Discuss an initial draft of an incident response policy

Assignment Help Management Information Sys
Reference no: EM131915603

Discussion: Incident Response Team (IRT) Policies

Read the following Scenario:

You work for a large, private health care organization that has server, mainframe, and RSA user access. Sean, your manager, has been asked to provide the latest version of the organization's incident response policy. To his knowledge, no policy exists. He has asked you to research and create an incident response policy over the weekend.

Discussion Requirements

• Look for at least two incident response policies for organizations of a similar type to your organization. In addition, download NIST "Computer Security Incident Handling Guide.

• Based on your research, discuss an initial draft of an incident response policy for your organization. Consider HIPAA and other health care-related compliance requirements.

• Be sure to justify the content you included in the draft policy.

• Reference your research.

Reference no: EM131915603

Questions Cloud

List different types of training such as classroom : Discussion: IT Security Policy Implementations. List different types of training, such as classroom, computer-based training (CBT), and so on.
Write a business letter : Write a letter using Microsoft Word asking a local business (real or imagined) to hold an event or to donate funds for your charity (real or imagined).
Calculate the current year overhead application rate : Billable professional staff salaries $150,000. Calculate the current year's overhead application rate under the old cost accounting system
Discuss any topic in the general area of finance : The paper should be aimed at providing your class-mates with significant depth in the subject area of your choice.
Discuss an initial draft of an incident response policy : Discuss an initial draft of an incident response policy for your organization. Consider HIPAA and other health care-related compliance requirements.
Describe a policy monitoring and enforcement strategy : Describe a policy monitoring and enforcement strategy for your organization. Describe legal implications of ISS policy enforcement after the modified policies.
What is the maximum loan that the company will require : Dan Barnes, financial manager of SKI casts, is requesting a line of credit from the company's bank. What is the maximum loan that the company will require
Discuss the pros which might arise toward the passing : As a junior congress person you have been asked to help promote a bill to allow casino gambling in your state. There is much opposition to this bill.
What are the factors contributing to new product failure : Why do otherwise successful companies make such "mistakes"? what are some of the factors contributing to new product failure?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Assess the effectiveness of offering a reward to individuals

Assess the effectiveness of offering a reward to individuals external to the organization in exchange for them to identify vulnerabilities on a new technology.

  Describe process decomposition and flow balancing

DFDs are process diagrams that emphasize the data consumed, produced, and stored by processes under discussion. Complex processes are decomposed into their constituent elements to reveal the most elemental sub-processes and their use of data atoms..

  Identify root causes of problems identified

Identify root causes of problems identified and offer potential solution(s). What solutions or suggestions would you offer to upper management.

  Summarize the benefits of having policy determined

Summarize the benefits of having policy determined by rules rather than by computer code.Summarize the benefits of having policy determined.

  Osi model presentation layeri need to write out a excellent

osi model presentation layeri need to write out a excellent explanation of the presentation layer of the osi model. be

  Describe the methods that organizations can implement

Assess the main policy elements governing data classification and data handling in organizations to ensure that data remain protected.

  Find the required rate of return2if rf 6 percent b 13 and

find the required rate of return2.if rf 6 percent b 1.3 and the erp 6.5 percent compute ke the required rate of

  What do you find interesting or surprising about the data

Research a TED Talks or other academic video that applies to one or more of your weekly objectives.

  Provide a real-world scenario on steganography

Provide a real-world scenario on steganography. In addition to the video, choose one other scholarly reference to support your discussion.

  State the sample size and margin of error

Determine the following information for the selected poll results and include in your initial post: URL for the website, Using your own words, state the topic of the poll in a full sentence. State the sample size and margin of error

  Analyze the sql injection steps that susan used

Describe at least two (2) tools that Susan could have used to assist her in the attack described within the case example, and suggest the key benefits that the chosen tools provide hackers. Justify your response.

  What professional certifications exist for the it auditor

What professional certifications exist for the audit professional and IT auditor? What are the CISA exam domains? What is the CISA exam?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd