Boost Your Final Grades By Ordering Custom Writing Help!

For similar papers and sample answers; with a few clicks, Order your research paper, thesis, dissertation writing and other assignment help services

Posted: March 17th, 2023

Incident response | Information Systems homework help

Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.

RESPONSE 1:

First of all, each part of incident response is absolutely crucial, and the effectiveness of the greatly diminishes if one of them is missing. Now it could also be noted that some of the steps would actually be impossible without another previous step. On that logic, I am going to pick incident identification. Without incident identification, none of the other steps will be completed or completed efficiently. In this stage a list of questions are asked and answered through investigation. Questions like: What actually happened? What was compromised? Is this a hack or not? Does this attack cease normal operations? When did it take place? Who discovered it? What is the origin of the attack? What is the type of attack? What malware was used in the attack? As this is the first phase upon discovering the incident, all the different people will be contacted according to the response plan. While investigating there must be no corruption of any evidence. The initial investigators will determine what is all compromised and classify the incident with threat levels. It needs to be determined if the law, shareholders, lawyers, or customers need to be contacted based off of the findings. There will be a lot of documentation throughout this process as well. This is all very important, because everything following this will be executed on the knowledge gained in this stage. How well the investigation stage is done and what needs to change will be brought up later in the debriefing and feedback stage, so that it can improve.

Jaron

2015. SAMPLE INFORMATION SECURITY INCIDENT RESPONSE PLAN. [ebook] ePlace Solutions, Inc. Available at: <https://www.isbamutual.com/wp-content/uploads/2018/08/Cyber-Incident-Response-Plan.pdf> [Accessed 20 August 2020].

RESPONSE 2:

When considering the phases of incident response, we have incident identification, triage, containment, investigation, analysis and tracking, recovery and repair, and debriefing and feedback. They are, in their own right, all very important steps in the process, but some of the most crucial phases in my opinion are incident identification, containment, and debriefing and feedback. 

Incident identification – This step is one of the most important simply for the fact that you cannot react until you know there is a problem. Unfortunately, a lot of the time this work is reactionary instead of proactive. Having skilled people who are able to identify a potential problem early enough to stop large potential damage.

Containment – This step is also important because it is paramount to remove the compromised device from communication with any device that it could potentially effect as early as possible. Along with incident identification, containment of a threat will likely eliminate a potentially much larger incident.

Debriefing and feedback – This phase is an incredibly important tool for anybody not in the IT field. Not only is this where you will inform your higher ups the results of your work, but this is also where you can look back at the incident non objectively and poke holes in the process. This is where you can look for what went well, what did not, and what can be improved upon in the future. Using this step to educate users on detection techniques and basic safety precautions to reduce risk of damage could help prevent incidents in the first place.

Chris

Check Price Discount

Study Notes, Research Topics & Assignment Examples: »

Why Choose our Custom Writing Services

We prioritize delivering top quality work sought by college students.

Top Research Professionals

The research experts and assignment help team consists exclusively of highly qualified graduate writers, each professional with in-depth subject matter expertise and significant experience in custom academic writing.

Discounted Pricing

Our custom writing services maintain the highest quality while remaining affordable for students. Our pricing for research papers, theses, and dissertations is not only fair considering the superior quality but also competitive with other writing services.

0% Similarity Index

We guarantee plagiarism-free, human-written content. Every product is assured to be original and not AI-generated. Our writers, tutors and editors are research experts who ensures the right formating and citation sytles are followed. To note, all the final drafts undergo rigorous plagiarism checks before delivery for submission to ensure authenticity for our valued customers.

How it works

When you decide to place an order with Dissertation Help, here is what happens:

Complete the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We analyze your order and match it with a custom writer who has the unique qualifications for that subject, and he begins from scratch.

Order in Production and Delivered

You and your writer communicate directly during the process, and, once you receive the final draft, you either approve it or ask for revisions.

Giving us Feedback (and other options)

We want to know how your experience went. You can read other clients’ testimonials too. And among many options, you can choose a favorite writer.

Write My Paper