Discuss role end-users typically play in incident reporting

Assignment Help Computer Engineering
Reference no: EM132283545

Question: Topic 1: 1. Search "scholar.google" or your textbook. Discuss the technical skills required to have a CSIRT response team consisting of employees with other job duties (i.e., not a full-time CSIRT job category)? Why or why not? What factors will influence their decision? (500 words)

2. total 600 words

a) what are the phases of the overall IR (Incident response) development process?

b) What are the general stages followed by the IRP (Incident response planning )team ?

c) what are two external sources for how IRP is performed that were mentioned in the chapter?

d) What does the organizational phase of the IRP process begin with?

Topic 2: 1. Search "scholar.google" or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end-user decision to report (or not report) a potential incident? (500 words)

2. Using a web browser, visit the site www.honeynet.org. what is this website, and what does it offer the information security professional? Visit the "know your enemy" white paper series and select a paper based on the recommendation of your professor. Read it and prepare a short overview for your class. (500 words)

APA format... no plagiarism...2 references each

Reference no: EM132283545

Questions Cloud

What is this web site and what does it offer : Using a Web browser, visit the site w­w­w­.­h­o­n­e­y­n­e­t­.­o­r­g. What is this Web site, and what does it offer the information security professional?
Find the corresponding temperature in degrees : Allow the user to enter a series of temperatures in degrees celcius terminated by the input of -999.
Describe-document and flowchart the existing process : Describe, Document and Flowchart the existing process. You may use a software tool for flowcharting (see Resources at the end).
Write an expanded definition - wind turbine : Write a complete expanded definition in the space provided. Your expanded definition should consist of four paragraphs - Write the main details
Discuss role end-users typically play in incident reporting : Topic 2: 1. Search "scholar.google" or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged.
Draw an er diagram using the idef1x notation : Draw an ER diagram using the IDEF1X Notation and ERWIN for the following two applications. .If you discover that the following
What is meant by discretionary access control list : What is meant by discretionary access control list (DACL)?
What is the meaning of root : What is the meaning of root? The superuser in Linux and UNIX systems.
Give your insight of the deadlock concept : Give your insight of the deadlock concept. Is it always a problem for the system? Is possible to avoid them?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Define the relationships between the tables

Using Microsoft Access, create the structure for each table and define the relationships between the tables.

  Calculate the private and public key

Using RSA, calculate the private and public key for the following values of p and q.

  Determine at least two windows server active directory

Determine at least two Windows Server 2012 Active Directory user creation scenarios and specify one Active Directory user object creation tool.

  Write a single statement that computes the product

Place the results in a register of the appropriate size, remember to consider efficient use of available resources.

  How is a tcp-ip network different from a telephone network

How is a TCP/IP network different from a telephone network? What is an FQDN? Why are hostnames not used on the Internet, but only FQDNs?

  Write a function revdict that takes a dictionary d

Write a function revdict that takes a dictionary D and returns a dictionary R that reverses D by mak- ing the keys into values and the values into keys.

  What are the reasons behind requiring updates from users

What are the ethical implications of updating an Operating System without informing the user?

  How can microsoft windows azure manage file services

Based on the Greiner (2010) article, how can Microsoft Windows Azure manage file services

  What interview techniques do companies employ

Watch the "Interview" video found on the student media website. What interview techniques do companies employ? From your experience, have you been in an interview when these were used? Describe the differences and the approach to being successful ..

  Describe napoleons army march toward and eventual retreat

As you do this assignment, consider the historical data visualization developed by Charles Minard describing Napoleon's army march toward and eventual retreat from Moscow (Found in this week's presentation).

  How many sticks to pick up using a random number generator

How many sticks to pick up using a random number generator, until it becomes strategic to pick up a certain number.

  Solve the given problem related to the soda can

An aluminum soda can of 150 mm in length and 60 mm in diameter is placed horizontally inside a refrigerator compartment that maintains a temperature of 4°C.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd