What privacy considerations may impact the handling

Assignment Help Management Information Sys
Reference no: EM133438054

Scenario: Peer-to-Peer File Sharing

The organization prohibits the use of peer-to-peer file sharing services. The organization's network intrusion detection sensors have signatures enabled that can detect the usage of several popular peer-to-peer file sharing services. On a Monday evening, an intrusion detection analyst notices that several file sharing alerts have occurred during the past three hours, all involving the same internal IP address.

1. What factors should be used to prioritize the handling of this incident (e.g., the apparent content of the files that are being shared)?

2. What privacy considerations may impact the handling of this incident?

3. How would the handling of this incident differ if the computer performing peer-to-peer file sharing also contains sensitive personally identifiable information?

Once you sign up for a scenario number:

1. Carefully read the scenario, and the 4 questions listed below and reflect on these 4 questions by relating the questions to your specific scenario.

Question 2 - Detection and Analysis: What does the incident response team look at during the initial analysis of a validated incident?

Question 3 - Containment, Eradication, and Recovery: What should be done to contain the incident? Why?

Question 4 - Post-Incident Activity: Who should be invited to attend the lessons learned meeting regarding this incident? And when should the lessons learned meeting be held?

Reference no: EM133438054

Questions Cloud

Why would a company want to utilized building block : Why would a company want to utilized Building block technology (Software Building Blocks, Hardware Building Blocks, and Networks & Communications Building Block
How innovations in building block technologies impact : How innovations in building block technologies impact risk and risk management for devices and endpoints in the Internet of Things.
What regulations require compliance audits : What regulations require compliance audits? Who performs compliance audits? What is the role of IT in a compliance audit? What are the penalties
What reference architecture is globally used : What reference architecture is globally used by organizations to design and assess cloud services and infrastructure
What privacy considerations may impact the handling : Who should be invited to attend the lessons learned meeting regarding this incident? And when should the lessons learned meeting be held
What about the impact of marketing on climate change : What about the impact of marketing on climate change? Provide examples of how marketing can influence climate change
Neurologic-Cardiovascular- Pulmonary surgeon : Dr. Butler is a physician who operates on hearts. He trained as a ( neurologic, cardiovascular, pulmonary) surgeon.
Develop the possible case of pyramid sales : Develop the possible case of pyramid sales Explain the selling perspectives on the dimensions of sales triad Docket the requisite selling skills needed
What type of policy should you apply to an alert : What type of policy should you apply to an alert is generated when a single user performs an unusual number of uploads and downloads in a short amount of time

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd