What privacy considerations may impact the handling

Assignment Help Management Information Sys
Reference no: EM133438054

Scenario: Peer-to-Peer File Sharing

The organization prohibits the use of peer-to-peer file sharing services. The organization's network intrusion detection sensors have signatures enabled that can detect the usage of several popular peer-to-peer file sharing services. On a Monday evening, an intrusion detection analyst notices that several file sharing alerts have occurred during the past three hours, all involving the same internal IP address.

1. What factors should be used to prioritize the handling of this incident (e.g., the apparent content of the files that are being shared)?

2. What privacy considerations may impact the handling of this incident?

3. How would the handling of this incident differ if the computer performing peer-to-peer file sharing also contains sensitive personally identifiable information?

Once you sign up for a scenario number:

1. Carefully read the scenario, and the 4 questions listed below and reflect on these 4 questions by relating the questions to your specific scenario.

Question 2 - Detection and Analysis: What does the incident response team look at during the initial analysis of a validated incident?

Question 3 - Containment, Eradication, and Recovery: What should be done to contain the incident? Why?

Question 4 - Post-Incident Activity: Who should be invited to attend the lessons learned meeting regarding this incident? And when should the lessons learned meeting be held?

Reference no: EM133438054

Questions Cloud

Why would a company want to utilized building block : Why would a company want to utilized Building block technology (Software Building Blocks, Hardware Building Blocks, and Networks & Communications Building Block
How innovations in building block technologies impact : How innovations in building block technologies impact risk and risk management for devices and endpoints in the Internet of Things.
What regulations require compliance audits : What regulations require compliance audits? Who performs compliance audits? What is the role of IT in a compliance audit? What are the penalties
What reference architecture is globally used : What reference architecture is globally used by organizations to design and assess cloud services and infrastructure
What privacy considerations may impact the handling : Who should be invited to attend the lessons learned meeting regarding this incident? And when should the lessons learned meeting be held
What about the impact of marketing on climate change : What about the impact of marketing on climate change? Provide examples of how marketing can influence climate change
Neurologic-Cardiovascular- Pulmonary surgeon : Dr. Butler is a physician who operates on hearts. He trained as a ( neurologic, cardiovascular, pulmonary) surgeon.
Develop the possible case of pyramid sales : Develop the possible case of pyramid sales Explain the selling perspectives on the dimensions of sales triad Docket the requisite selling skills needed
What type of policy should you apply to an alert : What type of policy should you apply to an alert is generated when a single user performs an unusual number of uploads and downloads in a short amount of time

Reviews

Write a Review

Management Information Sys Questions & Answers

  Research available logistics and inventory

Research available logistics, inventory, and warehouse management technology software tools that could be used in a supply chain.

  Explain the purpose and use of hie

Define HIE .Explain the purpose and use of HIE. Explain the 3 key forms of HIE.Explain how HIE has an impacts patient care.

  Find recent online article related to business intelligence

Find a recent online article related to a business intelligence topic. In your own words write a summary of the article. As you write your summary consider how your article relates to topics covered in the textbooks, videos, and presentations.

  Design a logical and physical topographical layout

Identify possible network infrastructure vulnerabilities. Address network vulnerabilities with the appropriate security measures.

  Write a summary of the event

you find a current event that has occurred in the last year. Your paper will be a minimum of 3 pages and include a summary of the event, the perceived impact of the event on the American Homeland Security landscape, your opinion of the event, and..

  The reflection essay is to encourage a deeper exploration

The purpose of the reflection essay is to encourage a deeper exploration of the learning videos.

  What are the risks associated with directly executing user i

3. What are the risks associated with directly executing user input ? What are the minimum steps needed to parse user input before it is allowed to be used in execution ?5. What are the risks associated with inheritance in classes ? What are generic ..

  What are the differences between emr and ehr

This sounds like a very efficient system. How quickly can patients access their own records through this system? Does EMR differ in this way then? If so how? What are the differences between EMR and EHR?

  Summarize your findings in a five-page pape

Provide a well-formulated thesis statement in your introduction paragraph. Summarize your findings in a five-page paper using proper APA formatting.

  What is financial technology

1. What is Financial Technology (FinTech)? 2. Give two FinTech applications in our daily life with brief description.

  Give the examples of loss of data due to breach of security

Give the Examples of loss of data due to breach of security.Describe the Types of data security.

  Who should lead the migration plan from an existing process

Leading Departmental Change - What should be included in the term "systems" as related to the department? Does the term include people? Explain.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd