¶ … threat has reached an advanced stage where workstations are now sending out Personally Identifiable Information (PII) to numerous known hackers' IP addresses. Therefore, the response team must respond in a steadfast fashion. This incident response plan will provide the most organized and well-defined approach for handling this threat and tracking the sources of the attack. This plan describes and identifies steps that will be taken to determine the cause, isolate and conduct damage control, eradicate, and recover from the cause of the incident as soon as possible. The incident response team will be charged with the responsibility of implementing this plan.
Incident Response Team
An incident response team will offer a quick, orderly, and effective response to the improper disclosure of confidential information to hackers' IP addresses. In this case, the mission of the incident response team will be to prevent a serious loss of public confidence by giving and effective, skillful and immediate response to the unexpected event compromising computer information systems and databases. The incident response team will take proper steps required to contain, mitigate, and recover from the computer security incident. It is the responsibility of the team, to investigate the intrusion in a cost effective and timely manner and report the findings to the management and other relevant authorities (Kizza, 2009). The Chief Information Security Officer (CISO)...
The response crew will subscribe to a number of industry security alert services to stay abreast of relevant vulnerabilities, threats and alerts from real incidents.
Incident Response Team Members
The following members comprise the incident response team:
Information Security Officer
Information Privacy Office
Information Technology Operations Manager
Network Architect
Operating System Architect
Business Applications Manager
Online Sales Manager
Internal Auditing Expert
Incident response steps
There are six steps of response:
Preparation -- it is important for the response team to know how to implement the incident response plan. The crew must know how to respond to the incident as it can save effort and time in the end.
Identification -- the CISO must confirm that an incident has occurred. Then, he can coordinate the response team to take immediate actions. CISO will engage forensic techniques including looking for gaps in logs, reviewing system logs and reviewing intrusion detection logs to establish the cause of the incident. Here, a few authorized team members will examine the evidence (McCarthy, 2012).
Containment -- it encompasses limiting the magnitude and the scope of the incident. Because this incident could involve a malicious code, the…
...It can spot moderate to severe dysplasia (irregular tissue), "some of which may turn out to be malignant and you'll have a case of lung cancer," he explains. Patients with dysplasia can then be closely monitored, and if cancer appears, it can be treated in its earliest stages. The second diagnostic tool is an imaging agent called Nofetumomab (verluma). Approved by FDA in 1996, it can determine the extent of
Forced labor is one of the most important and at the same time intriguing "diseases" of the 21st century particularly because it should no longer be a subject for discussion considering that the 21st century should be one of technological advancements, of improvements in the living standards, as well as it the overall consideration of human life as being essential for the well-being of our future. Yet, there are constant
Business Ethics - Masters Business Administration Essay - Drawing relevant literature, critically evaluate a position debates firms responsibility maximising shareholder returns. Discuss implications chosen position a manager concerned impact company environment. Business ethics Throughout the past recent decades, the means in which the economic agents conduct their business operations have suffered some notable changes, in the meaning that less apparent emphasis comes to be placed on profits, and more on generating socio-economic
Television. Perhaps as no other medium in the history of humankind, television became such an integral part of the human condition during the latter part of the 20th century that no one today can likely imagine what life would truly be like without it. Television has certainly had a major impact on American society (Chalkey, 1993). Although many children and adults are spending more time on the computer than watching
Systems Threats 3D Systems has established themselves as a market leader in their industry. However, this industry is still in the introduction phase in the product lifecycle and still has much further to go before it reaches its next stage in the cycle. Being one of the frontrunners can be a tough position. Even though 3D Systems has established themselves, there is always the risk of new entrants. Since the technology
Organization: An emergency and disaster preparedness plan and program is an important aspect for an organization due to its significance in promoting workplace safety. The preparedness program helps in enhancing safety in the workplace through inclusion of initiatives for lessening injuries and loss of lives, minimizing insurance claims, lessening property damage, and improving employee morale. While emergencies still happen despite of measures to prevent them, an organization's preparedness plan is