Describe the steps you would take post incident

Assignment Help Management Information Sys
Reference no: EM132322858

Question: Read the Opening Case Scenario called Viral Vandal.

Describe the detection and analysis steps in this case. What would you do contain and eradicate this threat?

Case: 1. Why is it critical for an organization to have a DoS attack response plan well before it happens?

2. Use the four steps of the NIST computer security process to write a summary and analysis of each of the steps in a DDoS attack scenario.

a. Step 1 - Preparation: What steps would you take to prepare for this type of incident?

b. Step 2 - Detection and Analysis: Steps you would need to take in order to detect a potential DDoS incident and confirm if the incident is accurate

c. Step 3 - Containment Eradication and Recovery: What actions do you need to take to contain and recover from a DDoS incident

d. Step 4 - Post-Incident Activity - Describe the steps you would take post incident

Required: 200-to-300 words

Reference no: EM132322858

Questions Cloud

Breakdown of the cyber forensic investigation process : 1. What is the breakdown of the cyber forensic investigation process?
What are the different aspects of cybersecurity : What are the different aspects of cybersecurity?
Lru policy after a series of following pages : How would the stack (of size 6) look like for the LRU policy after a series of following pages have gone through the system: 0 2 0 4 4 0 1 3 4 5 7 0 2 0 2
Compare and contrast the three stride variants : Compare and contrast the three STRIDE variants of (a) STRIDE-per-Element, (b) STRIDE per-Interaction, and (c) Desit.
Describe the steps you would take post incident : Read the Opening Case Scenario called Viral Vandal. Describe the detection and analysis steps in this case. What would you do contain and eradicate this threat?
Frameworks with respect to business and it strategy : Discuss the purpose, role, and use of EA Frameworks with respect to business and IT strategy
Addressed in the field of information technology : In your own opinion, what are some important ethical and societal issues that need to be addressed in the field of Information Technology?
Determine whether these keys contain duplicates or not : We have n keys in an arbitrary range. We would like to determine whether these keys contain duplicates or not. Thus if there are no duplicate keys
Briefly state and name countries identify as target victims : From this research revelation in our chapter 11, briefly state and name the countries and organizations identified as the targeted victims?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Draw a swim lane diagram showing all roles

Draw a swim lane diagram showing all roles, tasks and decisions - Create a spreadsheet to show how the information collected, during the accident of a crash, can be stored in a database.

  Describes the steps you took as an agile coach

Provide one (1) real-world example from your experience that describes the steps you took as an agile coach.

  Can one tool be used for managing more than one area

In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and(3) asset management. Compare and contrast, at least, one tool for each of the three network management are..

  Explain how ingratiation helps a negotiator

When is it a good idea to let others draw their own conclusion? When is it dangerous to let others draw their own conclusions?

  How do you know when an online transaction is secure

What should you know about website privacy? How do you know when an online transaction is secure? Why is Anti-spyware software important to my online security?

  Describe the organizational definition

Describe the Organizational Definition.A description of the organization you developed,A listing of all employee professions or disciplines,A list of the topics developed etc

  How information systems apply to the current business

Please concentrate on learning how information systems apply to the current business environment.

  The network security and users requirements

Identify the hardware and software needed to meet the network security and users requirements.

  Determine what is needed to protect and monitor

Compile a list, and describe at least 10 of the most widely used antivirus software, malware removal, and Internet security applications.

  Describe the strategy a healthcare organization can use

Describe the strategy a healthcare organization can use to lower its cost of care. What types of IT applications could they use to help them achieve this goal?

  Mayo clinic turns to game processor to save lives

Analyze the case taking a con approach to their practices - Mayo Clinic Turns to Game Processor to Save Lives

  Describe the legal implications of cyberstalking

In the Report file, define what cyberstalking means, In the Report file, describe the legal implications of cyberstalking

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd