Question

In: Computer Science

Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question:...

Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!!

Question: Using a Web browser, search for “incident response template.” Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not?

Solutions

Expert Solution

In the results, I investigated and after reading both pros and Con's I'll like to suggest to go for Having a Cyber security Incident Response Team ( CSIRT ).

There are many reasons to have a CSIRT team, and based in the requirements one can have a dedicated team of a group of trained IT members of team to do the required in the real time.

In the piece I investigated, it was mentioned that in a particular research a average company looses 11.7 million per year against cyber attack, which is a good enough economic incentive to do so.

But more then anything, it's a essential need today in the era where everything is online and data is more valuable then anything, one needs to have someone in there company protecting that element.

And if in any case someone is able to bleach the system we will still need, a good amount of work to be done by a team ( CSIRT) for a proper response.

Now the work is not only a temporary but also a long term response, and it's most likely that these people will not only be responding but also be analysing for future threat's.

The template that seems to be most promising to me was, California Government Department of Technology incident response plan

Now one of the main reason for that is because it's a very simple program template, and as it's well said in management subjects and practices Keep it Simple Stupid (KISS).

The thing to remember is that, we aren't building a project for which we have a huge time band, but a very quick response to a attack.

So the simplest way to do it is, keep a simple check list ( of 17 item's) and that's what the template is.

And it's as easy to measure parameter for the drills to keep the CSIRT active even when they are waiting for a attack.

This template do provide a customer option to take the issues to put on this check list as per the attacks type, response strategies etc.

Hope it helps


Related Solutions

Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question:...
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question: Using a Web browser, identify at least five sources you would want to use when training a CSIRT. Using a Web browser, visit mitre org. What information is provided there, and how would it be useful?
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question:   ...
Please DO NOT copy-paste from other sources. answer will be checked for plagiarism. Thank you!!! Question:    Using a Web browser, visit securityfocuscom. What is Bugtraq, and how would it be useful? What additional information is provided under the Vulnerabilities tab? Using a Web browser, visit certorg. What information is provided there, and how would it be useful? What additional information is provided at cert org/csirts/?
Note: Plagiarism is strictly prohibited please do not copy paste from internet . Question 01: Prepare...
Note: Plagiarism is strictly prohibited please do not copy paste from internet . Question 01: Prepare a training method based on training and development objectives of an organization (300 words) Question 02: Prepare a program of training and development using different evaluation methods and techniques. (300 words) (PREFERABLY TO YOUR CURRENT JOB or IN YOUR OWN BUSINESS) . Note: Plagiarism is strictly prohibited please do not copy paste from internet do the second question as per chegg policy
Note: Plagiarism is strictly prohibited please do not copy paste from internet Required: Question 01: Explain...
Note: Plagiarism is strictly prohibited please do not copy paste from internet Required: Question 01: Explain SWOT ANALYSIS (150 words) Question 02: Do the SWOT Analysis of STARBUCK (500 words) . Please the SWOT Analysis of Starbuck must be each point have 5 5 sub points . Note: Plagiarism is strictly prohibited please do not copy paste from internet
Note: Plagiarism is strictly prohibited please do not copy paste from internet Required: Question 01: Explain...
Note: Plagiarism is strictly prohibited please do not copy paste from internet Required: Question 01: Explain SWOT ANALYSIS (150 words) Question 02: Do the SWOT Analysis of McDonalds (500 words) . Please the SWOT Analysis of McDonalds must be each point have 5 5 sub points . Note: Plagiarism is strictly prohibited please do not copy paste from internet
Please don't copy and paste from the internet. Thank you - What event will cause the...
Please don't copy and paste from the internet. Thank you - What event will cause the sender to initiate fast retransmit when using TCP? - Describe briefly the relationship between the round trip time (RTT) observed between a sender and a receiver and the retransmit timer used in TCP - Describe briefly the basic difference in service provided by an email server using POP3 protocol compared to an email server using IMAP protocol. Please don't copy and paste from the...
Please don't copy and paste answers from several sources. Write in your own words! Do you...
Please don't copy and paste answers from several sources. Write in your own words! Do you feel teams help or hurt creativity? Give specific examples. How should you handle a freeloader (someone not willing to do their share of the work) on a team where you are a member? Be specific. For an organization where you have worked, list three ways the organization helped you do your job. (This can be any type of organization if you have never worked.)...
DO NOT PLAGIARIZE, use outside sources, copy and paste, use other solutions that are on here....
DO NOT PLAGIARIZE, use outside sources, copy and paste, use other solutions that are on here. Please use your own words. How do you use the scientific method in your everyday life. At first this may seem strange, since you don't think that you use the scientific method at all. But by understanding the terms (like hypothesis, prediction, experiment, variables, controls, data gathering, and analysis), you should be able to relate them to something that you do. For example, some...
**** PLEASE DO NOT COPY AND PASTE FROM ANOTHER SOURCE BECAUSE THE ANSWER IS INCOMPLETE********* Introduction:...
**** PLEASE DO NOT COPY AND PASTE FROM ANOTHER SOURCE BECAUSE THE ANSWER IS INCOMPLETE********* Introduction: IN C PROGRAMMING For this assignment you will write an encoder and a decoder for a modified "book cipher." A book cipher uses a document or book as the cipher key, and the cipher itself uses numbers that reference the words within the text. For example, one of the Beale ciphers used an edition of The Declaration of Independence as the cipher key. The...
Note: Plagiarism is strictly prohibited please do not copy from internet please . Question 01: Explain...
Note: Plagiarism is strictly prohibited please do not copy from internet please . Question 01: Explain with examples what is the positive and nominative Economics (150 to 200 words) . Note: Plagiarism is strictly prohibited please do not copy from internet please
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT