answer 3 discussion questions 3

Question 1: Incident Management Scenario

Introduction:

Scenarios exercises can be helpful learning tools. They allow practitioners to think about and experience different types of challenges and respond in a safe environment. For this exercise you will review a scenario individually, then engage in a group discussion a to further develop insight into the scenario. The scenario for this exercise was taken from the NIST incident response document. Read through the scenario and refer to the NIST report if necessary.

Instructions;

Read the scenario from the NIST Incident Response Document below and post your responses to the following questions:

  1. From what sources might the incident response team gather evidence?
  2. What would the team do to keep the investigation confidential?
  3. How would the handling of this incident change if the team identified an internal host responsible for the leaks?
  4. How would the handling of this incident change if the team found a rootkit installed on the internal host responsible for the leaks?

Scenario 3: Stolen Documents

On a Monday morning, the organization’s legal department receives a call from the Federal Bureau of Investigation (FBI) regarding some suspicious activity involving the organization’s systems. Later that day, an FBI agent meets with members of management and the legal department to discuss the activity. The FBI has been investigating activity involving public posting of sensitive government documents, and some of the documents reportedly belong to the organization. The agent asks for the organization’s assistance, and management asks for the incident response team’s assistance in acquiring the necessary evidence to determine if these documents are legitimate or not and how they might have been leaked. (NIST)

Reference:

. [PDF file size 1446KB] Retrieved from http://nvlpubs.nist.gov/nistpubs/SpecialPublicatio…Computer Security Incident Handling Guide Recommendations of the National Institute of Standards and Technology (Links to an external site.)Links to an external site.Cichonsk, P., Miller, T., Grance, T., Scarfone, K. (2012).

Question 2:

Please define each of these (Qualitative vs. Quantitative) and give 2 examples of how each of these can be applied within conducting a risk assessment.

Question 3: Risk, Assessments and Threats to Security

Instructions;

Review the following documents. Use the material in the readings and outside source material, especially current cyber threat reports.

Discuss the following questions: Cite your work:

  1. What is Risk Management?
  2. Why is it important when applied to business needs?
  3. Read the SANS article. What is a risk assessment?

List and describe the core areas of an assessment outlined in the article.

After answering these questions, can you please go on my blackboard and reply to 2 students for each post. So 6 total replies to students. I will give you my

login
info. The initial answer you can do within 1 day, the replies to other students is due Sunday July 14th by 11:59pm.

Please put coresspanding citations after each answer. Not at once at the end.

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.