Wilmington University Cyber Security Incident Response Discussion

User Generated

fvqvqvnx

Computer Science

Description

Article: Read CREST “Cyber Security Incident Response Guide” (Links to an external site.)

2014 Cyber Security Session 24 - Cyber Security Incident Response (Links to an external site.)

  • Using what you have learned about Cyber Security Incident Response from the assigned reading, video, and report, think about the following Lockheed-Martin’s Cyber Kill Chain:

Reconnaissance

Weaponization

  • Delivery

Exploitation

Installation

Command and Control (C2)

Actions on Objectives

Your assignment is as follows:

Define and discuss the three steps to Cyber Security Incident Response.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: CYBER SECURITY INCIDENT RESPONSE

Cyber Security Incident Response
Student’s Name
Institutional

1

CYBER SECURITY INCIDENT RESPONSE

2

Cyber Security Incident Response
Incident response to cybersecurity refers to how an organization reacts in the event of a
security breach. Incident response, in this case, acts as an approach that manages reactions after
a network security breach or a cyber-attack. The response takes place in steps including;
development of a plan, practice, and responding decisively. In the development of a plan, all
departments handling the security incident need to be involved in taking the lead in responding
to the events. The departmental representatives then need to practice their plan as a way of
responding to the incident. This is useful as it sets out clear expectation in the exercise.
Lastly, a proper response should be initiated where the stakeholders are supposed to
respond decisively. This initia...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags