Cyber Security Session 24 – Cyber Security Incident Response

 

Article: Read the Crest IR Guide
• Video(s): 2014 Cyber Security Session 24 – Cyber Security Incident Response
Watch Video
Link: https://www.youtube.com/watch?v=gAb8G0Poj5Y
2014 Cyber Security Session 24 – Cyber Security Incident Response
Duration: (39:46)
User: n/a – Added: 10/11/14
Using what you have learned about Cyber Security Incident Response from the assigned reading, video, and report, think about the following Lockheed-Martin’s Cyber Kill Chain:
• Reconnaissance
• Weaponization
• Delivery
• Exploitation
• Installation
• Command and Control (C2)
• Actions on Objectives
Your assignment is as follows:
1. Define and discuss the three steps to Cyber Security Incident Response.
2. Research recent cyber breaches and discuss the cyber “kill” chain for one of the breaches.
3. For the company involved in step 2, make at least three (3) recommendations to senior leadership that could avoid breaches in the future.
Crest IR guide https://wilmu.blackboard.com/bbcswebdav/pid-12024961-dt-content-rid-69406792_1/courses/30492.201830/Crest-Guide.pdf
2. Read the attached article – Shibata, Y., Uchida, N. & Shiratori, N.(2014) “Lessons of the Great East Japan Earthquake”
Please answer the following questions in no more than two pages:
• What were the critical planning oversights highlighted in the article?
• What recommendations would you have for Japan’s new DR/BC planning?
• What recommendations might you have for University?
Link: https://wilmu.blackboard.com/bbcswebdav/pid-12024981-dt-content-rid-68495418_1/courses/30492.201830/Discussion%20%232%20-%20Japan-Earthquake.pdf
3. Please answer the following questions in no more than two pages:
• What were the plan development steps highlighted in the article?
• What recommendations would you have for small and medium-sized businesses based on the article?
• What recommendations might you have for the Wilmington University library?
Link: https://www.cio.com/article/2381021/best-practices/best-practices-how-to-create-an-effective-business-continuity-plan.html
4. Review the attached article:
• Campbell, T., (2004). “An Introduction to the Computer Security Incident Response Team (CSIRT) Set-Up and Operational Considerations”, SANS Institute, 1-39.
Your assignment is as follows:
• Write a one-page paper recommending the CSIRT concept to the President of Wilmington University.
• Ensure you discuss the need for a CSIRT team, CSIRT response and benefit of having a CSIRT team.
Link: https://wilmu.blackboard.com/bbcswebdav/pid-12024999-dt-content-rid-68495409_1/courses/30492.201830/introduction-computer-security-incident-response_3907_.pdf
Your assignment is as follows:
5. Write a one-page paper recommending an incident response strategy for cloud-based software to the CIO of Wilmington University. Ensure you discuss the risks associated with SaaS, IR approaches to SaaS, and recommendations for an IR approach.
Link: https://www.youtube.com/watch?v=u54Radu2bF0

READ ALSO :   Assignment Human Genome Databases