Plan to properly document and report the incident

Assignment Help Management Information Sys
Reference no: EM13997847

Incident Response Plan

This document discusses the steps taken during an incident response pla

1) The person who discovers the incident will report it to someone who has access to this list. In turn, that person shall follow the instructions in this plan to properly document and report the incident. We anticipate the following initial contact points for incidents: a) The helpdesk b) IT Staff c) IT Security Staff d) A manager e) A business partner f) An outside source.

2) The responder will log: a) Time of the call b) The nature of the incident c) What equipment was involved d) How the incident was detected e) When the event was first noticed that supported the idea that the incident occurred

3) The IT security staff responsible for incident response will call those designated on the list as appropriate for the case at hand. He/she will contact the incident response manager using e-mail. The staff member could possibly add the following: name of system being targeted, along with operating system, IP address, and location.

4) Contacted members of the incident response team will meet or discuss the situation over e-mail and determine a response strategy. a) Is the response urgent? b) Is the incident real or perceived? c) Will the response alert the attacker and do we care? d) What type of incident is this? Example: virus, worm, intrusion, abuse, damage. e) What data or property is threatened and how critical is it? f) What system or systems are targeted? Where are they located physically and on the network? Incident Response Plan for PPC ITEC 6620 Information and Systems Security © 2012 Laureate Education Inc. 2

5) An incident ticket will be created. The incident will be categorized into the highest applicable level of one of the following categories: a) Category one - A threat to public safety or life. b) Category two - A threat to sensitive data. c) Category three - A threat to computer systems. d) Category four - A disruption of services.

6) Team members will establish and follow one of the following procedures basing their response on the incident assessment: a) Worm response procedure b) Virus response procedure c) System failure procedure d) System abuse procedure e) Property theft response procedure The team may create additional procedures which are not foreseen in this document. If there is no applicable procedure in place, the team must document what was done and later establish a procedure for the incident.

7) Team members will use forensic techniques, including reviewing system logs, looking for gaps in logs, reviewing intrusion detection logs, and interviewing witnesses and the incident victim to determine how the incident was caused. Only authorized personnel should be performing interviews or examining evidence, and the authorized personnel may vary by situation and the organization.

8) Team members will restore the affected system(s) to the uninfected state.

9) Documentation—the following shall be documented: a) The category of the incident b) How the incident occurred, whether through e-mail, firewall, etc. c) Where the attack came from, such as IP addresses and other related information about the attacker d) What the response plan was e) What was done in response?

10) Assess damage and cost—assess the damage to the organization and estimate both the damage cost and the cost of the containment efforts.

Reference no: EM13997847

Questions Cloud

What type of object is a dog : For this exercise, consider a different example of an object - a dog. what type of object is a dog what are some of the attributes of a dog
What is an advantage of bonuses over merit-based pay plan : Which of the following statements is true of the job characteristics model?
Benefits of data protection controls : Based on what you have learned about data protection in an online environment, prepare a 5-slide presentation to a department head or the CEO of a company to convince the audience that data protection controls would benefit their business.
What arrow represents the net electric force acting : Three charges of equal magnitude are arranged as shown in the picture. What arrow represents the net electric force acting on the charge at the center?
Plan to properly document and report the incident : The person who discovers the incident will report it to someone who has access to this list. In turn, that person shall follow the instructions in this plan to properly document and report the incident. We anticipate the following initial contact poi..
Which of the following does an organization chart do : A group of employees in American Game Technology Inc., a manufacturer of gaming machines, got together to arrange a paper recycling drive in the office. Though they came from different departments, they shared a common belief in environmentalism, ..
Determine the magnitude and direction of the magnetic field : As shown in the figure below, two long parallel wires (1 and 2) carry currents of I1 = 3.02 A and I2 = 5.35 A in the direction indicated. Determine the magnitude and direction of the magnetic field at a point midway between the wires (d = 10.0 cm).
How many lines are actually seen in the spectrometer : How many spectral lines should result considering all possible transitions? How many lines are actually seen in the spectrometer? How many of these are visible to a human eye?
What is the work done on the particle by the force : What is the impulse that you give to the particle as it moves from x = -1.00 m until it reaches x = 18.00 m. Remember that impulse is a vector, so in 1-dimension it can be either positive or negative.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Using the internet research the business uses of cloud

1. article reviewin this article review you will describe one thing about prototyping that surprised you the most. find

  Repeat the process until the code successfully validates

Using http://validator.w3.org/#validate_by_upload, validate and correct the errors in the provided HTML file.Repeat the process until the code successfully validates

  Explain a business intelligence initiative

I do no currently work, I am looking for someone with IT experience who can talk about a BI in thier job, that can clearly write about the following: Evaluate a Business Intelligence initiative that has been undertaken within your organization. Ho..

  Role of a chief security officerwhat is the role of a chief

role of a chief security officer.what is the role of a chief security officer and why is this organizational role a

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Mobile computing and social networksthere are thousands of

mobile computing and social networksthere are thousands of iphone apps ipad apps and android apps that have been

  Evaluate your organization''s current sourcing strategy

Supply chain and sourcing strategy - What approach would you take if asked to re-evaluate your organization's current sourcing strategy?

  Designing and installing an information system

Write 250 to 500 word essay, describe the four components of an information system. Why is it important to consider each of them when designing and installing an information system

  Internet has a big impact on firms and their information

What measures the people/government should take to address those concerns?

  Describe any impact of the addition of the system analyst

Describe any impact(s) of The addition of the System Analyst to the User Acceptance Testing. Any changes in duration of Online User Manual development. Addition of resources to EduSydLMS 1.0 (activity 5).

  Guidelines to insure complianceexamine the apa and research

guidelines to insure complianceexamine the apa and research guides section of the ashford writing center. discuss at

  Supply chain management into the company''s strategic plan

How the human resources assistance plan and aids you have been working on Supply Chain Management into the company's strategic plan?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd