Description
1)
Module 6 Discussion Question
Search "scholar.google.com" or your textbook. Include at least 250 words in your reply. Indicate at least one source or reference in your original post. Discuss ways organizations have built a CSIRT. What are the components to building an effective and successful CSIRT team?
Include at least 250 words in your posting and at least 250 words in your reply. Indicate at least one source or reference in your original post. Please see syllabus for details on submission requirements.
2)
Using a Web browser, search for“incident response training.”Look through the first five results and identify one or two companies that offer such training. Pick one company and look at the course offerings. Locate a course that can train you to create a CSIRT. How many days will that course take?
- A minimum of 500 words and 1 scholarly source (in-text citations and reference page required).
- Use 12 point Times New Roman
- DO NOT include charts or graphs
- Do your own work! Plagiarized work will receive an automatic 0 with no change for resubmission. There are no excuses for plagiarized work. Do not copy from internet sources or use work from your peers. Read, learn, analyze and discuss what you have learned in your own words. This is important!
Explanation & Answer
Attached.
Module 6 Discussion Question
Name
Institution Affiliation(s)
MODULE 6 DISCUSSION QUESTION
2
Module 6 Discussion Question
In the past decade, there has been a lot of laxity on the basic idea of having a dedicated
computer security response team (CSIRT) compared to the present days. CSIRT is different
when compared to the ancient security operation center (SOC). The difference is because
traditional SOC mainly focused on the detection of a threat and analysis of it. Still, CSIRT is a
cross-functional response team, which is made up of specialists dealing with any security threat.
The CSIRT also has a duty of fulfilling the non-technical responsibilities, such as acquiring a
more comprehensive set of skills from the personnel.
Many organizations have built their computer security response team in a variety of ways.
For an incidence response to be successful, it must contain the right mixture of technical
expertise personnel, appropriate processes, and advancement in technology (Pfleeger, 2017).
Organizations have come to analyze the behavior of an attacker, thus preventing them from
future attacks. The organizations have built a stronger response team tasked with the
management of threats and attacks and also monitoring the network for any instance of intrusion.
The organizations have also ensured that there are adequate processes in the CSIRT system by
seasoning the IT professionals coming to the job. The successful organization ensures that they
have operational me...