is355 risk management it s a computer course

block business letter 12
March 2, 2023
rapidminer solutions
March 2, 2023

is355 risk management it s a computer course

Hell, I need help with this assignment.

CIRT

When a company experiences a computer incident, its security team that collects and monitors incidents must make a decision. That decision is whether the incident is benign, or whether it signals a greater problem, such as an attempted (or successful) security breach.

When people hear “security breach,” they often imagine sinister hackers bypassing firewalls to steal top secret plans. The attack might be one of thousands, a “noisy” spray of exploits across a network. Or the attack might be targeted solely at one company and, as the attacker hopes, more stealthy.

In any case, as different pieces of evidence are collected, it becomes easier to confirm whether a breach really has occurred and, if so, how it must be handled by a specialized team of security professionals. These special teams are referred to as computer incident response teams (CIRTs). A CIRT team operates on the actions laid out in a CIRT plan. The purpose of a computer incident response team (CIRT) plan is to mitigate risks found in the seven domains of a typical IT infrastructure.

When tasked to manage a security breach, a CIRT team will identify, analyze, and contain the extent of the security breach. Then they will get rid of the breach and whatever traces—a virus or other malware—were left behind. Next, as some business functions might have been affected, the CIRT team helps recover from the breach. Lastly, the CIRT team discusses and improves its CIRT plan based on lessons learned during a review session.

In this lab, you will explain how CIRT plans mitigate risks, you will identify where CIRT monitoring and security operation tasks occur throughout an IT infrastructure, you will identify the security controls and countermeasures that mitigate risk, and you will create a CIRT response plan.

Learning Objectives

Upon completing this lab, you will be able to:

Explain how a CIRT plan can help mitigate risks found in the seven domains of a typical IT infrastructure.

Identify where CIRT monitoring and security operation tasks occur throughout an IT infrastructure.

Identify security controls and security countermeasures to mitigate risk throughout the IT infrastructure and to aid in security incident response.

Create a CIRT response plan for the Mock IT infrastructure by using the six-step incident-response methodology.

Complete Lab #10, found on pages 80-85 of your Lab Manual.

Deliverables

Upon completion of this lab, you are required to provide the following deliverables to your instructor:

1. Lab Report file;

2. Lab Assessments file.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.