Preview

Week 5 Quiz

Good Essays
Open Document
Open Document
531 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 5 Quiz
1 What is the purpose of a CIRT plan? Describe what this plan does and what other plan it ties into.

The purpose of the CIRT plan is to help an organization prepare for computer incidents. Preparation helps the organization identify potential incidents. Security personnel can then identify the best responses to reduce the potential damage

2 Describe what the three models are for a CIRT plan based on the NIST SP 800-61 template.

Central Incident Response Team
Distributed Incident Response Team
Coordinating Team

3 Define three of the responsibilities that an Incident Response Team would have. List them and describe the responsibilities.

Develop incident response procedures Develop and write down how to respond to incidents. Investigate incidents Responding to incidents and fulfilling all requirements as outlined in the response procedures. Protect collected evidence Collect, store, and keep a chain of custody for any/all evidence collected during the investigation

4 As much as 80% of all incidents are a result of internal attacks. List four inappropriate usages from users

Spamming coworkers Accessing prohibited websites Purposely circumventing security policies Sending files with sensitive data outside the organization.

5 List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.

Limit what services are running on the server to only what is absolutely needed, use unique id/strong password in combination with principle of least privilege to help prevent unauthorized access, use up-to-date anti-malware software, use firewalls to prevent unauthorized access, use intrusion detection software to monitor for unauthorized access

6 Define a DRP and explain when it is invoked.

A disaster recovery plan is a plan to restore a critical business process or system to operation after a disaster. It is invoked after a disaster such as flood, tornado and hurricane.

7 Describe two CSFs for a DRP.

Management

You May Also Find These Documents Helpful

  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Configure routers and firewalls to deny all ping requests to reduce chances of DOS attacks and setup redundant internet connections to increase availability. Scanning of all email for malicious software and isolate anything that is…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    In the LAN-to-WAN domain, closing off unused ports thru a firewall to reduce the chance of unwanted network access. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent. And run all networking hardware with up to date security patches, and operating systems.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    p1 unit 14

    • 782 Words
    • 4 Pages

    You should also describe how emergency incidents are graded for a selected public service control room including the grading categories used, and the role of call handlers and incident managers.…

    • 782 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Lab 4

    • 581 Words
    • 2 Pages

    In User Domain the people are often the weakest link in IT security. In Workstation Domain is vulnerable if not kept up to date. In LAN-to-WAN Domain IP addresses are accessible from anywhere in the world, and attackers are constantly probing public IP addresses. They look for vulnerabilities and when one is found, they pounce. In Remote Access Domain is vulnerable to authentication because when the user provides credentials to prove identity, if found the attacker can later use them to impersonate the user. Also when data is passes between the user and the server. In WAN Domain is the same vulnerabilities as LAN-to-WAN Domain. In System/Application should remove unneeded services and protocols, change default passwords, and regularly patch and update the server systems.…

    • 581 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    In order to effectively defend the internal network, any security personnel charged with this responsibility should first consider the perimeter. Basically, the perimeter is the network boundaries, the frontier where data flows in from (and out to) other network segments (Mosson, 2009). Segments of a network are joined by routers, switches, hubs, bridges and gateways (Cole, Krutz and Conley, 2005).…

    • 1242 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Week 4 quiz

    • 604 Words
    • 3 Pages

    7. When the researcher measures a behavior that needs to be changed, applies therapy and measures the behavior again, and then removes the treatment and measures the behavior again, this is referred to as ABA design.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    13. To truly test the IT security team, if they know the attack is coming they can prepare for the attack.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Environmental risks that could affect the business are obviously major storms, floods, tornados, etc. A tornado could knock out the internet and prevent Sunica Music and Movies from accessing their databases for either inventory or accounting purposes which would make running the business virtually impossible. External Risks to Sunica Music and Movies could be a struggling economy or competitor sabotage. These tend to be factors that are out of the businesses control and depend on an outside source to create them. Internal risks are things like a worker strike or employee sabotage. These are problems that are generated within the organization. A…

    • 914 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Infrastructure is more secure. The first point that I will address consist on the multiple dangers that computer networks are expose, that are in majority done by hackers or somebody, that get access to servers of Windows and Linux to explode their vulnerabilities. For this reason, in general terms security; has we define the act of provide access of protection…

    • 732 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Kessler International (2000, January 4). Employees, Not Hackers, Greatest Computer Threat. Retrieved December 13, 2003, from http://www.investigation.com/articles/library/2000articles/articles18.htm…

    • 4047 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    3.2: Outline the actions to take in response to the following situations, fires, security incidents and emergency incidents.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Cyber Crime

    • 3651 Words
    • 15 Pages

    Ø HACKING Ø DENIAL OF SERVICE ATTACK Ø VIRUS DISSEMINATION Ø SOFTWARE PIRACY Ø PORNOGRAPHY Ø IRC Crime Ø CREDIT CARD FRAUD…

    • 3651 Words
    • 15 Pages
    Powerful Essays