Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Module 6 Discussion Computer Science

12/05/2020 Client: azharr Deadline: 24 Hours

Module 6 Discussion Forum

Include at least 250 words in your posting and at least 250 words in your reply. Indicate at least one source or reference in your original post. Please see syllabus for details on submission requirements.


Module 6 Discussion Question

Search "scholar.google.com" or your textbook. Include at least 250 words in your reply. Indicate at least one source or reference in your original post. Discuss ways organizations have built a CSIRT. What are the components to building an effective and successful CSIRT team?




Reply-1(Vindhya)






In the building, an effective and successful CSIRT the steps involved are as follows:


1. Buy-In and support of management are obtained: the creation of an effective incident response team becomes problematic and difficult without the support of the management. The support includes time, funding, and provision of resources to the team (D. Penedo, 2006). The important responsibility and function of the CSIRTs are obtaining managements perceptions and expectations.


2. The strategic plan of CSIRT development is determined: by dealing with the administrative issues and addressing the project management issues the development of CSIRT is to be managed.


3. Relevant information is gathered: the service needs of the organization and to determine the incident response the information is gathered. In gathering the information the resources available are inventories of assets and critical system, for enterprise the organization charts and functions of specific business, networks, and systems organizational topologies, plans of business-continuity or existing disaster recovery, the physical security breach of organization is notified by existing guidelines, existing plans of incident-management, regulations of institution or parental, and existing security policies and procedures.


4. CSIRT vision is designed: The key components of the CSIRT are identified by bringing the gathered information to incident response constituency needs. For creating, CSIRT vision the points to be followed are (Z. Yunos, 2016): Constituency identification, the goals, objectives, and mission of CSIRT are defined, CSIRT services are selected and provided to the constituency, the organizational model is determined, required resources are identified, and CSIRT funding is determined.


5. The vision of CSIRT is communicated: the operational plan and vision are communicated to constituency, management, and others involved in the operation and feedbacks are obtained. Communicating vision before implementation helps in identification of problems.


6. CSIRT implementation begins: the steps involved in implementation are the CSIRT staff is hired and trained, in supporting team the necessary infrastructure is built and equipment are bought, the initial set of CSIRT procedures and policies are developed, the specifications of incident-tracking system are defined and the forms and guidelines of incident-reporting are developed for a constituency.


7. CSIRT announcement: broadly announce to constituency when CSIRT is operational also include the operation hours and contact information.


8. The effectiveness of CSIRT is evaluated: information on effectiveness is gathered by including against other CSIRTs the benchmark, with constituency representatives the general discussions involved, on a periodic basis the surveys of evaluation are distributed to members of the constituency, and in evaluating the team the quality parameters or set of criteria created by an audit.


References:


D. Penedo (2006), Optimal Policy for Software Vulnerability Disclosure. Good practice guide for CERTs in the area of Industrial Control Systems - Computer Emergency Response Capabilities considerations for ICS.


Z. Yunos (2016), Creating and Managing Computer Security Incident Handling Teams (CSIRTs), CERT Training and Education Networked Systems Survivability Software Engineering Institute Carnegie Mellon University.




Reply-2 ( Glad)






CSIRT (Computer Security Incident Response Team) is a team within an organization which responds to threats or incidents as they occur within the organization. Their responsibilities include,


- Maintaining and creating an incident response plan


- Identifying, troubleshoot and remediation of any incidents


- Communication methods for incident responses


- Combing the organization and proactively identifying and physical or network security threats.


- Recommending technologies, policy updates, governance updates based off the past threats


Keeping in mind the roles and responsibilities of this team, to build a team to perform these activities and own the responsibilities, the first step towards creating this team would be to buy management support to ensure they are in agreement with the creation of such a team and are on board to sign off on the resource allocation and budget as well as procedural aspects of building a CSIRT team.


The next step would be to create a strategic development plan on the various facets the team should possess and within which time frame team should be formed. The plan should be feasible and the timelines realistic and also care has to be taken to ensure the plan aligns with overall objectives of the organization.


After the strategic plan is developed, information should be gathered to ensure all aspects of the CSIRT team is covered based on the types of policies formulated, types of threats assessed and the services that are to be offered. The team will have to be picked based on the information at this stage.


Once the team is aligned and the vision is set, the vision of this team and its operations will have to be communicated within the organization to bring about an awareness on what this team could do.


Post the organizational wide announcement and policy implementation, the team goes live into operations and implements all the guidelines and procedures thereby serving the organization.


References:


Fuertes, W., Reyes, F., Valladares, P., Tapia, F., Toulkeridis, T., & Pérez, E. (2017). An Integral Model to Provide Reactive and Proactive Services in an Academic CSIRT Based on Business Intelligence. Systems, 5(4), 52. doi: 10.3390/systems5040052


Möller, K. (2007). Setting up a Grid‐CERT: experiences of an academic CSIRT. Campus-Wide Information Systems, 24(4), 260-270. doi: 10.1108/10650740710834644

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Assignments Hut

ONLINE

Assignments Hut

$20
Well done

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Assignments Hut
Writer Writer Name Offer Chat
Assignments Hut

ONLINE

Assignments Hut

Please share further details to proceed.

$20 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Policy/Regulation Fact Sheet - 4.75 pounds to kg - Examples of physical disablers in aged care - Post- Rufina - Hollensen s 2017 global marketing - Week 7 Case Study- Carlson Companies - Clandestine laboratory enforcement team - Need help to write an article about wearable technology topics - Noplag review - Community based health care ppt - 1296 mhz power amplifier - Gulf real estate properties case solution - Unknown project microbiology lab report - Final building inspection checklist - Tweetdeck comn - Basic difference between spermatogenesis and oogenesis - Beer game bullwhip effect - They say i say introduction template - Distinguish between primary market and secondary market - Econometrics for Finance - In a market system, well-defined property rights are important because they - Words their way sort answer keys - Hay burner alto sax - Class b subnet mask - Compare online and traditional transactions in terms of richness - What is meant by impairment of assets - Chapter 14 multinational capital budgeting solutions - Common places mythologies of everyday life in russia - Watch movie too big to fail - Naval rank for short crossword clue - Davis v monroe county board of education synopsis - Guided reading ideas ks1 - Mountain view realty excel assignment - Nmb ball bearing catalogue - Clinical exercise physiology association - Still killing us softly advertising and the obsession with thinness - BHA415 Module 4 Case - What is an attributive tag - State diagram for online shopping system - The ledger of mai company includes the following accounts - Approval of minutes sample - Dulux powder coat colour chart - Asda training and development programmes - Grams to ounces gold - Bs o ring sizes - La biodiversidad se refiere a la gran variedad de formas de vida - Pre commencement site inspection checklist for building - Kellogg's india case study pdf - Dmu access to learning fund - Hygienic practices for food safety - Staffing process class 12 - Yellow journalism definition us history - Urgent 2 - Benefits of close grip bench press - Summary of The Discipline of Business Intelligence-Course 3 - Amway weight loss shakes - Cryptography and Network Security - Uts meaning in engineering - Operations management william j stevenson pdf - Sodium hydroxide potassium hydrogen phthalate - Political Competence - University of california essay prompts - Dr natalie gloede caringbah - Basic reading skills iep goals - Stella and blanche relationship - Robert morris associates financial ratios - What is a personal creed - This blood's for you tommy combs - Can i compare thee to a summer's day - Always imposter among us hack - Chemistry - How the market works assignment answers - HR paper - Article question and answer - Wk 4, IOP 480: DR 2 - Slader chemistry connections to our changing world - Afn equation excel - Harvard referencing wsu - MET - 9780133741322 - Demolition control precinct map - Atlantis eyecare long beach - Health promotion in nursing practice 6th ed - Lincoln v205 tig welder - - Community Teaching Plan: Community Teaching Work Plan Proposal - Need sunday - Post a description of at least one potential benefit of using big data as part of a clinical system and explain why. - Sports management HTML css website building - Limitation of break even chart - Climax of merchant of venice - Jack the ripper suspects james maybrick - Slader ap stats 5th edition - Qlik sense not equal set analysis - Tinder error code 403 40316 - American society of echocardiography certification - Transfer station moonee valley - Students using phones in school - 94.4 kg to lbs - Monthly fee commonwealth bank - Persuasive speech on teenage driving