Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment: Investigating and Responding to Cyber Crime Incidents Report

The United States National Institute of Standards and Technology (NIST) is a recognized authority for providing security standards, guidelines, and procedures. NIST provides a large array of other security-related documents which are of great value to information security professionals.

For this assignment, you will review a brief scenario and write a 4- to 5-page report, which will consist of a memo to management and an incident response plan. You will use NIST SP 800-61 Revision 2 document for creating an incident plan.

Scenario

Unified Manufacturing and Engineering is a manufacturer and supplier of widgets across the continental United States. Recently, the company has laid off several employees, which left many in the company in a disgruntled state. Now, the information technology (IT) staff has reported to management a significant spike in network attacks numbering in the thousands. Reports from the intrusion detection system indicate that two of these potential attacks may have compromised highly classified plans for a new prototype widget, which is expected to revolutionize the market. IT staff suspects that the attacks and potential security breach may have something to do with the recently laid off staff.

Tasks:

Write a 4- to 5-page report that addresses the following aspects:

Part I: Memo

• Prepare a memo to management regarding the security breach (approximately 2 pages). Your memo should:

o Describe the security breach.
o Assess and explain the expected plan of action of how the security breaches should be investigated.
o Outline all the steps that should occur at each phase of the investigation.

Part II: Incident Plan

• Download the NIST SP 800-61 Rev. 2 and refer to Section 3 on page 21.

http://dx.doi.org/10.6028/NIST.SP.800-61r2

• Prepare an incident response plan (approximately 2-3 pages) that includes:

o A description of the specific measures that would be taken to investigate a security breach

o An explanation of steps taken for prevention to secure the company's information systems

Your final deliverable will be in a Microsoft Word document approximately 4-5 pages in length and utilize at least two scholarly/professional sources (beyond the textbook and the referenced NIST document) in your research. Your paper should be written in a clear, concise, and organized manner, demonstrate ethical scholarship in accurate representation and attribution of sources, and display accurate spelling, grammar, and punctuation.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92166078
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Management Information System

Identify the high level logical modules in the system and

Identify the high level logical modules in the system and the relationships between them. You can concentrate on part of a system and not a whole complex system, as long as you can come up with at least 5 high level logi ...

Assignment description step one perform a web search on

Assignment Description: Step One: Perform a web search on healthcare data retention and data storage. (HINT: AHIMA has several articles on data retention and data storage) Step Two: Scenario: You are the HIM director of ...

Background kirk 2016 designed his text to help understand

Background: Kirk (2016) designed his text to help understand the four steps involved in working with data. Kirk (2016) Discuss the following working with data steps: Data acquisition, data examination, data transformatio ...

Assignment the need for wireless standards and

Assignment : The Need for Wireless Standards and Protocols The networking field, to include wireless networking, defines many standards to govern network and wireless network operations. It is important to become familia ...

Using jython v52 draw a simple house with one door two

Using Jython V5.2 Draw a simple house with one door, two windows, walls, and a roof. Using your house function, draw a town with dozens of houses of different sizes. You will probably want to modify your house function t ...

As a junior congress person you have been asked to help

As a junior congress person you have been asked to help promote a bill to allow casino gambling in your state. There is much opposition to this bill. Using distributive bargaining, discuss the pros and cons which might a ...

Deliverables one ms word that must include an

Deliverables: One MS Word that must include an APA-formatted cover sheet. Step One - Part A: Identifying the Variables Review Chapter 17, Healthcare Data Analytics in the Oachs textbook for definitions of variables. An i ...

Recently a terminated employee used his mobile device to

Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to pres ...

For this assignment research the internet or strayer

For this assignment, research the Internet or Strayer databases for information related to improper assumptions concerning accounting information systems. Write a five to seven (5-7) page paper in which you: Based on you ...

Project 6 policy review and recommendations

Project #6 Policy Review and Recommendations Presentation Instructions This is the final phase of the case study assignments. The primary purpose of this project is for you to demonstrate your understanding of the princi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As