Preview

Week 5 Quiz

Good Essays
Open Document
Open Document
531 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 5 Quiz
1 What is the purpose of a CIRT plan? Describe what this plan does and what other plan it ties into.

The purpose of the CIRT plan is to help an organization prepare for computer incidents. Preparation helps the organization identify potential incidents. Security personnel can then identify the best responses to reduce the potential damage

2 Describe what the three models are for a CIRT plan based on the NIST SP 800-61 template.

Central Incident Response Team
Distributed Incident Response Team
Coordinating Team

3 Define three of the responsibilities that an Incident Response Team would have. List them and describe the responsibilities.

Develop incident response procedures Develop and write down how to respond to incidents. Investigate incidents Responding to incidents and fulfilling all requirements as outlined in the response procedures. Protect collected evidence Collect, store, and keep a chain of custody for any/all evidence collected during the investigation

4 As much as 80% of all incidents are a result of internal attacks. List four inappropriate usages from users

Spamming coworkers Accessing prohibited websites Purposely circumventing security policies Sending files with sensitive data outside the organization.

5 List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.

Limit what services are running on the server to only what is absolutely needed, use unique id/strong password in combination with principle of least privilege to help prevent unauthorized access, use up-to-date anti-malware software, use firewalls to prevent unauthorized access, use intrusion detection software to monitor for unauthorized access

6 Define a DRP and explain when it is invoked.

A disaster recovery plan is a plan to restore a critical business process or system to operation after a disaster. It is invoked after a disaster such as flood, tornado and hurricane.

7 Describe two CSFs for a DRP.

Management

You May Also Find These Documents Helpful

  • Good Essays

    is4680 lab #2

    • 630 Words
    • 2 Pages

    Windows Hardening Defense, starts with the basics, Log in with least amount of privileges. Always use Firewall and AV. Monitor channels for security advisories and alerts. Know your system(s). Patch early and patch often, Unpatched Systems are the lowest of low hanging fruit. Have a patch policy documented and stick with it. Review patches as they are released and determine criticality based on the exploit, threat footprint for your system(s), and whether or not there is a POC or fully weapon exploit in the wild. When possible, test patches before rolling out in production on servers. Most clients should have automatic updates enabled for the OS and any application listening on a socket or used with untrusted data (java, adobe, browsers, etc...) Servers should be updated during maintenance windows if possible and depending on criticality (of threat and server).…

    • 630 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    3.2: Outline the actions to take in response to the following situations, fires, security incidents and emergency incidents.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the LAN-to-WAN domain, closing off unused ports thru a firewall to reduce the chance of unwanted network access. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent. And run all networking hardware with up to date security patches, and operating systems.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    p1 unit 14

    • 782 Words
    • 4 Pages

    You should also describe how emergency incidents are graded for a selected public service control room including the grading categories used, and the role of call handlers and incident managers.…

    • 782 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Identify at least two types of security events and baseline anomalies that might indicate suspicious activity.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    13. To truly test the IT security team, if they know the attack is coming they can prepare for the attack.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    A CIRT plan identifies the tasks each individual team has, therefore during the review they may input critical information so that when a problem of the same category presents itself there could be steps in plan to help mitigate the response.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Environmental risks that could affect the business are obviously major storms, floods, tornados, etc. A tornado could knock out the internet and prevent Sunica Music and Movies from accessing their databases for either inventory or accounting purposes which would make running the business virtually impossible. External Risks to Sunica Music and Movies could be a struggling economy or competitor sabotage. These tend to be factors that are out of the businesses control and depend on an outside source to create them. Internal risks are things like a worker strike or employee sabotage. These are problems that are generated within the organization. A…

    • 914 Words
    • 4 Pages
    Good Essays
  • Better Essays

    In order to effectively defend the internal network, any security personnel charged with this responsibility should first consider the perimeter. Basically, the perimeter is the network boundaries, the frontier where data flows in from (and out to) other network segments (Mosson, 2009). Segments of a network are joined by routers, switches, hubs, bridges and gateways (Cole, Krutz and Conley, 2005).…

    • 1242 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Infrastructure is more secure. The first point that I will address consist on the multiple dangers that computer networks are expose, that are in majority done by hackers or somebody, that get access to servers of Windows and Linux to explode their vulnerabilities. For this reason, in general terms security; has we define the act of provide access of protection…

    • 732 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Kessler International (2000, January 4). Employees, Not Hackers, Greatest Computer Threat. Retrieved December 13, 2003, from http://www.investigation.com/articles/library/2000articles/articles18.htm…

    • 4047 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Shaw, E., Ruby, K & Post, J. (1998), The Insider Threat to Information Systems, Security Awareness Bulletin, (Vol 2-98).…

    • 2353 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    There are several different types of controls that you can take advantage of for securing your servers. Below are official guidelines from the (National Institute for Standards and Technology), or NIST.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 581 Words
    • 2 Pages

    In User Domain the people are often the weakest link in IT security. In Workstation Domain is vulnerable if not kept up to date. In LAN-to-WAN Domain IP addresses are accessible from anywhere in the world, and attackers are constantly probing public IP addresses. They look for vulnerabilities and when one is found, they pounce. In Remote Access Domain is vulnerable to authentication because when the user provides credentials to prove identity, if found the attacker can later use them to impersonate the user. Also when data is passes between the user and the server. In WAN Domain is the same vulnerabilities as LAN-to-WAN Domain. In System/Application should remove unneeded services and protocols, change default passwords, and regularly patch and update the server systems.…

    • 581 Words
    • 2 Pages
    Good Essays