Verified Document

Threat Has Reached An Advanced Stage Where Research Paper

¶ … threat has reached an advanced stage where workstations are now sending out Personally Identifiable Information (PII) to numerous known hackers' IP addresses. Therefore, the response team must respond in a steadfast fashion. This incident response plan will provide the most organized and well-defined approach for handling this threat and tracking the sources of the attack. This plan describes and identifies steps that will be taken to determine the cause, isolate and conduct damage control, eradicate, and recover from the cause of the incident as soon as possible. The incident response team will be charged with the responsibility of implementing this plan. Incident Response Team

An incident response team will offer a quick, orderly, and effective response to the improper disclosure of confidential information to hackers' IP addresses. In this case, the mission of the incident response team will be to prevent a serious loss of public confidence by giving and effective, skillful and immediate response to the unexpected event compromising computer information systems and databases. The incident response team will take proper steps required to contain, mitigate, and recover from the computer security incident. It is the responsibility of the team, to investigate the intrusion in a cost effective and timely manner and report the findings to the management and other relevant authorities (Kizza, 2009). The Chief Information Security Officer (CISO)...

The response crew will subscribe to a number of industry security alert services to stay abreast of relevant vulnerabilities, threats and alerts from real incidents.
Incident Response Team Members

The following members comprise the incident response team:

Information Security Officer

Information Privacy Office

Information Technology Operations Manager

Network Architect

Operating System Architect

Business Applications Manager

Online Sales Manager

Internal Auditing Expert

Incident response steps

There are six steps of response:

Preparation -- it is important for the response team to know how to implement the incident response plan. The crew must know how to respond to the incident as it can save effort and time in the end.

Identification -- the CISO must confirm that an incident has occurred. Then, he can coordinate the response team to take immediate actions. CISO will engage forensic techniques including looking for gaps in logs, reviewing system logs and reviewing intrusion detection logs to establish the cause of the incident. Here, a few authorized team members will examine the evidence (McCarthy, 2012).

Containment -- it encompasses limiting the magnitude and the scope of the incident. Because this incident could involve a malicious code, the…

Sources used in this document:
References

Kizza, J.M. (2009). A guide to computer network security. London: Springer.

McCarthy, N.K. (2012). The computer incident response planning handbook: Executable plans for protecting information at risk. New York: John Wiley & Sons.
Cite this Document:
Copy Bibliography Citation

Related Documents

Stage 4 Lung Cancer Current
Words: 2575 Length: 8 Document Type: Thesis

...It can spot moderate to severe dysplasia (irregular tissue), "some of which may turn out to be malignant and you'll have a case of lung cancer," he explains. Patients with dysplasia can then be closely monitored, and if cancer appears, it can be treated in its earliest stages. The second diagnostic tool is an imaging agent called Nofetumomab (verluma). Approved by FDA in 1996, it can determine the extent of

Organized Crime and Its Influence
Words: 15157 Length: 48 Document Type: Thesis

Organized Crime has been witnessed to prosper with the infiltration on legitimate businesses in a way that they associate themselves in order to steal from the host. Organized crime organizations execute such activities in order to generate income, sweep profits, achieve more power, and launder wealth (Abadinsky, 2009). The crimes that are committed by the individuals that are employed in the legitimate corporations are particularly known as white collar crimes.

Breast Cancer in Malaysia Breast Cancer Has
Words: 3180 Length: 11 Document Type: Essay

Breast Cancer in Malaysia Breast cancer has turned out to be one of the most common cancers in women in almost every part of the world. Nonetheless, there is a noticeable geographical difference in the incidence and also the stage of presentation. It has ben documented to be uppermost in North Europe and North America, in-between in Mediterranean nations and South America, and not high at all in Asia and Africa

Colorectal Cancer
Words: 1585 Length: 4 Document Type: Essay

Colorectal cancer is said to be one of the most common cancers in the U.S. In this text, I largely concern myself with this type of cancer. In so doing, I will amongst other things take into consideration not only its pathophysiology but also its clinical manifestations, treatment options, interventions, and expected outcomes. Colorectal Cancer: A Brief Overview The Centers for Disease Control and Prevention -- CDC (2011) observes that "of cancers

Has Computer Technology Enhanced Overall Efficiency of South Florida...
Words: 7588 Length: 28 Document Type: Term Paper

Criminal Justice Computers and Their Effects upon Police Efficiency Computer technology has transformed the modern day police department. Numerous systems now provide assistance in fields ranging from communication, to information storage and retrieval, and even allocation of personnel. Properly designed, computer applications save time and energy. They permit police officers to do the work they were hired to do - police. The various articles in this report both feature and support the

Christian Values and Business Management
Words: 27724 Length: 75 Document Type: Term Paper

Christian Biotechnology: Not a Contradiction in Terms Presented with the idea of "Bioethics" most people in the scientific community today immediately get the impression of repressive, Luddite forces wishing to stifle research and advancement in the name of morality and God. Unfortunately, this stereotype too often holds true. If one looks over the many independent sites on the Internet regarding bioethics, reads popular magazines and publications, or browses library shelves for

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now