Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

What is the purpose of a cirt plan

08/12/2021 Client: muhammad11 Deadline: 2 Day

Managing Risk in Information Systems

Powered by vLab Solutions

JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES

LABORATORY MANUAL TO ACCOMPANY

VERSION 2.0

INSTRUCTOR VERSION

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

90

Introduction

When a company experiences a computer incident, its security team that collects and

monitors incidents must make a decision. That decision is whether the incident is benign,

or whether it signals a greater problem, such as an attempted (or successful) security

breach.

When people hear “security breach,” they often imagine sinister hackers bypassing

firewalls to steal top secret plans. The attack might be one of thousands, a “noisy” spray

of exploits across a network. Or the attack might be targeted solely at one company and,

as the attacker hopes, more stealthy.

In any case, as different pieces of evidence are collected, it becomes easier to confirm

whether a breach really has occurred and, if so, how it must be handled by a specialized

team of security professionals. These special teams are referred to as computer incident

response teams (CIRTs). A CIRT team operates on the actions laid out in a CIRT plan.

The purpose of a computer incident response team (CIRT) plan is to mitigate risks found

in the seven domains of a typical IT infrastructure.

When tasked to manage a security breach, a CIRT team will identify, analyze, and

contain the extent of the security breach. Then they will get rid of the breach and

whatever traces—a virus or other malware—were left behind. Next, as some business

functions might have been affected, the CIRT team helps recover from the breach. Lastly,

the CIRT team discusses and improves its CIRT plan based on lessons learned during a

review session.

In this lab, you will explain how CIRT plans mitigate risks, you will identify where CIRT

monitoring and security operation tasks occur throughout an IT infrastructure, you will

identify the security controls and countermeasures that mitigate risk, and you will create a

CIRT response plan.

Learning Objectives

Upon completing this lab, you will be able to:

Explain how a CIRT plan can help mitigate risks found in the seven domains of a

typical IT infrastructure.

Lab #10 Creating a CIRT Response Plan for a Typical IT Infrastructure

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

93

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Instructor Lab Manual

Hands-On Steps

Note: This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access to Microsoft® Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files.

3. Review the Mock IT infrastructure for a health care IT infrastructure servicing patients with life-threatening conditions (see Figure 1).

Figure 1 Mock IT infrastructure

4. Identify and then document the security controls and security countermeasures you can implement throughout Figure 1 to help mitigate risk from unauthorized access and access to intellectual property or customer privacy data.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

94 | LAB #10 Creating a CIRT Response Plan for a Typical IT Infrastructure

5. Review the steps for creating a CIRT plan as outlined in the following table:

Step Description of Step

Preparation What tools, applications, laptops, and communication devices are needed to address computer/security incident response for this specific breach?

Identification When an incident is reported, it must be identified, classified, and documented. During this step, the following information is needed: validating the incident; identifying its nature, if an incident has occurred; identifying and protecting the evidence; and logging and reporting the event or incident.

Containment The immediate objective is to limit the scope and magnitude of the computer/security-related incident as quickly as possible, rather than allow the incident to continue to gain evidence for identifying and/or prosecuting the perpetrator.

Eradication The next priority is to remove the computer/security-related incident or breach’s effects.

Recovery Recovery is specific to bringing back into production those IT systems, applications, and assets that were affected by the security-related incident.

Post-Mortem Review Following up on an incident after the recovery tasks and services are completed is a critical last step in the overall methodology. A post-mortem report should include a complete explanation of the incident and the resolution and applicable configuration management, security countermeasures, and implementation recommendations to prevent the security incident or breach from occurring again.

Note: The post-mortem review is arguably the most important step as CIRT team members re-evaluate their actions with the valuable luxury of hindsight. When the CIRT members are able to look back to compare what they saw and how it related to what happened next, they can continually improve what they offer the organization.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

95

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Instructor Lab Manual

6. Create a CIRT response plan approach according to the six-step methodology unique to the risks associated with the item you choose from the following:

 Internet ingress/egress at ASA_Student

 Headquarters’ departmental VLANs on LAN Switch 1 and 2 with cleartext

privacy data

 Remote branch office locations connected through the WAN

 Data center/server farm at ASA_Instructor

Note: This completes the lab. Close the Web browser, if you have not already done so.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Math Guru
Top Grade Tutor
Instant Assignments
Assignments Hut
A+GRADE HELPER
Top Class Results
Writer Writer Name Offer Chat
Math Guru

ONLINE

Math Guru

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$45 Chat With Writer
Top Grade Tutor

ONLINE

Top Grade Tutor

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$34 Chat With Writer
Instant Assignments

ONLINE

Instant Assignments

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$38 Chat With Writer
Assignments Hut

ONLINE

Assignments Hut

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$43 Chat With Writer
A+GRADE HELPER

ONLINE

A+GRADE HELPER

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$15 Chat With Writer
Top Class Results

ONLINE

Top Class Results

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$16 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Confined space assessment checklist - Given this information is locational arbitrage possible - Oldfield house woolley moor - Teen Pregnancy - Books to read for accounting and finance personal statement - Plastic bag ban btn - Mark stauder hackensack meridian health - Urasenke chanoyu handbook one - Earthing system of transmission tower - Prison architect cctv monitor inactive guard required - When to use they're and their - BUSINESS LAW, ETHICS, AND SOCIAL RESPONSIBILITY - Week 3 Discussion - Dulux acratex green render sealer - Error code 40000 just eat - Fad diet assignment - Airasia menu pdf - A view from the bridge conflict essay - Hum 100 worksheet: realism, impressionism, and the modern world - I pledge to thee my country - Army blc sharp essay - Woofer pet foods produces a low calorie dog food - Employee central implementation handbook - Iu plagiarism certification test answers - What is the mass of a bird - Skeletal system - Malcolm x coming to an awareness of language essay - The atoms are combined in some way - Http www youtube com watch v qwriskyv_b8 - Katherine petrova family tree - 200 word response post in regards to the prompt and the attached ppts in google links and article attached - Annotated Bibliography - Durebild ste data sheet - Botanical gardens batemans bay - Discussion Post - HW - Rita golden gelman net worth - Guild wars 2 error code 45 6 3 2157 - John walker divorce attorney charlotte nc - Biometrics db 2 - F ion electron configuration - Instant displays co uk - Create an advertising campaign assignment - Sexual harassment assault response prevention training test answers - 21 22 23 lyrics - Health club business plan - Pistachio kcal - Royal dutch shell plc wiki - Extract year from date in netezza - Certificate iv in trichology courses - Up north poem sam cook - Eco Footprint - 100 words summary - Data - Which of the following is not a factor pressuring companies for local responsiveness? - Describe the process for tracking and evaluating training effectiveness - Yo les envié sent postales a mis amigos - Tone examples in persuasive writing - Fault propagation fold animation - A favorable labor rate variance indicates that - What are prime and composite numbers 1 100 - Physics for scientists and engineers 6th edition solutions tipler - Lord of the flies chapter 11 vocabulary - Feast watson surface restore - Biostatistics Reflection Discussion - Openstax org details books us history - Games then and now - Siemens clinitek status plus service manual - Week 5 Discussion question - A zero wage increase again - Goal the dream begins movie worksheet - Vroom yetton jago decision model - How can persistently weak currencies be stabilized - Phet circuit construction kit - Example Memo Prompt - Communication During Covid - Progressive lens power map - 19mm scyon secura flooring - Elliptical settings nyt crossword clue - Equivocation in macbeth act 1 scene 3 - Y 7x 6 in standard form - 1st federal savings and loan valdosta ga - What is the missing number in the sequence - Superposition theorem experiment pdf - Even though most corporate bonds in the united states - Australian unity health cover - L dee fink significant learning - The case of the sweaty salesman - Macbeth act 4 graphic organizer - Haribo nederland b v - How to maybe measure laser beam quality - Northwestern states pharmacy conference 2019 - Mat 140 milestone two - Evaluation and Dissemination Plan - A terre wilfred owen analysis - Fractional distillation lab report discussion - Introduction to java programming and data structures 11th edition - Is anyone good for dissertations please ? - Acids bases and salts lab - Eating alone li young lee - Religion in pompeii and herculaneum essay