Plan to properly document and report the incident

Assignment Help Management Information Sys
Reference no: EM13997847

Incident Response Plan

This document discusses the steps taken during an incident response pla

1) The person who discovers the incident will report it to someone who has access to this list. In turn, that person shall follow the instructions in this plan to properly document and report the incident. We anticipate the following initial contact points for incidents: a) The helpdesk b) IT Staff c) IT Security Staff d) A manager e) A business partner f) An outside source.

2) The responder will log: a) Time of the call b) The nature of the incident c) What equipment was involved d) How the incident was detected e) When the event was first noticed that supported the idea that the incident occurred

3) The IT security staff responsible for incident response will call those designated on the list as appropriate for the case at hand. He/she will contact the incident response manager using e-mail. The staff member could possibly add the following: name of system being targeted, along with operating system, IP address, and location.

4) Contacted members of the incident response team will meet or discuss the situation over e-mail and determine a response strategy. a) Is the response urgent? b) Is the incident real or perceived? c) Will the response alert the attacker and do we care? d) What type of incident is this? Example: virus, worm, intrusion, abuse, damage. e) What data or property is threatened and how critical is it? f) What system or systems are targeted? Where are they located physically and on the network? Incident Response Plan for PPC ITEC 6620 Information and Systems Security © 2012 Laureate Education Inc. 2

5) An incident ticket will be created. The incident will be categorized into the highest applicable level of one of the following categories: a) Category one - A threat to public safety or life. b) Category two - A threat to sensitive data. c) Category three - A threat to computer systems. d) Category four - A disruption of services.

6) Team members will establish and follow one of the following procedures basing their response on the incident assessment: a) Worm response procedure b) Virus response procedure c) System failure procedure d) System abuse procedure e) Property theft response procedure The team may create additional procedures which are not foreseen in this document. If there is no applicable procedure in place, the team must document what was done and later establish a procedure for the incident.

7) Team members will use forensic techniques, including reviewing system logs, looking for gaps in logs, reviewing intrusion detection logs, and interviewing witnesses and the incident victim to determine how the incident was caused. Only authorized personnel should be performing interviews or examining evidence, and the authorized personnel may vary by situation and the organization.

8) Team members will restore the affected system(s) to the uninfected state.

9) Documentation—the following shall be documented: a) The category of the incident b) How the incident occurred, whether through e-mail, firewall, etc. c) Where the attack came from, such as IP addresses and other related information about the attacker d) What the response plan was e) What was done in response?

10) Assess damage and cost—assess the damage to the organization and estimate both the damage cost and the cost of the containment efforts.

Reference no: EM13997847

Questions Cloud

What type of object is a dog : For this exercise, consider a different example of an object - a dog. what type of object is a dog what are some of the attributes of a dog
What is an advantage of bonuses over merit-based pay plan : Which of the following statements is true of the job characteristics model?
Benefits of data protection controls : Based on what you have learned about data protection in an online environment, prepare a 5-slide presentation to a department head or the CEO of a company to convince the audience that data protection controls would benefit their business.
What arrow represents the net electric force acting : Three charges of equal magnitude are arranged as shown in the picture. What arrow represents the net electric force acting on the charge at the center?
Plan to properly document and report the incident : The person who discovers the incident will report it to someone who has access to this list. In turn, that person shall follow the instructions in this plan to properly document and report the incident. We anticipate the following initial contact poi..
Which of the following does an organization chart do : A group of employees in American Game Technology Inc., a manufacturer of gaming machines, got together to arrange a paper recycling drive in the office. Though they came from different departments, they shared a common belief in environmentalism, ..
Determine the magnitude and direction of the magnetic field : As shown in the figure below, two long parallel wires (1 and 2) carry currents of I1 = 3.02 A and I2 = 5.35 A in the direction indicated. Determine the magnitude and direction of the magnetic field at a point midway between the wires (d = 10.0 cm).
How many lines are actually seen in the spectrometer : How many spectral lines should result considering all possible transitions? How many lines are actually seen in the spectrometer? How many of these are visible to a human eye?
What is the work done on the particle by the force : What is the impulse that you give to the particle as it moves from x = -1.00 m until it reaches x = 18.00 m. Remember that impulse is a vector, so in 1-dimension it can be either positive or negative.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd