Review of notes taken from user interviews

Assignment Help Computer Networking
Reference no: EM131862557

Assignment

The LMJ-Ad corporate management has been informed by the network administrative team there was a malware/ransomware attack and infection overnight requiring the incident response team to take immediate action. The infection came from a malware attachment on a phishing email, and was reported by a user with a priority trouble ticket. Initial interviews suggest the incident may have come from an internal employee.

• In this first phase of the incident response process the incident response team must perform an incident review. Describe in detail each item below as part of the initial investigative process only to be applied to this incident:

Step 1: Review of notes taken from user interviews
Step 2: Performing risk assessments
Step 3: Creating data collection checklists
Step 4: Creation of incident timelines and investigatory scope.
Step 5: Drafting of the forensics incident response plan

As part of your descriptions, provide the specific tasks that you need to perform for steps 1 through 5. In later Units we will discuss in detail the specific investigative approach to identify, collect, preserve, analyze, and report on the incident.

Prepare a 5-6 page Word document that is APA formatted. Be sure to include all necessary aspects.

Reference no: EM131862557

Questions Cloud

What is the bond equivalent yield in percent : A bank has issued a six-month, $1,990,312 million negotiable CD with a 0.95 percent. What is the bond equivalent yield in percent?
Calculate the molar concentration of the stock solution : Calculate the molar concentration of the stock solution.
What is the ionic compound derived from the cations : What is the ionic compound derived from the cations on th eleft and each of the anions across for Na+.
Mike firm has credit rating : Mike's firm has a credit rating of A. He notices that the credit spread for five?-year maturity A debt is 91 basis points (0.91%).
Review of notes taken from user interviews : Review of notes taken from user interviews. Creation of incident timelines and investigatory scope. Drafting of the forensics incident response plan.
Decomposition of dinitrogen pentoxide : The decomposition of dinitrogen pentoxide in carbon tetrachloride solution at 30 °C
What is price of consolidated stock : What is the price of Consolidated Stock? What will be the transfer of value from the old shareholders to the new shareholders?
Consider per mole of hcl neutralized : Consider per mole of HCl neutralized; which is essentially cheaper in cost? Please demonstrate calculations specifically after the mol to mol conversions.
What is your position on the product offering : What is your position on the product offering(s)? Should Buckeye Brownies offer coffee? A more diverse product offering?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd