Incident Resource Planning Discussion

User Generated

FVQ32145

Other

University of the Cumberlands

Description

  1. Make sure to follow APA style. Please make sure your submission is 2 - 3 pages in length and meet the minimum APA formatting guidelines:

    • 12-pt, Times New Roman font
    • Double-spaced
    • 1” margins on all sides
    • Please provide a title page including your Name, Course Number, Date of Submission, and Assignment name.
    • Paraphrasing of content – Demonstrate that you understand the case by summarizing the case in your own words. Direct quotes should be used minimally.
    • Reference Section (A separate page is recommended.) Please cite the source using APA formatting guidelines. If you need guidance or a refresher on this, please visit: https://owl.english.purdue.edu/owl/resource/560/10... (link is external) Be sure to include at least three reference sources.
    • In-text citations – If you need additional guidance, please visit: https://owl.english.purdue.edu/owl/resource/560/02... (link is external)
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Explanation & Answer:
2 pages
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running Head: INCIDENT RESPONSE PLANNING
1

Incident Resource Planning
Name:
Institution:
Date:

INCIDENT RESPONSE PLANNING
2
Introduction
Incident Response is the management of I.T security incident or security breaches
through systemic and documented methods of approach. The process constitutes of the
identification, response, limitation and counteraction of security breaches as they happen. In
addition, the analysis of such situations is done to aid in the mitigation of future breaches. The
incident response makes use of three functions: Computer Security Incident Response Team,
Legal and Public relations. Within these functions, the following persons are suitable for an
incident response committee: An Incident Response Manager, Security Analyst, Threat
Researchers, and IT director, Documentation Leader, Lawyer, Human Resource and Public
Relations. ("What is an Incident Response Plan? - Definition from Techopedia," n.d.)
Incident Response Manager
The IR manager is responsible for overseeing the overall operation and ensuring that all
processes are effective in mitigating the breach. Apart from overseeing the process, they define
necessary priorities during the process such that incident is detected, analyzed and contained
properly. In addition, the manager conveys to the rest of the organization any requirements
during highly sever...

Similar Content

Related Tags