Review of notes taken from user interviews

Assignment Help Computer Networking
Reference no: EM131862557

Assignment

The LMJ-Ad corporate management has been informed by the network administrative team there was a malware/ransomware attack and infection overnight requiring the incident response team to take immediate action. The infection came from a malware attachment on a phishing email, and was reported by a user with a priority trouble ticket. Initial interviews suggest the incident may have come from an internal employee.

• In this first phase of the incident response process the incident response team must perform an incident review. Describe in detail each item below as part of the initial investigative process only to be applied to this incident:

Step 1: Review of notes taken from user interviews
Step 2: Performing risk assessments
Step 3: Creating data collection checklists
Step 4: Creation of incident timelines and investigatory scope.
Step 5: Drafting of the forensics incident response plan

As part of your descriptions, provide the specific tasks that you need to perform for steps 1 through 5. In later Units we will discuss in detail the specific investigative approach to identify, collect, preserve, analyze, and report on the incident.

Prepare a 5-6 page Word document that is APA formatted. Be sure to include all necessary aspects.

Reference no: EM131862557

Questions Cloud

What is the bond equivalent yield in percent : A bank has issued a six-month, $1,990,312 million negotiable CD with a 0.95 percent. What is the bond equivalent yield in percent?
Calculate the molar concentration of the stock solution : Calculate the molar concentration of the stock solution.
What is the ionic compound derived from the cations : What is the ionic compound derived from the cations on th eleft and each of the anions across for Na+.
Mike firm has credit rating : Mike's firm has a credit rating of A. He notices that the credit spread for five?-year maturity A debt is 91 basis points (0.91%).
Review of notes taken from user interviews : Review of notes taken from user interviews. Creation of incident timelines and investigatory scope. Drafting of the forensics incident response plan.
Decomposition of dinitrogen pentoxide : The decomposition of dinitrogen pentoxide in carbon tetrachloride solution at 30 °C
What is price of consolidated stock : What is the price of Consolidated Stock? What will be the transfer of value from the old shareholders to the new shareholders?
Consider per mole of hcl neutralized : Consider per mole of HCl neutralized; which is essentially cheaper in cost? Please demonstrate calculations specifically after the mol to mol conversions.
What is your position on the product offering : What is your position on the product offering(s)? Should Buckeye Brownies offer coffee? A more diverse product offering?

Reviews

Write a Review

Computer Networking Questions & Answers

  Explain the differences between cir and mar

Explain the differences between CIR and MAR.- How do VPN services differ from common carrier services?- Explain how VPN services work.- Compare the three types of VPN.

  Research techniques for ensuring atomicity

A brief summary of the technique - A description of the concurrency issue that is resolved by the technique, as well as the advantages and disadvantages of the technique and an explanation of whether the technique is best suited for an all-or-not..

  What are the pros and cons of employing

Based on the Takahashi et al. (2007) article, what characteristic of a mesh network is important to the experiment? What are the pros and cons of employing this emergency communications design within an area of the U.S. prone to natural disasters

  Principles important for doing business internationally

MN501 - Network Management in Organisations - Threat to personal privacy posed by the emerging Networking Technologies. - Developing guidelines for Ethical

  Explain the existing security situation in the organization

Explain the design approach and rationale. Prove that the design meets the data rate requirements. Analyze the existing security situation in the organization. Identify the predominant electronic and physical threats to communications networks.

  What is a client-server system

What is a client-server system? What are the main features of a client-server system? Describe the architecture of a client-server system.

  Write report on wireless sensor networks

Write 4 pages report on the following any two of the topic - Should be very formal and to the point Appropriate data.

  Discuss and describe how wireless technology

Discuss and describe how wireless technology can enhance daily life. In your response, you are required to include possible wireless technologies

  Wlan it manager for an organization

Assume you are the IT manager for an organization tasked with evaluating whether or not to deploy internal wireless access for employees.

  What kind of support equipment might you need

What would be the topology? What kind of support equipment (switches, servers) might you need? Where would that support equipment be located?

  What is the router prompt for the privileged exec mode

What command is used to enter the router's privileged mode?

  Interested in social networks

Social Networks.Facebook has over one billion subscribers (The total population of the world is just over 7 Billion). Please think about the following questions and discuss them with your fellow students.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd