Question

In: Computer Science

Discussion Requirements You are provided a handout that describes a scenario in which an incident occurred...

Discussion Requirements

You are provided a handout that describes a scenario in which an incident occurred along with corrective actions taken. The handout also includes a description of the phases of information security incident response.

Tasks

Discuss the phases of a typical information security incident response. Using the information presented in the handout, discuss the following questions:

What are the effective responses to a security breach?

Which actions you would recommend for each phase?

Summarize your thoughts in a Microsoft Word document checking for spelling and grammar, then submit it directly (cut & paste) into the discussion thread. Respond to at least two other students’ views to engage in a meaningful debate regarding their posts or to defend your post.

Required Resources

Textbook and Internet

NIST SP 800-30: Guide for Conducting Risk Assessments

Handout: Incident Response Strategies

Submission Requirements

Format: Please enter directly into the Discussion Question window

Citation Style: Follow APA

At least 300 words

Spelling and Grammar count so I suggest you first type your post into MS Word and check for spelling and grammar. You can then cut & Paste into the Discussion Question thread.

Self-Assessment Checklist

I identified effective responses to a security breach.

I recommended at least one action for each phase.

I responded to at least two other students’ views to engage in a meaningful debate regarding their choices or to defend my choices.

Solutions

Expert Solution

What are the powerful reactions to a security break

- >Cybersecurity has transformed into a board level discussion,and worries over cybersecurity breaks are a bit of

what keeps C-suite administrators and Body people up amid the night.

- >It was evident that cybersecurity is never again exclusively in its space departments.it's a business

basic piece of an association.

- >Incident reaction arranging is never again discretionary, the thing an association needs when they have

experianced a break is to hysterically endeavor to perform harm control in the midst of the mayhem that as a rule takes after such occasions.

- >Those association who are not react to a break will aggravate the damage.and there is an opportunity to in the end aftermath.

There are some essential of the fundamental components for the successful reaction to a security rupture. Those are

1.Data Inventory

- >We need to realize what sort of information is being gathered. What's more, what sort of information have been handled and put away.

What's more, we need to guarantee that who has the entrance for that put away information.

- >Categorizing the information as per the level of affectability is the better one.

- >And should mindful of that, The information is moving to the cloud or not and who have the entrance and while relocating information to the cloud.

- >Before any break is ever found, Should set up a composed occurrence reaction plan,

with contribution from all partners.

- > Better to design prepare and tried ahead of time of a break, and ought to keep up no less than an arrangement survey.

- > And we ought to have a correspondence plan.

2.Organization occasional security framework and approach audits.

- >It is vital to intermittently audit security and other related approaches to guarantee vast consistence.

- >The event response plan should join a structure of the techniques for watching access and driving general audits.

- >Clear considering and quick activity is required to alleviate the harm.

3.Forming an Incident Response Team.

- >The group should comprise of a cross-segment of individuals from the accompanying organization offices.

- >Having the correct group at work is basic. Remember these variables when amassing your group: Appoint one pioneer who will have by and large

obligation regarding reacting to the break.

4.Resetting passwords

- >advising clients to change different records on which they utilize a similar secret word is the good thing.

5.Disabling system get to

- >For PCs known to be tainted by infections or other malware and hindering the records of clients that may have been associated with bad behavior.

6.Investigate.

- >You should examine each organization framework, deciding the nature and extent of the information rupture is critical. What's more, distinguishing the passageway.

7. Activities to anticipate future ruptures

->Drawing in an information security expert, which will give you a new point of view on your current practices,

and help to console clients and others that you work with.

->Speedily helping any distinguished security defects – changes ought to be reflected in information security arrangements

and preparing records (and if such archives don't exist, make them.)

->Taking off preparing to important work force to guarantee that everybody is up to speed on the most recent practices.

->Checking on courses of action with specialist co-ops to guarantee that they are liable to proper information security
commitments.


Related Solutions

For this discussion, you will create a scenario in which you are counseling a client, applying...
For this discussion, you will create a scenario in which you are counseling a client, applying techniques from Reality theory. The details of the counseling session scenario are up to you; however, note that your client must come from a diverse social or cultural background. Write the script of your hypothetical counseling session. The script must have at least 20 responses—10 from the client and 10 from you as the counselor. Your responses must align with the philosophy and goals...
You are a supervisor at your organization. A Critical Incident has occurred, and you are required...
You are a supervisor at your organization. A Critical Incident has occurred, and you are required to learn more about it. The incident will impact both you and your team of employees. As the supervisor, you will be expected to lead your team through the situation. Get ready, put your supervisor hat on, and get started. Research to find an article or articles on the topic Significant Changes in Work Schedules. The article(s) should be based on a real-world event...
he case scenario provided will be used to answer the discussion questions that follow. Case Scenario...
he case scenario provided will be used to answer the discussion questions that follow. Case Scenario Mr. C., a 32-year-old single man, is seeking information at the outpatient center regarding possible bariatric surgery for his obesity. He reports that he has always been heavy, even as a small child, but he has gained about 100 pounds in the last 2–3 years. Previous medical evaluations have not indicated any metabolic diseases, but he says he has sleep apnea and high blood...
1. Which of the following best describes a success scenario? - A statement that describes how...
1. Which of the following best describes a success scenario? - A statement that describes how certain decisions lead to success -A statement that defines what it means for the system to perform as intended   -A statement of what could go wrong within a system -A statement of who, what, when, where and how a system would fail 2. Which of the following variable types represent measurable properties of a system itself? -Input Variables -Output Variables -Exogenous Variables    -State Variables...
Which describes the various challenges provided by teams in the workforce.
Which describes the various challenges provided by teams in the workforce.
Discussion Question: Recall three on-the-job incidents in which you had difficulty listening effectively. For each incident,...
Discussion Question: Recall three on-the-job incidents in which you had difficulty listening effectively. For each incident, describe which of the following factors interfered with your listening effectiveness: Environmental barriers Physiological barriers Psychological factors Develop a list of ways you could overcome the greatest barriers that prevent you from listening more effectively Write in your own word. No copy/paste please.
For this discussion, you will need to search the internet for an article that describes a...
For this discussion, you will need to search the internet for an article that describes a financial fraud case. Define finance in your own words, what role finance has in your life, and what you hope to learn in this class. Summarize the key points in the article you found. Be sure to provide a link to the article or articles you are referencing. Does your article reference federal laws in place to discourage this type of illegal behavior? If...
Look over Samantha's Handout of Information you were provided above. Similar to how you wrote about...
Look over Samantha's Handout of Information you were provided above. Similar to how you wrote about your goals for your own Diet Analysis, use Samantha's information to answer these questions. Do you think that Samantha's diet is sufficient enough to satisfy her hunger? Suggest FOUR changes in her diet (focus on food groups, nutrients, and other specific categories) Explain how she can make each change (i.e., decrease X, increase Y, etc. and by eating specifically which types of foods -...
Discussion Learning Objectives and Outcomes You will learn the phases of incident response and the team...
Discussion Learning Objectives and Outcomes You will learn the phases of incident response and the team members involved who respond to incidents. Discussion Requirements You are provided a handout that describes a scenario in which an incident occurred along with corrective actions taken. The handout also includes a description of the phases of information security incident response. Tasks Discuss the phases of a typical information security incident response. Using the information presented in the handout, discuss the following questions: What...
which access control best describes the following scenario. your boss asked you to modify the files...
which access control best describes the following scenario. your boss asked you to modify the files and send them to him one hour. when you log into the system to find the following message. The error states that a user does not have permission to access this file contact your system administrator the error is an example of which the access control model is it a)Access Control Matrix b)Physical Acess Control c)Discretionary access control
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT