Preview

Project Part 2 Task 3Victor SabaniITT

Powerful Essays
Open Document
Open Document
4846 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Project Part 2 Task 3Victor SabaniITT
Project Part 2 Task 3
Victor Sabani
ITT Technical Institute
1. Introduction
2. The creation of this Computer Incident Response Team (CIRT) will provide the necessary tools and experience needed for when an incident occurs. Due to the sensitive nature of the information contained herein, this manual is available only to those persons who have been designated as members of one or more incident management teams, or who otherwise play a direct role in the incident response and recovery processes.
3. Unless otherwise instructed, each plan recipient will receive and maintain two copies of the plan, stored as follows:
One copy at the plan recipient 's office
One copy at the plan recipient 's home
4. It is the responsibility of each manager and employee to safeguard and keep confidential all corporate assets.
5. The following teams will appear throughout this plan:
Threat Assessment Center
Executive Incident Management Team
Incident Management Team
6. Preparation
7. This phase as its name implies deals with the preparing a team to be ready to handle an Incident at a moment’s notice. An incident can range from anything such as a power outage or hardware failure to the most extreme incidents such as a violation of organizational policy by disgruntled employees or being hacked by state sponsored hackers (Beijtlich).
8. There are specific elements in this section that help this team against any potential issues where their performance maybe hindered in as a result;
9. a. Policy – Written policies are one of the first steps in the inception of this team. A policy provides a written set of principles, rules, or practices within an organization; Policies are one of the keystone elements that provide guidance as to whether an Incident has occurred in an organization. It can also show management buy-in and support of the team. A simple login banner can be one way to ensure that individuals attempting to log into an organization’s network will be aware of what is expected when



References: 267. Beijtlich, R. (n.d.). The Practice of Network Security Monitoring: understanding incident detection and response. [Books24x7 Version. 268. Creating a Computer Security Incident Response Team: A process for getting Started. (2006, Febuary 27). Retrieved January 2014, from Cert.org: http://www.cert.org/csirts/Creating-A-CSIRT.html 269. Incident Response Best Practices. (2008, September 25). Retrieved January 2014, from security.tennessee.edu: http://security.tennessee.edu/pdfs/IRPBP.pdf 270. Kirvan, P. (n.d.). Incident Response Plan Template. Retrieved January 2014, from SearchDisasterRecovery: http://www.SearchDisasterRecovery.com/ 271. Kral, P. (2011, December 5). Incident handlers Handbook. Retrieved January 2014, from Sans.org: http://www.sans.org/security-training/The incident Handlers Handbook 272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC. 273. Responding to IT Security Incidents. (2011). Retrieved january 2014, from Technet.Microsolf: http:// technet.microsoft.com/en-us/library/cc70825.aspx 274. UFIT Security Incident Response Procedures, Standards and Guidelines. (n.d.). Retrieved January 2014, from UF Information Technology University of Florida: http://www.it.ufl.edu/policies/security/incident-response/ 275.

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Better Essays

    SANS - Information Security Resources | Information Security Policy Templates |. (n.d.). Retrieved from http://www.sans.org/security-resources/policies/…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    IS3110 U5L1

    • 912 Words
    • 4 Pages

    One of the most important first steps to risk management and implementing a security strategy is to identify all resources and hosts within the IT infrastructure. Once you identify the workstations and servers, you now must then find the threats and vulnerabilities found on these workstations and servers. Servers that support mission critical applications require security operations and management procedures to ensure C-I-A throughout. Servers that house customer privacy data or intellectual property require additional security controls to ensure the C-I-A of that data. This lab requires the students to identify threats and vulnerabilities found within the Workstation, LAN, and Systems/Applications Domains.…

    • 912 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    ISA 650 Final Exam Paper

    • 4435 Words
    • 18 Pages

    73. Requires the creation of computer security plans, and the appropriate training of system users or…

    • 4435 Words
    • 18 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 2 Key Concepts  Attacks, threats, and vulnerabilities in a typical IT infrastructure …

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    3 Define three of the responsibilities that an Incident Response Team would have. List them and describe the responsibilities.…

    • 531 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Paper ESF 13

    • 1280 Words
    • 4 Pages

    References: University of Phoenix. (2008). Emergency Support Function #13 - Public Safety and Security Annex.…

    • 1280 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Introduction: Incident Management System (ICS) refers to a common plan of action to deal with any emergency situation, whether natural or man-made so as to save lives, minimize loss and effectively handle any related problems…

    • 301 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Incident Command System (ICS) was adapted in 1991 for use of hospital to respond to disaster. In ICS, one person is responsible for directing an emergency team. The ICS help assigned personnel to manage the area in which they are responsible for. The ICS is used to ensure that the hospital operate “effectively and efficiently” during a large-scale event…

    • 60 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Disaster Recovery Plan 09

    • 619 Words
    • 3 Pages

    If I were to list the mission-critical business systems and services that must be protected by the DRP I would say their servers, computers, data, and tools. I say that because the DRP will need to protect each of these in case of a natural disaster occurring because it is very crucial to the company.…

    • 619 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays