Preview

IncidentResponseIRStrategicDecisions

Good Essays
Open Document
Open Document
805 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IncidentResponseIRStrategicDecisions
Assignment 3: Incident Response (IR) Strategic Decisions
Strayer University
Disaster Recovery Management
CIS-359
June 02, 2014
Assignment 3: Incident Response (IR) Strategic Decisions
Incident response begins with prevention and security awareness (figure 1). In the case of malware attacks such as viruses, worms or Trojan horses, defense-in-depth plays a large role in the defense and early detection of potential threats to information systems connected to the internet. Personnel utilizing these assets also play a large role in defending and protecting these assets. Authorized users should be aware of all policies and procedures pertaining to the proper use of all networks, applications, and systems within the organization. The frequency of incidents can be greatly reduced through user awareness (Whitman, Mattord, & Green, 2014).
Preventive measures and a properly trained staff will not in itself prevent the occurrence of an incident. Therefore, it is imperative that an organization have an Incident Response Plan in place to effectively respond to incidents that may occur. When an incident has occurred and the incident response leader has been notified, specific actions need to be taken to put the incident response plan into effect.
The first step in the process is the assessment of the situation. It is during this process that the determination is made whether there is an actual incident or a false positive and notifications are made (figure 2). Correctly assessing type of incident will determine the appropriate reaction strategy. This is accomplished by conducting internal scans of the systems, checking all logs, including IDPSs and host log files (Cichonski, Miller, Grace, & Scarfone, 2012). Once the incident has been correctly identified, the Chief Information Officer (CIO) and the Chief Information Security Officer (CISO) shall be notified of the incident. The next step is implement containment procedures to limit or stop the spread of the



References: Cichonski, P., Miller, T., Grace, T., & Scarfone, K. (2012). Computer Security Incident Handling Guide . Retrieved from http://csrc.nist.gov/publications/nistpubs/800-61rev2/SP800-61rev2.pdf Mistakes of Incident Responders. Retrieved from http://www.mcafee.com/us/resources/white-papers/foundstone/wp-10-common-mistakes-incident-responders.pdf Steps for Recovering from a UNIX or NT System Compromise. (2001). Retrieved from http://www.auscert.org.au/render.html?it=1974&cid=1920 Whitman, M. E., Mattord, H. J., & Green, A. (2014). Principles of Incident Response & Disaster Recovery (2nd ed.). [Adobe Digital Editions version]. Retrieved from http://1285712625.reader.chegg.com/reader/book.php?id=2122ff3348c4b5c605e72941d860c544

You May Also Find These Documents Helpful

  • Better Essays

    The CIO has requested that we follow up with a plan that is detailing a strategy for addressing all risks identified in the previous research. This plan needs to identify controls in administration, preventative, detective and corrective. With this data, the business will be able to mitigate each risk that we identified earlier. The following paper will explain the approach to correcting the various malware.…

    • 1122 Words
    • 4 Pages
    Better Essays
  • Good Essays

    An automated response approach, in contrast, provides immediate response to detected incidents without human intervention. An automated response essentially addresses the shortcomings of a notification and manual response approach by mitigating the vulnerability between detecting and responding. Although notification and manual responses are inadequate due to its inability to address attacks in real time, there are still drawbacks for the automated response approach. The complications prevalent to the automated response approach includes false…

    • 107 Words
    • 1 Page
    Good Essays
  • Better Essays

    * User education in awareness, safe computing practices, indicators of malicious code, and response actions.…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Relationship To NIMS

    • 113 Words
    • 1 Page

    To better respond to disaster incident, FEMA decided to involve the whole community to help during a disastrous incident. “Along with the National Planning Frameworks for other mission areas, this document now describes the all-important integration and inter-relationships among the mission areas of Prevention, Protection, Mitigation, Response, and Recovery. Relationship to NIMS the response protocols and structures described in the NRF align with NIMS. NIMS provides the incident management basis for the NRF and defines standard command and management structures” (n.d., 2010.) NIMS came up with a plan to have communities work together to prevent, protect, mitigate, respond to, and recover from the effects of a disastrous incident regardless…

    • 113 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    After achieving your objectives, you typically takes steps to hide the intrusion and possible controls left behind for future visits. Again, in addition to anti-malware, personal firewalls, and host-based IPS solutions, deny business users local administrator access to desktops. Alert on any unusual activity, any activity not expected based on your knowledge of how the business works. To make this work, the security and network teams must have at least as much knowledge of the network as the attacker has obtained during the attack process.…

    • 284 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Introduction: Incident Management System (ICS) refers to a common plan of action to deal with any emergency situation, whether natural or man-made so as to save lives, minimize loss and effectively handle any related problems…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Evidence Collection Policy

    • 2535 Words
    • 10 Pages

    Whoever conducts the investigation does so in a previously mandated, official, and legally recognized manner.…

    • 2535 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Digital Forensic Evidence

    • 592 Words
    • 3 Pages

    An incident should have a different containment and eradication strategy to facilitate effective decision making. The purpose of containment is to limit the scope, magnitude and impact of an incident. There exist some incidents, like computer virus, worms and malicious code, which can spread rapidly and cause extensive damages. Disable the breach of user account, all mistrustful users must be separated from the organization system for additional investigation or analysis. Also, all systems that are being affected must be deactivated until when the incident is finally eliminated from the system. Eradicating an…

    • 592 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Incident Response Plan

    • 930 Words
    • 4 Pages

    In the age of rapidly evolving technology, it is important for all businesses, large or small, to have an incident response plan (IRP) set in place in the event of a cyber-attack. The idea of an IRP is based on preparing for and responding to unforeseen, negative events that may affect a business or organization. Today, it is more of a question of when these cyber-attacks will occur rather than if they will occur. The IRP incorporates many fundamentals to help in these instances, such as, prevention, preparation, planning, incident management, recovery, mitigation, remediation, post incident analysis, and lessons learned. It is recommended that XYZ Retail Company implement the following guidelines to best prepare for a cyber-attack.…

    • 930 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    The implementation of corrective actions is very important step in the success in reducing the risk of incident at workplace. The implementation of the corrective actions either eliminate the risk or minimise the risk to acceptable level using hierarchy of controls. The most important and careful thing to keep in mind while implementing the new corrective action is effect of these changes on the health and safety. So…

    • 672 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Conflict Management

    • 881 Words
    • 3 Pages

    Based on the situations that follow, the specific action will be taken to address and mitigate the situation.…

    • 881 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Disaster Recovery Planning

    • 2339 Words
    • 10 Pages

    In this paper, we will explore the pros and cons of basic prevention, outsourced prevention, and advanced prevention. We will also report on Implementation strategies, how to choose a method, return on investment, planning, and testing. We have also included a case study as an example of why disaster recovery planning is so important to businesses today.…

    • 2339 Words
    • 10 Pages
    Powerful Essays
  • Best Essays

    References: Venkatraman, N. (1999). Valuing the IS contributions to Business. Computer Sciences Corporation.. Ibrahim, M. S. et al. (2003). A review of disaster and crisis. Emeald Insight , 24-32. United Nations (1992). Internationally agreed glossary of basic terms related to Disaster Management. Geneva: Department of Humanitarian Affairs. Department of Irrigation & Drainage. (2007, October 14). Background. Retrieved February 27, 2011, from Laman Web Rasmi: http://www.water.gov.my/index.php?option=com_content&task=view&id=106&Itemid=508. Wikipedia, (2010), Emergency management. [Online] Available: http://en.wikipedia.org/wiki/Emergency_management (August 21, 2010) Tatum, M. (2010), What is Disaster Management? [Online] Available: http://www.wisegeek.com/what-isdisaster-managemnet.htm. (August 20, 2010). Ye, X., and Wen, J. (2009), Study on Disaster Risk Management Framework in Tourist Destination. In International Conference on Environmental Science and Information Application Technology. IEEE and Computer Society. Chatfield A T, Wamba S F & Tatano H.( 2010). E-Government Challenge in Disaster Evacuation Response: The Role of RFID. IEEE and Computer Society, 43rd Hawaii International Conference on System Sciences. pp.1-10. Post, J.E., and Altman, B.W. (1999). Managing the Environmental Change Process: Barriers and Opportunities. Journal of Organizational Change Management, Vol.4, pp.64-81. World Conference on Disaster Reduction, (2005). Hyogo Framework for Action 2005-2015. Kobe, Hyogo: UNISDR United Nations. Chen, L.-C., Liu, Y.-C., and Chan, K.-C. (2006). Intergrated Community-Based Disaster Managemnet Program in Taiwan: A Case Study of Shang-An Village. Natural Hazards, pp.209-23. Asian Disaster Reduction Center (ADRC),( 2011), Malaysia Country Report 2008. [Online] Available: "http://www.adrc.asia/countryreport/MYS/2008/malaysia2008.pdf” (January 5, 2011). Marchewka, J.T. (2010). Information Technology Project Management. Hoboken: John wiley & Sons, Inc. Careem, M., Silva, C. D., Silva, R. D., Raschid, L. and Weerawarana, S. (2007) Demonstration of Sahana: Free and Open Source Disaster Management. In Proceedings of the 8th Annual International Digital Government Research Conference. Careem, M., De Silva, C., De Silva, R., Raschid, L. and Weerawarana, S. (2006). Sahana: Overview of a disaster management system, Proceedings of the International Conference on Information and Automation, Colombo, Sri Lanka. Moe, T.L, Gebauer, F. And Senitz, S. (2007) Balanced scorecard for natural disaster management projects. Disaster Prevention and Management, Vol.16, pp.785-806. Khan, D.M. (1994). Summarized Sahih Al-Bukhari. In Ismail, M.A.-B. Sahih Al-Bukhari. Riyadh: Mataba Dar-us-Salam. pp.1079. .…

    • 4565 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    In today’s digital world, there is always an ever-increasing emphasis on information security. Cyber Security,one of the biggest challenges the IT industry is facing since its inception drives me to pursue a career in Computer security.…

    • 311 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Data Security

    • 651 Words
    • 3 Pages

    A wide variety of threats face today's computer systems and the information they process. In order to control the risks of operating an information system, managers and users must know the vulnerabilities of the system and the threats which may exploit them. Knowledge of the threat environment allows the system manager to implement the most cost-effective security measures.…

    • 651 Words
    • 3 Pages
    Good Essays