Plan to properly document and report the incident

Assignment Help Management Information Sys
Reference no: EM13997847

Incident Response Plan

This document discusses the steps taken during an incident response pla

1) The person who discovers the incident will report it to someone who has access to this list. In turn, that person shall follow the instructions in this plan to properly document and report the incident. We anticipate the following initial contact points for incidents: a) The helpdesk b) IT Staff c) IT Security Staff d) A manager e) A business partner f) An outside source.

2) The responder will log: a) Time of the call b) The nature of the incident c) What equipment was involved d) How the incident was detected e) When the event was first noticed that supported the idea that the incident occurred

3) The IT security staff responsible for incident response will call those designated on the list as appropriate for the case at hand. He/she will contact the incident response manager using e-mail. The staff member could possibly add the following: name of system being targeted, along with operating system, IP address, and location.

4) Contacted members of the incident response team will meet or discuss the situation over e-mail and determine a response strategy. a) Is the response urgent? b) Is the incident real or perceived? c) Will the response alert the attacker and do we care? d) What type of incident is this? Example: virus, worm, intrusion, abuse, damage. e) What data or property is threatened and how critical is it? f) What system or systems are targeted? Where are they located physically and on the network? Incident Response Plan for PPC ITEC 6620 Information and Systems Security © 2012 Laureate Education Inc. 2

5) An incident ticket will be created. The incident will be categorized into the highest applicable level of one of the following categories: a) Category one - A threat to public safety or life. b) Category two - A threat to sensitive data. c) Category three - A threat to computer systems. d) Category four - A disruption of services.

6) Team members will establish and follow one of the following procedures basing their response on the incident assessment: a) Worm response procedure b) Virus response procedure c) System failure procedure d) System abuse procedure e) Property theft response procedure The team may create additional procedures which are not foreseen in this document. If there is no applicable procedure in place, the team must document what was done and later establish a procedure for the incident.

7) Team members will use forensic techniques, including reviewing system logs, looking for gaps in logs, reviewing intrusion detection logs, and interviewing witnesses and the incident victim to determine how the incident was caused. Only authorized personnel should be performing interviews or examining evidence, and the authorized personnel may vary by situation and the organization.

8) Team members will restore the affected system(s) to the uninfected state.

9) Documentation—the following shall be documented: a) The category of the incident b) How the incident occurred, whether through e-mail, firewall, etc. c) Where the attack came from, such as IP addresses and other related information about the attacker d) What the response plan was e) What was done in response?

10) Assess damage and cost—assess the damage to the organization and estimate both the damage cost and the cost of the containment efforts.

Reference no: EM13997847

Questions Cloud

What type of object is a dog : For this exercise, consider a different example of an object - a dog. what type of object is a dog what are some of the attributes of a dog
What is an advantage of bonuses over merit-based pay plan : Which of the following statements is true of the job characteristics model?
Benefits of data protection controls : Based on what you have learned about data protection in an online environment, prepare a 5-slide presentation to a department head or the CEO of a company to convince the audience that data protection controls would benefit their business.
What arrow represents the net electric force acting : Three charges of equal magnitude are arranged as shown in the picture. What arrow represents the net electric force acting on the charge at the center?
Plan to properly document and report the incident : The person who discovers the incident will report it to someone who has access to this list. In turn, that person shall follow the instructions in this plan to properly document and report the incident. We anticipate the following initial contact poi..
Which of the following does an organization chart do : A group of employees in American Game Technology Inc., a manufacturer of gaming machines, got together to arrange a paper recycling drive in the office. Though they came from different departments, they shared a common belief in environmentalism, ..
Determine the magnitude and direction of the magnetic field : As shown in the figure below, two long parallel wires (1 and 2) carry currents of I1 = 3.02 A and I2 = 5.35 A in the direction indicated. Determine the magnitude and direction of the magnetic field at a point midway between the wires (d = 10.0 cm).
How many lines are actually seen in the spectrometer : How many spectral lines should result considering all possible transitions? How many lines are actually seen in the spectrometer? How many of these are visible to a human eye?
What is the work done on the particle by the force : What is the impulse that you give to the particle as it moves from x = -1.00 m until it reaches x = 18.00 m. Remember that impulse is a vector, so in 1-dimension it can be either positive or negative.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Show the operations management improvement plan

Operations management improvement plan: fast food burger chain - How do I start this paper, what are the headings I can use?

  Who are btfcs best and worst customers by total sales

What are BTFC's best and worst value-added services by total profit? Use an appropriate table and graph/chart to summarise these observations.

  Important information about costs

List all of the types of costs that can be associated with a product and Why does the convenience-store industry need to cut its costs

  The solution to information securityto some the employee is

the solution to information securityto some the employee is considered as the biggest threat to information security at

  Creating a fourth table

She asks you to help her continue building the database by changing the properties for fields in three tables, creating a fourth table, adding records, and creating the table relationships

  Advantages and disadvantages of real time datawhat are the

advantages and disadvantages of real time datawhat are the advantages and disadvantages of having real-time data

  List the best practices you intend to use

You have gained confidence in the CISO and board of directors, and they've identified additional funding that may be applied towards security. List the best practices you intend to use

  Supply chain management human factors of analysis design

supply chain management human factors of analysis design activities and rapid prototypingscenariofive years ago ceo

  What is an example of how integrating with the use of erp

What is an example of how integrating with the use of enterprise resource planning (ERP) can help an organization, from research or your own personal experience

  E-music supply chain

Please help me understand how the supply chain for music was modified from "brick and mortar" to electronic

  Lessening role in the decision making process

What is BYOD and do you think that BYOD is one of the reasons why telecom/IT departments have a lessening role in the decision making process

  Customer relationship management installationsmany crm

customer relationship management installationsmany crm installations have been less than successful. on the other hand

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd