What points should be addressed in an incident response

Assignment Help Computer Engineering
Reference no: EM133459419

Design case: You are asked by the Provost a one-page document describing what steps you would take in order to create why? an incident response team and prepare for hacking attacks. Prompted by a vendor of cyber insurance who convinc- ingly presented a doom and gloom scenario, the Provost and President are concerned that Sunshine University would not be able to act quickly and decisively to resolve any issues that may occur and this will affect the image of the university. In your report,

Questions: consider the following:

1. What points should be addressed in an incident response policy?

2. Which units should have representation on the IRT and

3. Argue for centralization of resources in terms of campus security.

4. Research the reporting requirements in your State in case of a breach.

5. Research the protection offered by cybersecurity risk

 

Reference no: EM133459419

Questions Cloud

How do jainas understand the final state of liberation : How do jainas understand the final state of liberation? (Moksha)
What is the significance to of right faith : What is the significance to of "right faith" (samyak darnshan) in Jainism?
What local laws could i be violating : what local laws could I be violating and which steps should not be performing due to legal risks doing a penetration test on consumers energy?
Explain how the recent supreme court ruling : Explain how the recent Supreme Court ruling in Dobbs v. Jackson impacts and informs your response. Be sure to inform your response by drawing upon your assigned
What points should be addressed in an incident response : What points should be addressed in an incident response policy? Which units should have representation on the IRT and
What would be for the city of kelseys budget crisis : What would the practical alternatives from a stakeholder's perspective be for the City of Kelsey's budget crisis and Stanley Park Project?
What are some instances that outsourcing should not be : What are some instances that outsourcing should not be considered when implementing information security?
What is scope creep and why is it so dangerous to success : What is scope creep and why is it so dangerous to the success of any project? Give an example or two of major scope creep and the consequences.
What asvs level is for applications that fall under hipaa : An attacker will create a package name or domain name that is intentionally and maliciously similar to a widely-used software component and use that

Reviews

Write a Review

Computer Engineering Questions & Answers

  How were cache directories implemented in memory hierarchy

Define the cache states used in Dash. How were the cache directories implemented in the memory hierarchy?

  Display the impact speed of the first three bounces

Write test and run a c++ Program that calculation and display the impact speed of the first three bounces and the rebound height of each bounce.

  What do you know about the identity of the sender

Assuming that you trust the CA who signed the certificate, after verifying the signature, what do you know about the identity of the sender of the certificate?

  What could be done to minimize their impact on the system

Identify and discuss the key Threat Agents. What could be done to minimize their impact on the system

  Discuss which model you would use and why

First find a use case for time series analysis. Once you have identified an interesting use case, describe the use case, how time series analysis can be uses.

  Prepare a mips asm program that requests for three numbers

Prepare a MIPS asm program that requests for three numbers from the user. Month, Day, and Year. You may assume that a valid date is given.

  Install a virtualization software on your pc

Practice SAS programming and to do different kinds of experiments - You will get a prompt to connect your SAS University Edition software

  Write a routine to list out the nodes of a binary tree

Write a routine to list out the nodes of a binary tree in level-order. List the root, then nodes at depth 1, followed by nodes at depth 2, and so on.

  Describe the operation of virtual memory management

Describe the operation of virtual memory management. What is memory protection, and why is it needed? What factors complicate it?

  Calculate the effect on space of the given method

With a given load factor, calculate the effect on space of this method, as a function of the number of words (except links) in each entry.

  Discuss value of seeing issue from different point of view

Discuss the value of seeing an issue from different, and often opposing, points of view and the skills and knowledge you gained from taking this course.

  Produce the context diagram for system

Produce the context diagram for system.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd