Using NIST’s SP 800-61 “Computer Security Incident Handling Guide”, develop


 Using NIST’s SP 800-61 “Computer Security Incident Handling Guide”, develop an Incident Response Plan (IRP) that will address one or more of your security risks that you identified in your Risk Assessment.  Google and find other actual IRPs on the Internet and review to see what type of information is included. At a minimum, your plan should include the following sections: 

  • Roles:  who will respond to the incident and notification/escalation procedures? Who is responsible for writing the IRP?
  • Training: specify a training frequency
  • Plan testing:  How (and how often) will you test the plan?
  • Incidents:  What defines an “incident”? Define some security incidents that you may encounter on your network.
  • Incident Notification: What happens when an incident is detected?
  • Reporting/tracking:  How will you report and track incidents? What about capturing “lessons learned”?
  • Procedures:  Select one of your security risks identified in your Risk Assessment. Prepare procedures for addressing the incident in the event that the incident actually happens. In this section, address the following subsections specific to your risk that you are identifying.
    • Preparation
    • Detection and Analysis
    • Containment
    • Eradication
    • Recovery and Post-Incident Activity

Note:  there are several scenarios in the appendix of the NIST document. You can use, for instance, Scenario 11:  Unknown Wireless Access Point to help develop the response procedures for wireless access, as an example. Use any of these to help flesh out your procedures but the procedure you agreed to use must be one that addresses a risk you identified in your Risk Assessment. Grading Criteria CriteriaDocument is at least 10 double-spaced pages.    Paper is well-written with minimal typing, spelling, or grammatical errors.  10%Required sections (above) are appropriately addressed.  25 points (5 each), 50 points for the Procedures Section.  75%Procedures provide sufficient information to enable recovery and mission restoration. 15% 

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Obtain the general solution of the following DEs: i. y′′′ + y′′ − 4y′ + 2y = 0 ii. y(4) + 4y(2) = 0 iii. x(x − 2)y′′ + 2(x − 1)y′ − 2y = 0; use y1 = (1 − x) iv. y′′ − 4y = sin2(x) v. y′′ − 4y′ + 3y = x ; use y1 = e3x vi. y′′ + 5y′ + 6y = e2xcos(x) vii. y′′ + y = sec(x) tan(x)

Obtain the general solution of the following DEs: i. y′′′ + y′′ − 4y′ + 2y = 0 ii. y(4) + 4y(2) = 0 iii. x(x − 2)y′′ + 2(x − 1)y′ − 2y = 0; use y1 = (1 − x) iv. y′′ − 4y = sin2(x) v. y′′