Question

In: Computer Science

Create a 1- to 2-page IRP Microsoft Word for an IT organization. In your plan, ensure...

Create a 1- to 2-page IRP Microsoft Word for an IT organization. In your plan, ensure you:

  • Discuss roles and responsibilities.
  • Discuss the critical activities for each of the 5 phases in the incident response process.
  • List at least 3 cyber security tools that work together to monitor the organization’s network for malicious and abnormal activity.

Solutions

Expert Solution

Incidence Response refers to the process of addressing and managing of cyber attack. The goal of IRP is to handle the situation in way that reduces damage, recovery time and cost. An incident response manager is the director of IT is responsible for  prioritising actions during the detection, analysis and containment of an incident.

Roles and Responsibilities

IRP has been proven to be most effective to help organisations to respond to incidents when these three functions are in place:

1. The Computer Security Incident Response Team (CSIRT)

CSIRT refers to the process when a group of individuals are responsible for executing the technical functionalities of the IRP. CSIRT members are responsible for the detection, containment and eradication of cyber incidents of the affected IT systems.

CSIRT has three different staffing models :

- Employees : In this the organisation is capable to conduct all incident response-related activities by itself without the guidance from any external parties.

- Partially Obscured: In this method the organisation outsources certain elements of response-related activities from external parties.

- Fully Obscured : In this method the the organisation outsources all elements of response-related activities from external parties.

Important factor for setting up CSIRT :

  • IRPs requires maintaining specialised knowledge in several technical areas that are not easily available.
  • Employee retention strategies must be taken into consideration to avoid high employee turnover for any externally hired security experts.
  • Risk assessments results, critical assets must be protected.

2. The Legal Expert

The legal expert refers to the process of understanding the need and responsibilities of judicial expertise. Legal experts are required at many critical roles throughout the process of IRP but especially during the phase of drafting policies, plans and procedures. The role of a legal expert is to provide quality guidance and assurance right from the phase of formation of mission statement to the actual incident handling. During the formulation of policies and plans the lawyers inform the decision-makers about legal requirements.Overall, legal experts are concerned with being able of demonstrating due care at all times by warranting the adequacy of rules regarding the handling of confidential information, evidence and documentation. In doing so, they proactively defend the organisation against liabilities.

3. The Public Relations/Communications Expert

It is important for an organisation to have a point of contact with the media this can be more efficient if a  public relations expert who is trained on developing precise and impactful press releases is hired for updating the media about the work of the CSIRT and any remedial action taken. A personal relations expert must be properly trained on information disclosure and must be aware of the organisation’s policies.

Discuss the critical activities for each of the 5 phases in the incident response process.

5 Critical Steps for Incident Response Process.

1. Preparation : It is one of the most important phase because the pace of a cyber incident is too fast for ad hoc response and decision making processes.A strong plan must be in place to support the entire team for performing tasks.These features should be included in an incident response plan:

  • Develop and Document IR Policies
  • Conduct Cyber Hunting Exercises
  • Define Communication Guidelines
  • Assess Your Threat Detection Capability
  • Incorporate Threat Intelligence Feeds

2.Detection and Reporting : The objective of this phase is to  monitor security events in order to detect, alert, and report on potential security incidents.

3. Triage and Analysis : The aim of this step is to understand the security incident takes place during this step.Resources should be utilised to collect data from tools and systems for further analysis and to identify indicators of compromise. Individuals should have in-depth skills and a detailed understanding of live system responses, digital forensics, memory analysis, and malware analysis.

4. Containment and Organisation: This is one of the most critical stages. The aim of containment and organisation is based on the intelligence of the data gathered during the analysis phase.

5. Post-Incidence Activities : There is more work to be done after the incident is resolved. The document must be properly documented in-order to ensure prevent similar occurrences from happening again in the future.

List at least 3 cyber security tools that work together to monitor the organisation’s network for malicious and abnormal activity

1. SPLUNK ENTERPRISE SECURITY

Splunk Enterprise Security software focuses on networking threats , it also provides tools for the detection threat.The user of this product can control activities related to threats like statistical analysis and anomaly detections. Splunk provides a security software solution with SIEM to recognise and report on security threats by using alerts, monitoring, and analytical mechanism.

2. WEBSENSE TRITON

TRITON is a widely used security product that provides comprehensive network security solutions . I is capable to deal with sophisticated security breaches by detecting and preventing known security risks. Websense Content Gateway is a web proxy and cache that provides scanning and website classification. It also monitors employee access to dynamic user-generated web content.

3. NEXPOSE

Nexpose security software helps to build network security with vulnerability management. Nexpose allows the network’s administrators to monitor and reduce high-risk activity by utilising threat intelligence. Nexpose software offers a flexible and scalable deployment. Nexpose software supports automated scanning to examine any policy violations, malware, and misconfigurations within the network.


Related Solutions

Create a business plan for Mobile Health Care Organization. you are required to write a 1-page...
Create a business plan for Mobile Health Care Organization. you are required to write a 1-page Service Description (excluding the header) and a 1-page Income Statement (excluding assumptions) for your organization or service. Your assignment should not exceed these page limits. Because this course is not an accounting course, your Income Statement section can reflect only Operating Income (Revenue, Expenses, Operating Income), Basic Information for the Service or Equipment Description and Business Plan Income Statement Projections 1-page Service Description (excluding...
Based on your understanding of the topic, create a report in a Microsoft Word document answering...
Based on your understanding of the topic, create a report in a Microsoft Word document answering the following questions: What are the benefits measuring the health status of individuals aged fifteen to sixty four years in a particular community or an entire population? What effect do these benefits have on the health status of the community or the entire population? Which one health statistic has had the most significant impact on the health care profession in the entire US or...
Using Microsoft Word, create an email message to your boss that: Summarizes the requirements of the...
Using Microsoft Word, create an email message to your boss that: Summarizes the requirements of the CAPSIM Business Simulation project and describes how you will approach the project. Summarizes the requirements of the Capstone project and describes how you will approach that project. Your email should be formatted according to the guidelines. Your document should contain two paragraphs and be no longer than one page.
Management & Organization for your Grapefruit Product Private Limited Company. 1) Create a management plan for...
Management & Organization for your Grapefruit Product Private Limited Company. 1) Create a management plan for your company: List the key members of your management team, with a brief description of each person’s relevant business background, responsibilities they have in your company, and the compensation they receive. • Key Management and Employees: • Board Members and Advisors: • Management Structure and Style 2) Management Hierarchy • Using the flow chart, outline your Grapefruit Product Private Limited Company’s management hierarchy. •...
Create a 1-page fact sheet that your healthcare organization could hypothetically use to explain the health...
Create a 1-page fact sheet that your healthcare organization could hypothetically use to explain the health or nursing informatics policy/regulation you selected. Your fact sheet should address the following: Briefly and generally explain the policy or regulation you selected. Address the impact of the policy or regulation you selected on system implementation. Address the impact of the policy or regulation you selected on clinical care, patient/provider interactions, and workflow. Highlight organizational policies and procedures that are/will be in place at...
Flow chart. Create a flowchart for each situation using Flowgorithm, Microsoft Word, Microsoft PowerPoint or handwritten...
Flow chart. Create a flowchart for each situation using Flowgorithm, Microsoft Word, Microsoft PowerPoint or handwritten (handwritten), with legible handwriting. 1. Cylinder Volume (If) (15 pts.) to. Declare and initialize the required variables and required constants. b. Declare Pi as constant, declare it the correct way, according to its value, and assign it the value of. c. Declare the variable for the volume of the liquid, which will have a number real. d. Prompt the user for the radius and...
Assume that your employer asks you to create a pay for performance plan for your organization....
Assume that your employer asks you to create a pay for performance plan for your organization. 1) Describe your suggested plan. 2) OK, now that you have complied with your employers order, please evaluate the wisdom of using pay for performance in your organization. 3) Defend your evaluation.
1. Open Microsoft Word 2. On the first line, type the words Word VBA Test Bed...
1. Open Microsoft Word 2. On the first line, type the words Word VBA Test Bed 3. Save the document as WordVBATestBed.docm. (It is vital that this is a macro-enabled document.) 4. Ensure that the Developer Tab is visible. 5. Ensure that the Visual Basic Editor is setup in accordance with pages 87 and 88 in the textbook. 6. Insert a module into this document. 7. Add the Option Base 1 instruction under Option Explicit. 4. Using the Visual Basic...
write minutes of a meeting using Microsoft Word Name of the organization  Date and time...
write minutes of a meeting using Microsoft Word Name of the organization  Date and time the meeting  Those present and those who could not attend  A list of the agenda items/topics  Summary of discussion for each agenda item  The actions people committed to  Summary of any decisions made
write minutes of a meeting using Microsoft Word Name of the organization  Date and time...
write minutes of a meeting using Microsoft Word Name of the organization  Date and time the meeting  Those present and those who could not attend  A list of the agenda items/topics  Summary of discussion for each agenda item  The actions people committed to  Summary of any decisions made
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT