Question 1: Incident Management Scenario
Introduction:
Scenarios exercises can be helpful learning tools. They allow practitioners to think about and experience different types of challenges and respond in a safe environment. For this exercise you will review a scenario individually, then engage in a group discussion a to further develop insight into the scenario. The scenario for this exercise was taken from the NIST incident response document. Read through the scenario and refer to the NIST report if necessary.
Instructions;
Read the scenario from the NIST Incident Response Document below and post your responses to the following questions:
Scenario 3: Stolen Documents
On a Monday morning, the organization’s legal department receives a call from the Federal Bureau of Investigation (FBI) regarding some suspicious activity involving the organization’s systems. Later that day, an FBI agent meets with members of management and the legal department to discuss the activity. The FBI has been investigating activity involving public posting of sensitive government documents, and some of the documents reportedly belong to the organization. The agent asks for the organization’s assistance, and management asks for the incident response team’s assistance in acquiring the necessary evidence to determine if these documents are legitimate or not and how they might have been leaked. (NIST)
Reference:
. [PDF file size 1446KB] Retrieved from http://nvlpubs.nist.gov/nistpubs/SpecialPublicatio…Computer Security Incident Handling Guide Recommendations of the National Institute of Standards and Technology (Links to an external site.)Links to an external site.Cichonsk, P., Miller, T., Grance, T., Scarfone, K. (2012).
Question 2:
Please define each of these (Qualitative vs. Quantitative) and give 2 examples of how each of these can be applied within conducting a risk assessment.
Question 3: Risk, Assessments and Threats to Security
Instructions;
Review the following documents. Use the material in the readings and outside source material, especially current cyber threat reports.
Discuss the following questions: Cite your work:
List and describe the core areas of an assessment outlined in the article.
After answering these questions, can you please go on my blackboard and reply to 2 students for each post. So 6 total replies to students. I will give you my
login
Please put coresspanding citations after each answer. Not at once at the end.