack from both a technical and non-technical perspective.

Step II: Planning

List the individuals involved in your incident response team and their roles. Ensure that the roles, responsibilities, and structure of your team meets the requirements of your organizational context.

A cyber crisis communication plan is compiled in this phase, but in this incident response plan, include your plan under Step 7: Communication.

Step III: Preparation

Section 2.3 in Unit 1's notes details a number of requirements in this step, including reporting mechanisms, the preparation of checklists and jump bags, and auditing procedures. However, for the purpose of this ongoing project, you are required to detail one training exercise the incident response team will undergo. Include specific examples of scenarios or questions, and explain why you have chosen it.

Step IV: Detection

List the tools your organization would use to detect a breach.

Step V: Analysis

Explain how your organization would analyze whether an incident is a cyberattack. Also describe how you would categorize and prioritize cyberattacks in your organization.

Step VI: Containment

Describe how your organization would prevent a cyberattack from spreading further.

Step VII: Communication

As per Section 4 of the Unit 2 notes, compile a cyber crisis communication plan detailing the internal and external stakeholders your organization would need to communicate to in the event of a breach. Describe what communication channels would be used to communicate with these stakeholders.

Step VIII: Eradication

Provide insight into the approaches and decisions the team will take to remove the threat from your organization's internal system.

Step IX: Recovery

Describe what steps your organization will take to return to its normal operations.

Step X: Post-event analysis

List the processes that would need to be followed to ensure that lessons learned are implemented.

Reference no: EM133557663

Questions Cloud

Why trucks and drivers are so important to our infrastructue : Describe in your own words why trucks and drivers are so important to our infrastructure?
Discuss the unique challenges inherent to each architecture : Discuss the unique challenges inherent to each architecture when connecting to a back-end database. List at least two problems posed by each environment.
What does cohassey explain about ernest hemingway childhood : What does Cohassey explain about Ernest Hemingway's childhood experience with the Native Americans in northern Michigan?
How narrative is structured based on emotions and memories : How the narrative is structured based on emotions and memories rather than a strict timeline. analyze and explore the various dimensions of "Gifts" by Barbara
List the tool your organization would use to detect a breach : List the tools your organization would use to detect a breach. Describe how your organization would prevent a cyberattack from spreading further.
Explain the health codes that apply to restaurant kitchen : explain the health codes that apply to restaurant kitchen environments To show how to cook a particular dish To list the types of utensils in a professional
What is your understanding of a manifesto : What is your understanding of a manifesto? What is its purpose? Why write this kind of document? How is Dr. King's speech a manifesto? Be specific about how
Define the key milestones and deliverables for the project : Define the key milestones and deliverables for the project. Establish checkpoints to assess progress and ensure that the project stays on track.
Identify strong and weak areas and suggest improvements : identify strong and weak areas and suggest improvements. Note any technologies used and how much, if any, interaction the speaker had with the audience.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain the roles and responsibilities for apus instructors

what consequences should a company face for failing to properly dispose of customer information? Provide specific consequences by referring to the HIPAA Act.

  Find an optimal state assingment for each table

Find an optimal state assingment for each of the following state tables.

  Determine the resulting amortized cost of a single operation

For each of the following functions f, determine the resulting amortized cost of a single operation.

  Explain your reasons for choosing each language

Consider two situations where you would recommend two different programming languages as the development solution.

  Write a graphical user application that accept employee data

Write a graphical user application that accepts employee data to include employee name, number, pay rate, and number of hours worked.

  Establishing a console session with router

Define the range of addresses and default subnet mask for each class - Establishing a Console Session with Router - Basic Router Configuration

  Discuss strengths of memory management techniques

Discuss the strengths and weaknesses of the following memory management techniques: Fixed Partitioning: Main memory is divided into a number of static partition

  What is the importance of the program telnet

My co-worker Mark and I both regularly use our mainframe UNIX system. I've fingered him, and know that he's logged on. when I do not want to have a conversation with him, instant messenger with him, or send him an email, I would like to send him a..

  Create an array of peoples first names

Create an array of people's first names. Using a loop, read the names from a text (txt) file, and store each one into the array. The array should allow for a maximum of 100 entries

  Design an efficient dynamic programming algorithm to find

You are given an n by m grid G, and each square (i, j) has a; apples. Starting from the bottom-left square, you will make your way to the top-right square

  How prevalent is plagiarism on college campuses

What features, such as allowing multiple resubmissions and grammar checking, do they offer? How prevalent is plagiarism on college campuses?

  Questionyour company has a benchmark that is considered

questionyour company has a benchmark that is considered representative of your typical applications. an embedded

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd