Determine how the breach occurred


Assignment

IR Strategy is defined as means and mechanism to bring the systems back to normality by restoring operations after the incident. There are two philosophies: 1) protect and forget and 2) apprehend and prosecute. Each company will have to determine which philosophy to follow and under what circumstances. The incident commander must first assess the situation after the breach. The assessment will look at what type of incident occurred, how much information was destroyed or stolen, and how to best tell the public. The commander will also be responsible to determine how the breach occurred and how to keep this breach from occurring in the future. The incident commander will also confirm the incident and how to escalate the situation if necessary. Incident recovery maintains that all systems must be reestablished to the pre-incident status. The CSIRT leader must determine the appropriate response based on the variables of the breach type, the method of incursion, the current level of loss, and the sensitivity of the information breached. A containment strategy should be written and include the details of how the organization will handle theft and damage to assets.

Whitman, E., Mattord, H. J., & Green, A. (2017). Principles of Incident Response & Disaster Recovery. Boston, MA: Cengage Learning.

Here are some observations from our Mid-term. Remember these points when writing your Case Studies. Grades are all posted

1. Your work must be written in MicroSoft Word. I do not have a MAC and cannot open a file written on a MAC machine.

2. Upload all your documents to your BOX account. I will not grade a paper that is emailed to me.

3. Simply using a web site does not constitute a reference. See the Getting Started folder on how to create a reference.

4. You must cite your reference in your paper. Just giving me a reference, but not showing me where you used a reference in the paper by a citation will count off points. Again, see the Getting Started folder on how to reference and cite.

5. Do not use a translator program. I can tell immediately because the sentences are non-sensical. You must contact the University writing center to receive help.

6. Remember:

1. Your paper must be double spaced.
2. Load all papers into the BOX account. Do not email any papers.
3. Do not use a translator program.

The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Determine how the breach occurred
Reference No:- TGS02089821

Now Priced at $35 (50% Discount)

Recommended (99%)

Rated (4.3/5)