Preview

Week 5 Quiz

Good Essays
Open Document
Open Document
531 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 5 Quiz
1 What is the purpose of a CIRT plan? Describe what this plan does and what other plan it ties into.

The purpose of the CIRT plan is to help an organization prepare for computer incidents. Preparation helps the organization identify potential incidents. Security personnel can then identify the best responses to reduce the potential damage

2 Describe what the three models are for a CIRT plan based on the NIST SP 800-61 template.

Central Incident Response Team
Distributed Incident Response Team
Coordinating Team

3 Define three of the responsibilities that an Incident Response Team would have. List them and describe the responsibilities.

Develop incident response procedures Develop and write down how to respond to incidents. Investigate incidents Responding to incidents and fulfilling all requirements as outlined in the response procedures. Protect collected evidence Collect, store, and keep a chain of custody for any/all evidence collected during the investigation

4 As much as 80% of all incidents are a result of internal attacks. List four inappropriate usages from users

Spamming coworkers Accessing prohibited websites Purposely circumventing security policies Sending files with sensitive data outside the organization.

5 List and explain three basic protection steps you can take to ensure all servers are hardened, thus reducing incidents.

Limit what services are running on the server to only what is absolutely needed, use unique id/strong password in combination with principle of least privilege to help prevent unauthorized access, use up-to-date anti-malware software, use firewalls to prevent unauthorized access, use intrusion detection software to monitor for unauthorized access

6 Define a DRP and explain when it is invoked.

A disaster recovery plan is a plan to restore a critical business process or system to operation after a disaster. It is invoked after a disaster such as flood, tornado and hurricane.

7 Describe two CSFs for a DRP.

Management

You May Also Find These Documents Helpful

  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Block all ports that are not in use by our network and monitor all inbound and outbound traffic, keeping a close eye on the inbound to detect threats before they become a threat. Place firewalls and anti-malware software at this point and route all workstation traffic through main servers to better protect the network as a whole.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1164 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 748 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the LAN-to-WAN domain, closing off unused ports thru a firewall to reduce the chance of unwanted network access. Monitor inbound IP traffic, more specifically looking for inbound transmissions that show signs of malicious intent. And run all networking hardware with up to date security patches, and operating systems.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    p1 unit 14

    • 782 Words
    • 4 Pages

    You should also describe how emergency incidents are graded for a selected public service control room including the grading categories used, and the role of call handlers and incident managers.…

    • 782 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 670 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 4 quiz

    • 604 Words
    • 3 Pages

    7. When the researcher measures a behavior that needs to be changed, applies therapy and measures the behavior again, and then removes the treatment and measures the behavior again, this is referred to as ABA design.…

    • 604 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Risky Situation

    • 1497 Words
    • 6 Pages

    Identify three types of sensitive information involved with each situation. Then, describe three ways in which each information item could be misused or harmed. For each of these, note at least one likely finding that you would include in a risk analysis report of the organization. Finally, answer the questions at the end.…

    • 1497 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    3.2: Outline the actions to take in response to the following situations, fires, security incidents and emergency incidents.…

    • 387 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Environmental risks that could affect the business are obviously major storms, floods, tornados, etc. A tornado could knock out the internet and prevent Sunica Music and Movies from accessing their databases for either inventory or accounting purposes which would make running the business virtually impossible. External Risks to Sunica Music and Movies could be a struggling economy or competitor sabotage. These tend to be factors that are out of the businesses control and depend on an outside source to create them. Internal risks are things like a worker strike or employee sabotage. These are problems that are generated within the organization. A…

    • 914 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Infrastructure is more secure. The first point that I will address consist on the multiple dangers that computer networks are expose, that are in majority done by hackers or somebody, that get access to servers of Windows and Linux to explode their vulnerabilities. For this reason, in general terms security; has we define the act of provide access of protection…

    • 732 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Kessler International (2000, January 4). Employees, Not Hackers, Greatest Computer Threat. Retrieved December 13, 2003, from http://www.investigation.com/articles/library/2000articles/articles18.htm…

    • 4047 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    Cyber Crime

    • 3651 Words
    • 15 Pages

    Ø HACKING Ø DENIAL OF SERVICE ATTACK Ø VIRUS DISSEMINATION Ø SOFTWARE PIRACY Ø PORNOGRAPHY Ø IRC Crime Ø CREDIT CARD FRAUD…

    • 3651 Words
    • 15 Pages
    Powerful Essays