Discuss the form of architectural adjustments

Assignment Help Computer Engineering
Reference no: EM131998946

Assignment: Requirements: You have been working as a technology associate in the information systems department at Corporation Techs for almost three months now. Yesterday, you got an e-mail, which specified that a security breach has occurred in your company. The other members of your team also received such e-mails. You checked the firewall logs and it confirmed the security breach.

Later, your team took corrective actions in the environment. They isolated the incident and assessed the damage. Today, your manager calls you and asks you to create an executive summary report detailing the events to be presented to executive management. You need to include a summary of corrective options, which may be in the form of architectural adjustments or other configuration changes that will prevent the reoccurrence of this incident in the future.

Tasks: You need to create a post-incident executive summary report that addresses a security breach. Include an overview of actions taken at each phase of the incident response. Also include suggestions for corrective modifications that would prevent the incident from reoccurring.

Required Resources

• Textbook and Internet

• NIST SP 800-30 Guide for Conducting Risk Assessment

• Template (please download and use this template)

Submission Requirements

• Format: Microsoft Word

• Font: Arial, Size 12, Double-Space

• Citation Style: APA>

• Length: 1-2 pages>

Reference no: EM131998946

Questions Cloud

Considering expansion into new product line : Your company is considering an expansion into a new product line.
Design small business network for a primary school : Analyse and report on the current and future state of the internetworking infrastructure and its applications - Implement a process to support administration
Sexual codes of primitive tribes and behavior : To determine whether there is a relationship between the sexual codes of primitive tribes and their behavior toward neighboring tribes
The purchase of expensive piece of equipment : A firm is considering the purchase of an expensive piece of equipment. Which method would be most appropriate?
Discuss the form of architectural adjustments : You need to include a summary of corrective options, which may be in the form of architectural adjustments or other configuration changes that will prevent.
Is this quantitative or qualitative : Is this quantitative or qualitative? What would be the the best/most precise form to test (t , F , or x2 tests).
Describe your research and development activities : Describe your research and development activities and explain how they will contribute to the company.
Determine the interval that contains the middle : Use the Empirical Rule concept to determine the interval that contains the middle 68% of the heights?
Explain network design approach considering human factor : MN503 - Melbourne institute of technology - Primary School Network Design with Guest Network - Implement a process to support the administration and management

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe a method for splaying and searching for x

Describe a method for splaying and searching for x in one downward pass. Each sub step now requires that you consider the next two nodes in the path down to x.

  List the steps in the process of object-oriented design

List the steps in the process of object-oriented design that this chapter recommends for student use. Give a rule of thumb for how to find classes.

  Questionevery spring you looking forward to buying a box of

questionevery spring you looking forward to buying a box of caramel delites girl scout cookies.the troop provides an

  How each diagram relates to the solution

Your submission should include 6 to 8 pages of Visio developed UML diagrams (minimum of six different ones), hierarchy chart, and flowcharts; copy/paste into a MS Word document that also contains the pseudo code and data dictionary for the solutio..

  Develop a private web application system

Develop a private web application system that scan the confidential and classified files with multiple Anti-virus engines - It is a single web application to scan a file with multiple AV engines simultaneously and report back the analysis result.

  Sector specific challenges in crafting security policy

Compare and contrast at least two U.S. Critical Infrastructure sector specific challenges in crafting security policy

  Explore the concept of id management for the company

Your supervisor has asked you to explore the concept of ID management for the company. What is involved? How does it pertain to the topic of security?

  Developing the java program

The Java String class explains the following method in order to split a Java String object into several fragments of the substrings and store them in a returned String array.

  Write down a shell program

-Check if there is exactly 2 filenames, if not, printout error message

  Define operating system and mention some examples

Mention and explain the two main types of software. Explain each. System software consists of two primary types of programs. Define Operating System and mention some examples.

  Oriented programming paradigm is considered a better choice

express why the object oriented programming paradigm is considered a better choice than the structured programming paradigm. Does it reflect our "natural" way of thinking or do you find it artificial?

  Describe the difference between rmon 1 and rmon 2 when it

in a microsoft word document create a 2- to 3-page report on the comparison and contrast between rmon1 and rmon2 using

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd