Prepare a memo to management regarding the security breach

Assignment Help Management Information Sys
Reference no: EM131353195

Assignment: Investigating and Responding to Cyber Crime Incidents Report

The United States National Institute of Standards and Technology (NIST) is a recognized authority for providing security standards, guidelines, and procedures. NIST provides a large array of other security-related documents which are of great value to information security professionals.

For this assignment, you will review a brief scenario and write a 4- to 5-page report, which will consist of a memo to management and an incident response plan. You will use NIST SP 800-61 Revision 2 document for creating an incident plan.

Scenario

Unified Manufacturing and Engineering is a manufacturer and supplier of widgets across the continental United States. Recently, the company has laid off several employees, which left many in the company in a disgruntled state. Now, the information technology (IT) staff has reported to management a significant spike in network attacks numbering in the thousands. Reports from the intrusion detection system indicate that two of these potential attacks may have compromised highly classified plans for a new prototype widget, which is expected to revolutionize the market. IT staff suspects that the attacks and potential security breach may have something to do with the recently laid off staff.

Tasks:

Write a 4- to 5-page report that addresses the following aspects:

Part I: Memo

• Prepare a memo to management regarding the security breach (approximately 2 pages). Your memo should:

o Describe the security breach.
o Assess and explain the expected plan of action of how the security breaches should be investigated.
o Outline all the steps that should occur at each phase of the investigation.

Part II: Incident Plan

• Download the NIST SP 800-61 Rev. 2 and refer to Section 3 on page 21.

https://dx.doi.org/10.6028/NIST.SP.800-61r2

• Prepare an incident response plan (approximately 2-3 pages) that includes:

o A description of the specific measures that would be taken to investigate a security breach

o An explanation of steps taken for prevention to secure the company's information systems

Your final deliverable will be in a Microsoft Word document approximately 4-5 pages in length and utilize at least two scholarly/professional sources (beyond the textbook and the referenced NIST document) in your research. Your paper should be written in a clear, concise, and organized manner, demonstrate ethical scholarship in accurate representation and attribution of sources, and display accurate spelling, grammar, and punctuation.

Reference no: EM131353195

Questions Cloud

What is the current value of one share of this stock : Combined Communications is a new firm in a rapidly growing industry. The company is planning on increasing its annual dividend by 23 percent a year for the next 4 years and then decreasing the growth rate to 5 percent per year. The company just paid ..
Option pricing model-call with strike price : What is the value of a 9-month call with a strike price of $55 given the Black-Scholes option pricing model and the following information?
Laborers are paid an average rate : Canfield Construction applies overhead to its projects at a rate of $88 per direct labor hour. Laborers are paid an average rate of $40 per hour. The Jefferson Apartments project was charged a total of $3,200,000 in direct materials and $680,000 in d..
Wave to travel the path apb : Show by the method of Lagrangian multipliers that the time for the wave to travel the path APB is a minimum when w/w' = sin Φ /sin Φ'.
Prepare a memo to management regarding the security breach : Prepare a memo to management regarding the security breach (approximately 2 pages). Your memo should: Assess and explain the expected plan of action of how the security breaches should be investigated.
Choose a recent outbreak or other public health emergency : Choose a recent (within the last 3 years) outbreak or other public health emergency situation that has drawn significant media attention. Describe how specific aspects of the public health infrastructure contributed to either the emergency situat..
Briefly summarize the story literacy narrative tells : Briefly summarize the story this literacy narrative tells and identify the purpose of the narrative. What point is the writer trying to prove through telling his/her story?
The debt business or non-business bad debt : Several years ago, R’s son, S, got into the restaurant business. R loaned S $10,000 to help him get the business going. No note was signed nor was any interest charged. The business was initially a huge success but as time passed, it began having fin..
Discuss the issues and concerns of gender and globalization : Choose a topic of interest that we have discussed in class or that directly relates to class conversations and readings. For this paper, your research skills will come in to play, because you are asked to incorporate three new sources outside of c..

Reviews

Write a Review

Management Information Sys Questions & Answers

  Database management software

Database Management Software - It has been said that you do not need database management software to create a database environment.

  The unique service characteristic of perishability

How is the phenomenon of online booking for travel related to the unique service characteristic of perishability?

  What concerns and potential actions the virtual company take

Write a no more 1,200 Persuasion paper discussing what concerns and potential actions the virtual company "Huffman Trucking" should take, Huffman's Trucking information

  Describe process of system development life cycle

Research the process of System Development Life Cycle. Discuss how and why an organization should apply SDLC process

  Different components of an information system

You will discuss each of the different components of an information system, and then explain how you can use the five-component model to guide your learning and thinking about information systems

  State the functional dependencies in this table

Assume that students can take multiple courses and has only one major; also assume that one course is taught by one professor. Describe deletion, update, and insertion problems for this table. In what normal form is this table?

  Why it important for it professional to have business skill

Explain why it is important for the IT professionals in the workplace to have business-related skills in addition to technical skills.

  Converging technologiesnew and converging technologies have

converging technologiesnew and converging technologies have created an information age economy and altered the way

  What information provides the basis of your decision

Is the company a dot- com success, borderline business, or failure? What information provides the basis of your decision? Why? When answering these questions, pay special attention to the company's three- year trends in revenues, costs of sales, g..

  Determine the goals in your completed diagram

Determine the goals, in your completed diagram, that require further refinement and explain why. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources

  This posting addresses computer-aided data analysis

this posting addresses computer-aided data analysis tools.today many data analysis tools are available to provide

  Define what is the role of the information and news media

Does the information media have social responsibility> If yes, in what ways? If no, why not? What is the role of the information and news media in the shaping of political opinions

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd