Organization information systems

Assignment Help Basic Computer Science
Reference no: EM131330333

Even with the best security system, an organization's information systems are never fully safe from outside attacks or malicious activities from insiders. As a result, an organization must be prepared to take curative measures when an incident occurs. As a security professional, you should have knowledge and expertise in incident response and should be able to explain the necessity of incident response systems to the higher management.

For this Assignment, select an arbitrary organization. You may choose one with which you are familiar, but you do not need to disclose its identity. Assume you are the IT security manager. You frequently find traffic to and from suspicious websites which could indicate malware, a configuration problem, or misuse. You think that, as a starting point, having an incident response plan in place would be beneficial. You decide to submit a proposal to your CEO.

Based on your readings and through additional research write a 4- to 6-page proposal to the CEO. Use this as an outline for your proposal:

Begin your proposal by briefly describing the organization and its nature of functions. Again, if it is one with which you are familiar, you do not need to identify it.

Your proposal should include the following sections:

  1. Incident Response Plan Details:
    • Explain the benefits of an incident response plan.
    • Identify and explain with reasonable details the steps to isolate, respond, and recover after an attack (incident) is discovered.
    • Identify the teams that should be involved in the incident response process. Explain their roles.
  2. Incident Communication Requirements:
    • Identify and explain the type of communication and reporting to different internal stakeholders that will be necessary after you have discovered an attack.
    • What are the legal, ethical, and other considerations if personal customer data has been stolen?
    • Considering the breach laws in your home country, at which point would you disclose such a breach to law enforcement and communicate with customers?

Reference no: EM131330333

Questions Cloud

Replacement part at much lower cost : You accidently broke your refrigerator door handle.The appliance company that made the refrigerator can express ship you a replacement handle, for which it has copyrighted the design. But instead of buying the copyrighted replacement part, you use..
Large domestic and foreign information system : Assume that you have been hired to manage a large domestic and foreign information system. what are some of the issues and solution that you would discuss and plan.
Identify two career option someone with accounting education : Describe at least two career options someone with an accounting education can pursue. Be sure to reference sources such as the Bureau of Labor Statistics and the American Institute of Certified Public Accountants.
Learning objectives and outcomes : You will review the Fourth Amendment and will be able to analyze the specific exceptions to the application of this right. Assignment Requirements
Organization information systems : Even with the best security system, an organization's information systems are never fully safe from outside attacks or malicious activities from insiders. As a result, an organization must be prepared to take curative measures when an incident occ..
Explain how the use of this element enhances the work : Gabrieal Marquez is famous for using a literary style which because of his work came to be know as magical realism. define the term, locate examples in the novel of "love and other demons" and explain how the use of this element enhances the work ..
Current knowledge of networking : Draw a network. Demonstrate your current knowledge of networking as compared to the knowledge at the beginning of Networking I.
Banking information close : A goal of fragmentation in a distributed database is to improve performance by moving copies of the data closer to the users. (Example: In a banking situation, having my banking information close to me in my home state of Maryland and in Californi..
Problem regarding the directory services : You were hired as a consultant to analyze an existing Windows Server environment in a utilizing Windows Server 2003 and 2008. The local IT administrator has heard about virtualization and cloud technology and wants to know how his company's networ..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Construct a 3-bit counter using three d flip-flops

Construct a 3-bit counter using three D flip-flops and a selection of gates. The inputs should consist of a signal that resets the counter to 0, called reset, and a signal to increment the counter, called inc.

  Byte-stuff the subsequent frame payload

Byte-stuff the subsequent frame payload in which E is the escape byte, F is the flag byte, and D is a data byte other than an escape of a flag character.

  create a version of a carnival game

assignment, your job is to create a version of a carnival game in which mechanical dogs race along a track. The racing game is called DogTrack. DogTrack is also the name of the java source file you must submit to complete the assignment. The DogTrack..

  Locate a consumer products company on the web

Pretend that the company is about to create a new application to support retail sales over the web. Create an architecture design that depicts the locations that would include components that support this application.

  Determining the fhss transmission

How does narrow band interference affect a FHSS transmission? Conversely, how does a narrow band signal interfere with a DSSS transmission?

  Question regarding the modern corporate setup

As you analyze any modern corporate setup, you will see that companies want to ensure that all users are aware of their own individual responsibility to help protect the enterprise. Social engineering (SE) is becoming a more prevalent threat at al..

  What impact does this have on tcp traffic

These reports are sent periodically (e.g., once a second) and include the percentage of packets successfully received in the last reporting period. Describe how the source might use this information to adjust its rate in a TCP-compatible way.

  Equilibrium price and quantity of butter

Question 3:What will happen to the equilibrium price and quantity of butter in each of the following cases?Illustrate with a diagram and explain whether demand or supply (or both) have shifted and in whichdirection? (In each case, assume ceteris pari..

  ?x the size of the longest word

1. Why is it important to assume that integers in our computer model have a  ?xed size? 2. Consider the word puzzle problem on page 2. Suppose we ?x the size of the longest word to be 10 characters.

  Role of confusion and diffusion in design of block cipher

Explain the roles of confusion and diffusion in the design of a block cipher.

  Display the highest score out of the three

For your assignment, write a program that retrieves three scores. Each of the three scores should be from a different player, and you want to display the highest score out of the three. Save your assignment as a .cpp file. Place this .cpp file in ..

  Leading term of the polynomial function

Consider the leading term of the polynomial function. What is the end behavior of the graph? Describe the end behavior and provide the leading term.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd