Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

This document discusses the steps taken during an incident response plan.

1) The person who discovers the incident will report it to someone who has access to this list. In turn, that person shall follow the instructions in this plan to properly document and report the incident. We anticipate the following initial contact points for incidents:
a) The helpdesk
b) IT Staff
c) IT Security Staff
d) A manager
e) A business partner
f) An outside source.

2) The responder will log:
a) Time of the call
b) The nature of the incident
c) What equipment was involved
d) How the incident was detected
e) When the event was first noticed that supported the idea that the incident occurred

3) The IT security staff responsible for incident response will call those designated on the list as appropriate for the case at hand. He/she will
contact the incident response manager using e-mail. The staff member could possibly add the following: name of system being targeted, along with operating system, IP address, and location.

4) Contacted members of the incident response team will meet or discuss the situation over e-mail and determine a response strategy.
a) Is the response urgent?
b) Is the incident real or perceived?
c) Will the response alert the attacker and do we care?
d) What type of incident is this? Example: virus, worm, intrusion, abuse, damage.
e) What data or property is threatened and how critical is it?
f) What system or systems are targeted? Where are they located physically and on the network? Incident Response Plan for PPC ITEC 6620 Information and Systems Security

5) An incident ticket will be created. The incident will be categorized into the highest applicable level of one of the following categories:
a) Category one - A threat to public safety or life.
b) Category two - A threat to sensitive data.
c) Category three - A threat to computer systems.
d) Category four - A disruption of services.

6) Team members will establish and follow one of the following procedures basing their response on the incident assessment:
a) Worm response procedure
b) Virus response procedure
c) System failure procedure
d) System abuse procedure
e) Property theft response procedure

The team may create additional procedures which are not foreseen in this document. If there is no applicable procedure in place, the team must document what was done and later establish a procedure for the incident.

7) Team members will use forensic techniques, including reviewing system logs, looking for gaps in logs, reviewing intrusion detection logs, and interviewing witnesses and the incident victim to determine how the incident was caused. Only authorized personnel should be performing interviews or examining evidence, and the authorized personnel may vary by situation and the organization.

8) Team members will restore the affected system(s) to the uninfected state.

9) Documentation-the following shall be documented:
a) The category of the incident
b) How the incident occurred, whether through e-mail, firewall, etc.
c) Where the attack came from, such as IP addresses and other related information about the attacker
d) What the response plan was
e) What was done in response?

10) Assess damage and cost-assess the damage to the organization and estimate both the damage cost and the cost of the containment efforts.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92533144
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Simple scenario bull at the beginning of each semester

Simple Scenario • At the beginning of each semester, students get a course catalogue containing a list of course offerings for the semester. Information about each course, such as professor, department, and prerequisites ...

Question part 1 answer below question with atleast 350

Question: Part 1: answer below question with atleast 350 words in APA format no plagrism and also I need two professional refrences 1) What is the power of scenario planning Part 2: answer below question with atleast 350 ...

Benefits of abating emission mb500-20acost of abating

Benefits of abating emission: MB=500-20A Cost of abating emission: MC=200+5A What are the marginal benefit and marginal cost of abatement at socially efficient level of abatement? What is the net social benefit at the ef ...

Answer the following question take a cube graph q3 and add

Answer the following Question : Take a cube graph Q3 and add both face diagonals to one of the cube faces. The resulting graph is not planar, so by Kuratowski's theorem it contains a subdivision of K5 or of K3,3. Draw th ...

Taskyour task is to implement the hangman game in python

Task Your task is to implement the Hangman game in Python. Before implementing the game, please play the game on the website mentioned above. It will help you understand the project. Project Specifications: 1) Output a b ...

Sorted golf scoresdesign a program that asks the user to

Sorted Golf Scores Design a program that asks the user to enter 10 golf scores. The scores should be stored in an Integer array. Sort the array in ascending order and display its contents. Looking for psuedocode format & ...

Discuss how today the internet has brought millions of

Discuss how today, the internet has brought millions of unsecured computer networks into communication with each other.

Question wireless transmission please respond to the

Question: Wireless Transmission" Please respond to the following: • Organizations need to be careful about their wireless transmissions and controlling the reception of the wireless signal. Discuss ways that organization ...

Where do cfos get their money newswhere do cfos get their

Where do CFOs get their money news? Where do CFOs get their money news? According to Robert Half International, 47% get their money news from newspapers, 15% get it from communication/colleagues, 12% get it from televisi ...

Question what is static and dynamic binding explain with

Question : What is static and dynamic binding? Explain with example how you can implement dynamic binding. The response must be typed, single spaced, must be in times new roman font (size 12) and must follow the APA form ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As