Define and discuss the three steps to cyber security


Assignment

I. Read and review the following article and video:

• Article: Read the Crest IR Guide

• Video(s): 2014 Cyber Security Session 24 - Cyber Security Incident Response

2014 Cyber Security Session 24 - Cyber Security Incident Response
Duration: (39:46)
User: n/a - Added: 10/11/14

Using what you have learned about Cyber Security Incident Response from the assigned reading, video, and report, think about the following Lockheed-Martin's Cyber Kill Chain:

• Reconnaissance
• Weaponization
• Delivery
• Exploitation
• Installation
• Command and Control (C2)
• Actions on Objectives

Your assignment is as follows:

1. Define and discuss the three steps to Cyber Security Incident Response.

2. Research recent cyber breaches and discuss the cyber "kill" chain for one of the breaches.

3. For the company involved in step 2, make at least three (3) recommendations to senior leadership that could avoid breaches in the future.

II. Read the attached article - Shibata, Y., Uchida, N. & Shiratori, N.(2014) "Lessons of the Great East Japan Earthquake"

Answer the following questions in no more than two pages:

• What were the critical planning oversights highlighted in the article?
• What recommendations would you have for Japan's new DR/BC planning?
• What recommendations might you have for University?

III. Answer the following questions in no more than two pages:

• What were the plan development steps highlighted in the article?
• What recommendations would you have for small and medium-sized businesses based on the article?
• What recommendations might you have for the Wilmington University library?

IV. Review the attached article:

• Campbell, T., (2004). "An Introduction to the Computer Security Incident Response Team (CSIRT) Set-Up and Operational Considerations", SANS Institute, 1-39.

Your assignment is as follows:

• Write a one-page paper recommending the CSIRT concept to the President of Wilmington University.

• Ensure you discuss the need for a CSIRT team, CSIRT response and benefit of having a CSIRT team.

Your assignment is as follows:

V. Write a one-page paper recommending an incident response strategy for cloud-based software to the CIO of Wilmington University. Ensure you discuss the risks associated with SaaS, IR approaches to SaaS, and recommendations for an IR approach.

Attachment:- Resources.rar

Request for Solution File

Ask an Expert for Answer!!
Dissertation: Define and discuss the three steps to cyber security
Reference No:- TGS02780186

Expected delivery within 24 Hours