Windows incident handling tools

Assignment Help Basic Computer Science
Reference no: EM132355923

Assignment: Windows Incident Handling Tools

Assignment Requirements

Responding to incidents in an efficient and repeatable manner depends on having the right tools in place before incidents occur. While there are many types of tools and utilities available for different purposes, some tools support incident handling tasks well. As a security administrator for Ken 7 Windows Limited, you have been given the task of evaluating various software tools for computer security incident response team (CSIRT) use.

You should recommend at least one tool for each of the main CSIRT categories of functional needs. You can select from the list of functional needs given below. For each software tool you should select the most appropriate functional need(s), it best meets.

Review the text sheet titled Tool Summary (provided below). After you identify the functional needs each tool fulfills, describe which tool, or tools, you would recommend for the Ken 7 Windows Limited CSIRT.

Explain the reasons for your choice.

Submission Requirements

- Format: Microsoft Word

- Font: Arial, Size 12, Double-Space

- Citation Style: APA Style

Self-Assessment Checklist

- I have identified the correct function to secure incidents of Ken 7 Windows Limited.

- I have explained and given proper reasoning for my choice of tools.

Required Resources (provided below)

- Text Sheet: Case Scenario for Rationale: Importance of Windows Access Control and Authentication

- Text Sheet: Tools Summary

- Worksheet: Match Tools to CSIRT Functional Needs

Attachment:- Windows Incident Handling Tools.rar

Reference no: EM132355923

Questions Cloud

It infrastructure and associated processes to the cloud : You're the ISSO of a Major Organization. The organization has decided to migrate their entire IT infrastructure and associated processes to the cloud.
The game for which you are making your loot box : The game for which you are making your Loot Box. A hyper-real game like God of War (PS4) would have higher resolution loot boxes,
Describe boot process of cisco ios routers : Describe the boot process of Cisco IOS routers.
Running commands against the command prompt and powershell : the advantages and disadvantages of running commands against the Command Prompt and PowerShell. Be sure to support your ideas and thoughts with references
Windows incident handling tools : Responding to incidents in an efficient and repeatable manner depends on having the right tools in place before incidents occur.
Human computer interface : Everything we touch that is electronic has a Human to Computer Interface (HCI). Some companies put a lot of effort into the user experience.
The problem of eavesdropping in traditional cryptography : How does quantum cryptography eliminate the problem of eavesdropping in traditional cryptography?
Conceptual data model of data management project : Create a conceptual data model of data management project showing the entities and relationships. Add the conceptual data model to the new section.
Define the goal and objective of business impact analysis : Define the goal and objective of a business impact analysis (BIA). Create a business impact analysis executive summary report for management.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine the length of array

Demonstrate how you would determine the length of your array. Show this through a code example you create where you use the length member.

  Advantages of breaking up a package

Using postal mail and package delivery as an analogy, answer the following questions:

  Calculate the capacitance

calculate the capacitance. What would happen to the capacitance if one of the plates were moved 0.12 cm further away from the other plate

  How many legal combinations are there for memory reads

How many legal combinations are there for memory reads, and how many pins are needed to express them? Give two answers and make a case for each one.

  What is the relationship between them

1) What is Data warehouse, OLTP, metadata. what is the relationship between them. What are the differences between them.?

  How does ebay address these problems

How does eBay address these problems?  What are the contracting costs at eBay?  Ebay claims that it has only a small problems with fraud and misuse of the system. does this imply that it is overinvesting in addressing potential contracting problems? ..

  What is the reaction of the tcp server to this\ event

Assume a TCP server expects to receive byte 2001, but it receives a segment with sequence number 2200. What is the reaction of the TCP server to this\ event? Can you justify the reaction?

  Generate a table showing the data structure

Generate a table showing the data structure for the first two respondents in the NCS-R data set.

  Discuss these elements using an example

What elements should be considered to be included in any recursive method? Discuss these elements using an example (code required) of a recursive method written by you or taken from Web. Try choosing one different from that of any posted thus far.

  Views on asian insolvency proceedings

Your views on Asian insolvency proceedings,Hong Kong, China, Taiwan, Indonesia, Malaysia, Singapore, Thailand, and Japan.

  What is the smallest negative number

given a tiny computer that has a word size of 6 bits, what is the smallest negative number that this computer can represent if it uses two's complement form

  In 2pc processing of distributed database system

In 2PC processing of distributed database system: When one site gets the Prepare message from the coordinator what does this local site react?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd