How does a cirt plan help an organization mitigate risk

Assignment Help Management Information Sys
Reference no: EM131549320

Lab Assignment Worksheet: Creating a CIRT Response Plan for a Typical IT Infrastructure

Overview

In this lab, you explained how CIRT plans mitigate risks, you identified where CIRT monitoring and security operation tasks occur throughout an IT infrastructure, you identified the security controls and countermeasures that mitigate risk, and you created a CIRT response plan.

Lab Assignment Questions & Answers

1. What risk-mitigation security controls or security countermeasures do you recommend for the portion of the network for which you created a CIRT response plan? Explain your answer.

2. How does a CIRT plan help an organization mitigate risk?

3. How does the CIRT post-mortem review help mitigate risk?

4. Why is it a good idea to have a protocol analyzer as one of your incident response tools when examining Internet Protocol (IP) Local Area Network (LAN) network performance or connectivity issues?

5. Put the following in the proper sequence:

• Identification:
• Containment:
• Post-Mortem Review:
• Eradication:
• Preparation:
• Recovery:

6. Which step in the CIRT response methodology relates back to the recovery time objective (RTO) for critical IT systems?

7. Which step in the CIRT response methodology requires proper handling of digital evidence?

8. Which step in the CIRT response methodology requires review with executive management?

9. Which step in the CIRT response methodology requires security applications and tools readiness?

Reference no: EM131549320

Questions Cloud

Write a paper discussing role the computer security act play : Research the following laws that relate to computer crime. Write a 12-16 page paper discussing the role The Computer Security Act play in computer crime.
Why can we just calculate the maximum value : Lab Session 7 STATS 220- Why can we just calculate the maximum value for the whole file, rather than having to focus just on the retweet_count column?
Discuss the thecb accountability system : In the article, Differences in Black faculty rank in 4-year Texas Public Universities: A multi-year analysis by Jones and Slate (2014).
What is the demographic factors : Within the article, College Major Choice in STEM: Revisiting Confidence and DemographicFactors, by Moakler and Kim (2014), the researchers sought to determine.
How does a cirt plan help an organization mitigate risk : How does a CIRT plan help an organization mitigate risk? Which step in the CIRT response methodology requires proper handling of digital evidence?
Es technology in professional ?elds : In our discussion of expert systems (ESs) we saw that the increased use of ES technology in professional ?elds has generated some ethical and social concerns.
Create a list of benefits that the business can expect : Create a list of benefits that the business can expect to achieve from implementing the proposed solution.
Explain quasi-experimental design of independent variable : Ofulue (2011) did a quantitative study to identify barriers with the use of Information Communication Technology for bridging the gap in communication.
Should you approach regulation as risk to information system : Should you approach regulations as a risk to information systems? Do you see regulations as important measures to strengthen information security.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Research googles attempt to buy into wireless

Case Analysis 4 - Google: Research Google's attempt to buy into wireless via the 700 MHz Spectrum Auction. Why did Google make this move? What do they hope to accomplish

  What security arrangements would you look for

what security arrangements would you look for - Security is important. If you were considering using a service provider

  The challenges of incorporating crowdsourcing in a design

Analyze and discuss at least three (3) challenges of incorporating crowdsourcing in a design project.

  Discuss current trends in medical technology

Research and discuss 1 piece of federal legislation that has affected the use of medical technology.

  Importance of mis in relation to data-driven decisions

Explain the importance of MIS in relation to data-driven decisions. Describe the techniques and tools that can be utilized to manage the data. Include at least 2 effective techniques and 3 effective tools

  Develop your own abstract for article

Develop your own abstract for article - A systematic review of social networks research in information systems: building a foundation for exciting future research. All the articles will most likely already have an abstract developed by the original ..

  Discuss possible risk mitigation strategies based on finding

Discuss possible risk mitigation strategies based on your findings for it security risk management and discussions in case study 1 & 2.ensure your references page contains at least 6 sources. Make sure you are using at least two (2) ADDITIONAL academ..

  Discuss the key storage and retrieval techniques

From the first e-Activity, evaluate the efficiency, speed, and accuracy of the storage and retrieval techniques that two (2) search engine organizations currently use. Imagine that the Chief Operating Officer (COO) of a new search engine organizat..

  Strategy implementation of the company

Strategic Planning help - Do the strategic toolkit as it relate specifically to Strategy Implementation

  Explain the role of the vendor

SDLC Methodology and Purchasing Life Cycle - Explain the role of the vendor for each of the three phases of the purchasing life cycle.

  Describe the security breach of customer information

Describe the security breach of customer's information at the company you researched. Explain how the lessons learned may apply to other companies, both large and small. Put special emphasis on how such a security breach can affect small companies..

  How the knowledge gained in the two subjects

Assume you are a Project Manager/ Scrum Master with a IT Organization. Write a summary how the knowledge gained in the two subjects mentioned below (Operations Security and Security Architechture & Design) has helped the candidate to successfully ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd