What should be done to contain the incident

Assignment Help Management Information Sys
Reference no: EM133468401

Assignment:

The organization prohibits the use of peer-to-peer file sharing services. The organization's network intrusion detection sensors have signatures enabled that can detect the usage of several popular peer-to-peer file sharing services. On a Monday evening, an intrusion detection analyst notices that several file sharing alerts have occurred during the past three hours, all involving the same internal IP address.

Question 1 - Preparation: What measures should be in place to attempt to prevent this type of incident from occurring or to limit its impact?

Question 2 - Detection and Analysis: What does the incident response team look at during the initial analysis of a validated incident?

Question 3 - Containment, Eradication, and Recovery: What should be done to contain the incident? Why?

Question 4 - Post-Incident Activity: Who should be invited to attend the lessons learned meeting regarding this incident? And when should the lessons learned meeting be held?

Reference no: EM133468401

Questions Cloud

Explain the man-in-the-middle attack : These two types of attacks are known as Interception or Poisoning. Mention what it is and explain how the "Man-in-the-Middle" (MITM) attack.
Discuss the principle components of a security plan : Use your supplemental reading assignments (hint: see the "Network Security Plan" article above) and other credible sources as the basis for your work.
Why does software development makes so much money : Why does software development makes so much money?
What are the 3 key characteristics of a digital ecosystem : What are the 3 key characteristics of a digital ecosystem?
What should be done to contain the incident : Detection and Analysis: What does the incident response team look at during the initial analysis of a validated incident?
How do you know if technical communication is successful : That is, how can you tell that your message reached the intended audience in the ways that you wanted?
Which would be stored in tuesday incremental backup copy : If you performed incremental backups at the end of Monday and at the end of Tuesday, which files would be stored in Monday's incremental backup copy?
Discussing information security : Find an article discussing information security (INFOSEC) and write a one-page summary of the article.
Discuss the importance of building security into software : Discuss the importance of building security into software. how can you evade associate risk with releasing insure software?

Reviews

Write a Review

Management Information Sys Questions & Answers

  How does a business stay ahead of technological advances

Technology Advancement - How does a business stay ahead of technological advances and What are the pros and cons of being on the bleeding edge with technology used in a business?

  What are the benefits of using search engines

Take a few minutes to explore the Copyright Clearing Center's Copyright Basics tutorial. Briefly describe copyright, public domain, and fair use. Provide a unique example of fair use. Provide an example of when copyright would be violated.

  The concept of territoriality and natural surveillance

How the concepts of territoriality and natural surveillance can help determine design techniques and guidelines to help deter crime.

  What is the implied cost of backordering a customer

What is the implied cost of backordering a customer? -  What would be the recommended order quantity for a 195HR14 tire with an annual demand of 1,000?

  Have you ever lost a file on your computer

Have you ever "lost" a file on your computer? Did you save it somewhere but when you came back to open it again you could not find it?

  Determine fundamental business advantages of e-business

Determine the fundamental business advantages and disadvantages of e-business and e-commerce across the business organization.

  How do you see the phenomena of big data

How do you see the phenomena of Big Data and the Internet of Things (IoT) relating to the concept of the Service-Profit Chain? How can these trends enhance

  Discuss the pros and cons of one method of transmission

Discuss the pros and cons of one method of transmission, such as Wireless Application Protocol (Search the Internet for help in wireless networks).

  What types of security policies should company m institute

What types of security policies should Company M institute to mitigate those risks? Which domains of IT infrastructure were involved during four malware events?

  As the network administrator you have been given the task

as the network administrator you have been given the task of preparing a presentation for the stakeholders of a new

  Discuss at least two specific healthcare projects

Risk is inherent in providing healthcare services. We will always deal with a certain amount of risk as we go about our work of caring for patients each day.

  A brief description of the nist cybersecurity framework

An explanation as to why organizations should seek this framework and/or certification to base their security program strategy and decisions upon.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd