Reference no: EM133818163
Assignment: Breach Analysis Simulation
Overview
In cybersecurity, data protection should be the first priority. There are two basic concepts: data at rest and data in transit. Each version of data is protected slightly differently. It may be sufficient to protect data at rest with some type of encryption that is difficult to crack over a long period of time, while the data in transit only needs to be protected until it gets past the entity that is trying to decipher it. In either case, it is important to know what to do when a breach or incident occurs. Having a strong computer incident response team (CIRT) is a valuable resource for any company. The premise behind incident response is to identify an attack, contain and eradicate its effects, and minimize the risk of incident recurrence.
What is the shortest amount of time it can take to restore the system to a safe state? The shortest amount of time might not be the most cost-effective. Therefore, the company must prioritize its actions and make sure that in trying to fix the cyber incident, it doesn't cause the company more harm. There are many incidents and actions that the CIRT needs to be ready for, so having a highly defined and well-practiced incident response plan is important for the company's well-being. Having the proper resources, whether they are personnel or information technology related, can play a role in how fast the company recovers from the incident. Being prepared for the worst possible cases, having a strong understanding of the influences of the confidentiality, integrity, and availability (CIA) triad, and knowing how the company will react to those situations could mean the difference between company survival or deeper consequences, such as company closure. Having the proper CIRT is about having the right people for the job. This does not mean that all of senior management needs to be on the CIRT. This does mean that the company must figure out what the proper makeup of the team should be. The team members must be knowledgeable in their roles as they need to be sure that the decisions they make are in the best interests of the company.
Prompt
After reviewing Breach Analysis Simulation Scenario One, address the critical elements below:
A. Reflection on CIA and Data Protection
a. Select a tenet of the CIA triad and explain how the principle applies to the scenario. Justify your response with details or examples from the scenario.
b. Explain the issues with Secure Sockets Layer (SSL) that facilitated its deprecation and how Transport Layer Security (TLS) remedies those issues. Get the instant assignment help.
B. Incident Response Plan
a. In small organizations, there typically isn't a large membership to form the CIRT. Explain how organizations with a small IT department ensure that the CIRT is prepared to handle all possible situations.