Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Incident Response Paper

Using NIST's SP 800-61 "Computer Security Incident Handling Guide), develop an Incident Response Plan (IRP) that will address one or more of your security risks that you identified in your Risk Assessment.

Google and find other actual IRPs on the Internet and review to see what type of information is included. At a minimum, your plan should include the following sections:

• Roles: who will respond to the incident and notification/escalation procedures? Who is responsible for writing the IRP?

• Training: specify a training frequency

• Plan testing: How (and how often) will you test the plan?

• Incidents: What defines an "incident"?Define some security incidents that you may encounter on your network.

• Incident Notification: What happens when an incident is detected?

• Tracking/Reporting: How will you track open incidents and report when completed? What about capturing "lessons learned"?

• Procedures: Select one of your security risks identified in your Risk Assessment. Prepare procedures for addressing the incident in the event that the incident actually happens.

Address Preparation, Detection and Analysis, Containment, Eradication, and Recovery, Post-Incident Activity (see Appendix A)specific to your risk that you are identifying.

Note: there are several scenarios in the appendix of the NIST document. You can use, for instance, Scenario 11: Unknown Wireless Access Point to help develop the response procedures for wireless access, as an example. Use any of these to help flesh out your procedures.


Attachment:- Risk Assessment.rar

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92577471
  • Price:- $55

Priced at Now at $55, Verified Solution

Have any Question?


Related Questions in Management Information System

Discussion briefly describe three 3 types of errors that

Discussion : Briefly describe three (3) types of errors that can occur in JavaScript. Determine which error you believe to be the most difficult to debug. Provide one (1) example of the error you believe to be the most d ...

Answer the following questions 1 discuss in 500 words how

Answer the following Questions : 1) Discuss in 500 words, how much redaction is necessary to anonymize an electronic health record. Is it enough to redact the name? The name and address? Is a medical record like a finger ...

Respond to the following questions about the security

Respond to the following questions about the security development model, and address the following: Select 1 major component of the model, and describe the key elements. Discuss the importance of this component in the se ...

Write a minimum of 100 words for each question provide

Write a minimum of 100 words for each question, provide citation and reference for each question. - Provide two answers for each question. 1. What is your understanding of Entity Integrity Vs Referential Integrity. Illus ...

Please answer both questions with no more that 250 words

Please answer both questions with no more that 250 words for each 1. Our task in this week's conference is to discuss, mobile phones (including smart phones and tablets). with an emphasis on an auditing system for such p ...

Part 1 150-200 words with referencesplease describe a few

Part 1: 150-200 words with references Please describe a few differences between fact tables and dimension tables. In what case(s) might they be used interchangeably? Part 2: 150-200 words with references Why is it import ...

Three discussions minimum 300 words each discussionuse your

Three discussions (minimum 300 words each discussion) Use your own words when you can (personal experience), if it needs to be cited please cite it correctly 1st Discussion (minimum 300 words) IT Project Management - Pro ...

Differentiate between the browser object model and the

Differentiate between the browser object model and the document object (DOM) model. Recommend three (3) DOM methods that you believe are essential to an effective and efficient Website. List and describe three (3) DOM ob ...

Designing a network topologyplease respond to the

"Designing a Network Topology" Please respond to the following: Present real-world examples that describe the significance of designing modular, redundant, and secure network architectures. Defend your answer from a tech ...

Assignmentafter you have analysed your collected

Assignment After you have analysed your collected information, produce the following UML diagrams for proposed system as the specifications for a new automated information system for ASC. 1. Identify classes that should ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As