10 Pages of document in APA Format

User Generated

ertlnz

Computer Science

MSIS

Description

Using below information and prepare WORD DOCUMENT( 10 Pages) IN APA FORMAT WITH CITATION AND REFERENCES WITHOUT PLAGIARISM.


Summary:

ABC Company is a manufacturing company that produces new technology that sells online directly to customers and retailers. The system they use is a core transactional Enterprise Resource Planning system called NEDS. NEDS is similar to many core systems that provide integrated applications on a common platform for financials, managing materials, sales distribution, and production planning (similar to Oracle or SAP). NEDS is located in the Netherlands, while ABC Company is located in Florence, Kentucky. On June 15, 2018, James Hurd (ABC’s Global Security Director) was notified that NEDS was burglarized during business hours involving individuals stealing equipment including blackberries, iPhones, laptops and hard drives.Local police were notified and the incident was reported on that date. A police report only included identification of specific hardware that was stolen and several bicycles.

The burglary notification that was mailed was sent to a branch office of ABC Company in Mexico. James Hurd was notified by the Mexico office via email which included an attached electronic version of the burglary notification and police report on June 20, 2018. James Hurd recognized that the incident actually occurred 5 days earlier.

The letter contained the following information about the incident:

  • The incident occurred in the application area that provides custom application development and reporting for the ABC Company.
  • The area that was impacted involved “potential data” used for sales analysis. Data from the ABC Company had been placed on laptops while some diagnostics were being carried out.

Compromised data could have included customer or retailer information from 2002-2014 consisting of names, address, bank account data or credit card numbers, SKU product numbers, descriptions, quantities, Purchase Order numbers, and purchase price

You are part of an incident response team. You will be acting with James Hurd and you need to respond to this incident.Please complete the following:

  • Prepare an IRT charter for on-site response. Typically, organizations require a charter before an IRT can be formed.A charter is an organizational document that outlines the mission, goals, and authority of a team or committee.The charter must include the typical elements such as Executive Summary, Mission Statement, Incident Declaration, Organizational Structure, Roles and Responsibilities, Information flow, Methods, Authority and reporting.(50 pts)
  • Using the following template, create a Security Incident Response Policy granting team members full access and authority to perform forensics and to maintain a chain of custody for physical evidence containment.Develop a Security Incident Response Policy for ABC Company that will be used as your reference for your evaluation of this potential data incident.(50 pts)

Security Incident Response Team-Access and Authorization Policy Template:

Policy Statement (insert policy verbiage here)

Purpose/Objectives (Insert the policy’s purpose as well as its objective; use bulleted list of the policy definition.Define the security incident response team members and the authorizations and authority granted to them during a crisis or securing incident situation.)

Scope (Define the policy scope and whom it covers.Which of the seven domains of a typical IT infrastructure are impacted?What elements, IT assets, or organization-owned assets are within the scope of this policy? What access and authority are granted to the incident response team members that may be outside standard protocol?)

Standards (Does this policy point to any hardware, software, or configuration standards? List the hardware, software, or configuration standards here and explain the relationship of these policy to these standards)

Procedures (Explain how you intend to implement this policy across the organization. Also, define and incorporate the six-step incident approach here along with how the chain of custody must be maintained throughout any evidence collection process.)

Guidelines (Explain any roadblocks or implementation issues that you must address in this section and how you will overcome them per defined policy guidelines.)

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

attached is my answer

IRT Charter and Security Incident Response Policy for ABC Company

IRT Charter and Security Incident Response Policy for ABC Company
Course’s Name
Student’s Name
Professor’s Name
Institution
Due Date

1

IRT Charter and Security Incident Response Policy for ABC Company

2

IRT Charter and Security Incident Response Policy for ABC Company
Part 1 - IRT Charter for On-site Response
Executive Summary:
• The NEDs, the asset arranging frameworks was burglarized throughout the business
hours and taking of people additionally happened.
• The information that has been put away in the gadgets could be endangered; therefore,
we need to compute the data threats and evaluate the security issues.
Mission Statement:
The mission of the ABC Company is to harden the PC devices by keeping the
software updated, keeping secure passwords, installing antivirus protection, backing up
the data, and using Internet safety. In fact, the programming projects must be refreshed
all the out of this world with the basic updates for the infection definitions which can
influence the product effectively. It must pursue the standard strategy of keeping an
anchored secret word which will confront the issues as we don't keep most basic
passwords (She & Thuraisingham, 2007). We should dependably extend an antivirus
program in our framework which can battle the various types of infections, worms,
rationale bombs, and so forth. In these days, malware is on a blast so now the antiviruses
have additionally turned out with the unique projects for the insurance. The information
on the PC should dependably have a backup so the information is never lost regardless of
whether any bad thing happens to the PC or any gadget.
Incident Declaration:
The information is most anchored to be moved to an outside hard circle and
reinforcement consequently every now and then which will make the support up to the

IRT Charter and Security Incident Response Policy for ABC Company

3

information procedure simpler and more helpful. The global security director James Hurd
was told that NEDS was burglarized amid business hours including people taking gear
including iPhones, PCs as well as hard drives. Neighbourhood police were advised and
the occurrence was accounted for on that date. A police report just included
distinguishing proof of particular equipment that was stolen and a few bikes. The thievery
warning that was sent was sent to a branch office of ABC Company (Sankar and Rau,
2006). It is demonstrated that the majority of the infections and malware are assaulting
the framework just when the framework is presented to the web. The web has dependably
been the method for the demolition of such electronic gadgets if not dealt with them with
legitimate consideration.
Organizational Structure:
The organizational structure of the ABC Company includes the security of a
virtual machine when we have expressed a portion of the great security techniques to
keep a VM machine secured. It essentially comprises every one of the things about the
BIOS security which is been the vast majority of the occasions ignored which must not
be done in light of the fact that BIOS hacking is one of the real reasons of corporate
hacks and numerous a period organizations disregard this period of security...


Anonymous
Really useful study material!

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags