Incidence Response Plan (cyber attack)

Dec 7th, 2015
FratBro23
Category:
Computer Science
Price: $50 USD

Question description


Purpose

It is important for an organization to be prepared to respond to a cyber-attack. An incident response plan provides this preparation.

PROJECT OVERVIEW

Since implementing a Window’s Security Model for the Big Apple Software Company, you will also need to address the organization’s incidence handling and the processes that are in place in the event their network comes under attack. Based on the knowledge you’ve obtained, formulate an Incidence Response Plan for the Software Giant. Your incidence investigation will also need to cover:

  • What happened?
  • Who did it?
  • When did it happen?
  • Where did the incident originate and where was its target?
  • How did it happen?

Finally, after you’ve formulated an incidence response plan, provide in detail a short summary to include the following:

  • Describe in detail what you have learned about incidence handling and management.
  • Do you feel your Incidence Response plan is comparable to other incidence handling management for other operating systems?

DELIVERABLES

An Incidence Response Plan for a small to mid-sized organization. The plan will be 8-10 pages in length, containing at least 5 authoritative references, and will address, at a minimum:

  1. Identification
    • Create an Incidence Reporting Form to identify and document the incident. Include in the form: general Information, type of incident and details of the event. You can use your text book or the internet to copy a sample reporting form.
    • The form should provide classification, scope and severity of the incident.
  2. Containment
    • Describe in detail identifying the incident, and how it was discovered
    • Choose a containment strategy
    • Describe what strategy was used to remove or resolve the incident
    • Keep the incident damage scope from expanding; explain how you plan to do this.
  3. Eradication
    • Provide the best course of action to eradicate each type of incident
  4. Recovery
    • Only provide a recovery strategy if this step requires restore activity


Tutor Answer

(Top Tutor) Daniel C.
(997)
School: UIUC
PREMIUM TUTOR

Studypool has helped 1,244,100 students

8 Reviews


Summary
Quality
Communication
On Time
Value
ddg82
Dec 9th, 2016
" Thanks, good work "
tinytim47
Nov 25th, 2016
" Wow this is really good.... didn't expect it. Sweet!!!! "
kenmwao2
Nov 24th, 2016
" Solid work, thanks. "
jestin7
Nov 16th, 2016
" This tutor is great! "
lilmoe415
Nov 3rd, 2016
" Thank you, Thank you, for top quality work, this is your guy!! "
dontuwannaknow
Oct 11th, 2016
" Excellent work as always thanks so much "
thargrow
Oct 2nd, 2016
" Very Satisfied. "
SjSurvivor143
Sep 28th, 2016
" Thanks for the help. "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1830 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors