Running Head: AFTER ACTION REVIEW #3 After Action Review #3 Project 4 CYB 670 9041 Capstone in Cybersecurity (2202) Group 3 – Canada Michele Mitchell, Shelby Pittman, Michaella Powell, Devalle Wright University of Maryland Global Campus 1 AFTER ACTION REVIEW #3 2 Table of Contents Planner 3 Cyber Intelligence Analyst 6 Organizer/Reviewer 8 Digital Forensics Analyst 9 AFTER ACTION REVIEW #3 3 The After Action Report #3 consists of the Planner, Cyber Intelligence Analyst, Organizer/Reviewer, and the Digital Forensics Analyst which outlines the making of proper decisions that pertain to our designated roles. Accordingly, the Avistel organization had to respond to an economic downturn along with a worm intrusion. Each roles debrief about the rounds and the main focus and more money on security measures. The other sections had little funding provided since they were not seen as important or pertinent to the safety of the organization. Can you help me write this? . Note from site: Now that all three rounds of events have concluded, review the results as a team and collaborate to create the final After Action Report of the exercise, AAR #3. Planner In the recent past, companies and business entities have migrated their activities to onlinebased platforms. The progress is aimed at creating a secure, convenient, and reliable business activities. The progress will also help the company to increase the number of customers and clients. Avistel Telecommunication Company has enhanced its operations as it offers sensitive telecommunication activities (Sajeed et al., 2017). In all the three simulations rounds, cyberattacks like the Trojan attack have led to significant downtime in the company as well as information damage. The simulation rounds reveal that when controlling the Trojan attack to the company, other protruding items like an economic downturn distributed denial of service attack, criminal hacking, and worm intrusion will be significantly minimized. These form some of the items that the Avistel Telecommunication Company must consider when planning on cybersecurity entities like the Trojan attack. Antivirus policy is one of the critical aspects that help Avistel company to determine the proliferation of the Trojan attack. Notably, the antivirus policy examines the state of the network AFTER ACTION REVIEW #3 4 system of the company. As such, the technical team determines whether the attack has been launched into the system or not. Also, the antivirus policy allows the network system of the company to install and configure aspects like antiviruses that can mitigate the invasion of viruses. The backup policy also helps the company to recover essential information lost during cyberattacks (Li et al., 2020). A reliable backup system like redundant array of independent disks (RAID) 6 can help the company to retrieve documents that might be lost during the Trojan attack. Breach notification policy is the other critical items that can be used by the Avistel Telecommunication Company to combat the Trojan attack. At times, hackers and other malicious online users can access the network system of the company without permission. With the breach notification policy, the company’s technical team gets an alert, thus helping them to take any appropriate action that can prevent further destruction to the network system of the company. The information privacy policy also helps the company to share business information with other similar companies in the market spectrum. The information privacy policy determine the type of information that can be shared from the company to the other. Hackers can use any information from the company and other malicious online users to carry out their destructive activities. Information sharing between the Avistel Telecommunication Company and other telecommunication companies around the globe can help it to grow and enhance its business activities. Information sharing on the Trojan attack will help the company to learn some of the techniques which can be used by the company to control the attack (Sajeed et al., 2017). Unfortunately, the amount of information to be shared between the companies is limited. The information-sharing policy plays a vital role in outlining the rules regulating information sharing between companies.