The incident response plan

Assignment Help Basic Computer Science
Reference no: EM133052943

The Incident Response Plan

After being on the job for a reviewing Wellness Technology's contingency plans, you have identified that the company doesn't have a comprehensive incident response plan (IRP). You have discussed this with your boss, the IT manager, and have decided that this is something that must be created.

In this project, you will create an IRP for Wellness Technology, Inc. The format design of the IRP document can be your own creative work product and/or an industry standard one from the web. If you choose the ladder, please make sure you have the right to use it. Your IRP should cover the following events if they were to occur:

Yower failure

Internet service provider (ISP) failure

Fire

Burst water pipe

The Voice over Internet Protocol (VoIP) telephone system failure used by the sales team and 24x7 technical support team Virus/malicious code compromising the Wellness Technology's Web App (to include the presentation layer, business layer, and database layer) or the wrist device.

Reference no: EM133052943

Questions Cloud

Modern information technology : Modern Information Technology (IT) departments develop, deliver, and maintain information systems (IS) to internal and external customers.
Encounter where quadratic equation is useful : Write about a problem you have encountered or could encounter where a quadratic equation is useful.
About how technology might improve your processes : What specifically do you do to complete your tasks? What are your thoughts about how technology might improve your processes?
Do you agree with the societal or political forces : Do you agree with the societal or political forces? Why or why not? Support your assertions with credible sources.
The incident response plan : The job for a reviewing Wellness Technology's contingency plans, you have identified that the company doesn't have a comprehensive incident response plan (IRP).
Difference between low and remote inclusion : Why is it dangerous? What is the difference between low and remote inclusion? What methods can be employed to prevent a security breach?
Discuss auditor certifications : Discuss Auditor Qualifications. Discuss Auditor Certifications
Design basis threat in terms of cybersecurity : Research the design basis threat (DBT) in terms of Cybersecurity for an organization of your choice
Analyze threat prevention and response : You must create a presentation that compares different tools and algorithms commonly used in the industry for threat prevention, detection, and control.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are the essential ingredients of symmetric cipher

What are the essential ingredients of a symmetric cipher? How many keys are required for two people to communicate via a symmetric cipher?

  Information security and risk management

How the knowledge, skills, or theories of this course(Information Security and Risk Management) have been applied,

  Functional vs nonfunctional requirements

Explain why both functional and nonfunctional requirements are important in IT development. Include at least two (2) examples to support your answer.

  Outline the purpose of the presentation and its contents

7205ICT –ADVANCED DATABASES. A few slides longer that outline the purpose of the presentation and its contents focusing on the Background, Related Work and Methodology.

  Communicates with the kdc twice

In Needham-Schroeder, user Alice wishing to speak with Bob has to communicate with the KDC only once, but in Kerberos user Alice communicates with the KDC twice

  Importance of creating an order of volatility

Develop a detailed plan to approach and secure the incident scene based on the information you have from the scenario - Discuss the initial steps you would take for the investigation

  Establish a correlation among these variables

The torque due to the frictional resistance of the oil film between a rotating shaft and its bearing is found to be dependent on the force F normal to the shaft, the speed of rotation N of the shaft, the dynamic viscosity µ of the oil, and the sha..

  Major components of any it infrastructure

Discuss what is meant by term IT infrastructure. What are the major components of any IT infrastructure? What elements of IT are not considered infrastructure?

  Balance of a bank account

Write a function that computes the balance of a bank account with a given initial balance and interest rate.

  Design an information security metrics

Design an information security metrics program that would provide ChoicePoint executives with visibility into the effectiveness of the security program in preventing future data breaches. What information security metrics would you recommend and w..

  Html5 semantic element applied to header area

Unique identifier and proper HTML5 semantic element applied to header area

  Describe key elements of the disaster recovery plan

Describe the key elements of the Disaster Recovery Plan to be used in case of a disaster and the plan for testing the DRP.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd