Construct a process flow diagram to illustrate the process

Assignment Help Computer Engineering
Reference no: EM131976455

Assignment

Suppose that you have been alerted of a potential incident involving a suspected worm spreading via buffer overflow techniques, compromising Microsoft IIS Web servers. As the IR Team leader, it is your responsibility to determine the next steps.

Write a 5 page paper in which you:

1. Explain in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident.

2. Construct a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and identify which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

3. Construct a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and explain how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

4. Detail the incident recovery processes for the resolution of this incident.

5. Use 6 quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Summarize the various types of disasters, response and recovery methods.
• Develop techniques for different disaster scenarios.
• Use technology and information resources to research issues in disaster recovery.
• Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions.

Reference no: EM131976455

Questions Cloud

Analyze the nature and core interests of the government : Analyze the nature and core interests of the government and societal safety and competitiveness considerations in the context of national security.
Define and explain the nature of a non-current asset : Define and explain the nature of a non-current asset making reference to whether employees, brands and intellectual capital would qualify
Write report on organizational implications of erp system : ITECH5402- Enterprise Systems - Write a team report of about 3000 words on one of the following research topics. The report must include at least one case study
Discuss history and goals of the ethical standards : Provide a summary which includes the purpose, history and goals of the ethical standards. What is your initial reaction to the ethical guidelines of forensic.
Construct a process flow diagram to illustrate the process : Construct a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management.
Determine how your current place of work could benefit : Choose whether you believe a company should hire for diversity or the best qualified individual. Explain your rationale.
Where are you locating your sources : Summarize the research source's historical context, the research method, and how you located the research source.
Describe the three most important rules of media buying : Describe each of the five W's for your media planning. Describe the three most important rules of media buying and why they apply to your client.
What risks will be covered in the plan : Describes the goals and objectives of your selected ERM risk framework (high level benefits and outcomes from the project) .

Reviews

Write a Review

Computer Engineering Questions & Answers

  What are the advantages of using voip

Conduct an Internet search to locate a case study that shows how VoIP was beneficial to the organization.

  Develop block diagrams for floating point add pipeline

Develop the detailed block diagrams for each of the stages in the floating-point add pipeline of Figure. Assume the IEEE standard representation.

  Which wireless lan technology would you recommend

Which wireless LAN technology would you recommend? Where would you place the access points? Where would you place the wired backbone?

  Write a program that displays a graphical user interface

Write a program that displays a graphical user interface (Windows form) that allows multiple names, e-mail addresses, and local phone numbers to be entered.

  What program-editing tools are included

What program-editing tools are included? What tools are available to support runtime debugging? What DBMSs can be accessed by application programs?

  Talk about the different reasons why lte is better than 3g

talk about the various reasons why lte is better than 3g and various improvements of lte -- what they are -- are they

  Explain when you would use a scsi drive

Discuss the questions and topics related to interface communications. Explain when you would use a SCSI drive. When you would have a need to use RAID? Explain.

  Write a function definition for a void function called echo

Write a function definition for a void function called echo such that the following function call will echo the input described in and will echo.

  Explain your experience installing the microsoft office

write a short paragraph in which youquestion 1 describe your experience installing the microsoft office suite software.

  The target is one to two sentences

create 10 test cases and explain the purpose of each of them. The purpose is one to two sentences. For example the purpose of (3,4,5) is to test that the program correctly identifies a right angle (9+16 = 25).

  Discuss the best practices for securing wireless networks

Compare and contrast the best practices for securing wireless networks versus hard-wired networks

  What is meant by an exception on a microcomputer

What is meant by an "exception" on a microcomputer/microcontroller, and what are the two kinds of exceptions

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd