Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

What is the purpose of a cirt plan

08/12/2021 Client: muhammad11 Deadline: 2 Day

Managing Risk in Information Systems

Powered by vLab Solutions

JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES

LABORATORY MANUAL TO ACCOMPANY

VERSION 2.0

INSTRUCTOR VERSION

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

90

Introduction

When a company experiences a computer incident, its security team that collects and

monitors incidents must make a decision. That decision is whether the incident is benign,

or whether it signals a greater problem, such as an attempted (or successful) security

breach.

When people hear “security breach,” they often imagine sinister hackers bypassing

firewalls to steal top secret plans. The attack might be one of thousands, a “noisy” spray

of exploits across a network. Or the attack might be targeted solely at one company and,

as the attacker hopes, more stealthy.

In any case, as different pieces of evidence are collected, it becomes easier to confirm

whether a breach really has occurred and, if so, how it must be handled by a specialized

team of security professionals. These special teams are referred to as computer incident

response teams (CIRTs). A CIRT team operates on the actions laid out in a CIRT plan.

The purpose of a computer incident response team (CIRT) plan is to mitigate risks found

in the seven domains of a typical IT infrastructure.

When tasked to manage a security breach, a CIRT team will identify, analyze, and

contain the extent of the security breach. Then they will get rid of the breach and

whatever traces—a virus or other malware—were left behind. Next, as some business

functions might have been affected, the CIRT team helps recover from the breach. Lastly,

the CIRT team discusses and improves its CIRT plan based on lessons learned during a

review session.

In this lab, you will explain how CIRT plans mitigate risks, you will identify where CIRT

monitoring and security operation tasks occur throughout an IT infrastructure, you will

identify the security controls and countermeasures that mitigate risk, and you will create a

CIRT response plan.

Learning Objectives

Upon completing this lab, you will be able to:

Explain how a CIRT plan can help mitigate risks found in the seven domains of a

typical IT infrastructure.

Lab #10 Creating a CIRT Response Plan for a Typical IT Infrastructure

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

93

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Instructor Lab Manual

Hands-On Steps

Note: This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access to Microsoft® Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files.

3. Review the Mock IT infrastructure for a health care IT infrastructure servicing patients with life-threatening conditions (see Figure 1).

Figure 1 Mock IT infrastructure

4. Identify and then document the security controls and security countermeasures you can implement throughout Figure 1 to help mitigate risk from unauthorized access and access to intellectual property or customer privacy data.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

94 | LAB #10 Creating a CIRT Response Plan for a Typical IT Infrastructure

5. Review the steps for creating a CIRT plan as outlined in the following table:

Step Description of Step

Preparation What tools, applications, laptops, and communication devices are needed to address computer/security incident response for this specific breach?

Identification When an incident is reported, it must be identified, classified, and documented. During this step, the following information is needed: validating the incident; identifying its nature, if an incident has occurred; identifying and protecting the evidence; and logging and reporting the event or incident.

Containment The immediate objective is to limit the scope and magnitude of the computer/security-related incident as quickly as possible, rather than allow the incident to continue to gain evidence for identifying and/or prosecuting the perpetrator.

Eradication The next priority is to remove the computer/security-related incident or breach’s effects.

Recovery Recovery is specific to bringing back into production those IT systems, applications, and assets that were affected by the security-related incident.

Post-Mortem Review Following up on an incident after the recovery tasks and services are completed is a critical last step in the overall methodology. A post-mortem report should include a complete explanation of the incident and the resolution and applicable configuration management, security countermeasures, and implementation recommendations to prevent the security incident or breach from occurring again.

Note: The post-mortem review is arguably the most important step as CIRT team members re-evaluate their actions with the valuable luxury of hindsight. When the CIRT members are able to look back to compare what they saw and how it related to what happened next, they can continually improve what they offer the organization.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

95

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Instructor Lab Manual

6. Create a CIRT response plan approach according to the six-step methodology unique to the risks associated with the item you choose from the following:

 Internet ingress/egress at ASA_Student

 Headquarters’ departmental VLANs on LAN Switch 1 and 2 with cleartext

privacy data

 Remote branch office locations connected through the WAN

 Data center/server farm at ASA_Instructor

Note: This completes the lab. Close the Web browser, if you have not already done so.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Math Guru
Top Grade Tutor
Instant Assignments
Assignments Hut
A+GRADE HELPER
Top Class Results
Writer Writer Name Offer Chat
Math Guru

ONLINE

Math Guru

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$45 Chat With Writer
Top Grade Tutor

ONLINE

Top Grade Tutor

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$34 Chat With Writer
Instant Assignments

ONLINE

Instant Assignments

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$38 Chat With Writer
Assignments Hut

ONLINE

Assignments Hut

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$43 Chat With Writer
A+GRADE HELPER

ONLINE

A+GRADE HELPER

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$15 Chat With Writer
Top Class Results

ONLINE

Top Class Results

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$16 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Managing Access Controls - Cim certificate in professional marketing official module guide - Pseudo code for grading system - Density of fluorine at stp - Srs restraint system malfunction service required - +971561686603 Abortion pills in Dubai/Abu Dhabi-mifepristone & misoprostol in DUBAI - Social sciences north flinders university - Conflict resolution in nursing management - Which object converts wind power into electricity - Pr 7 2a accounting - CA history - Ffdc logs in websphere application server - Diagram of the earths layers - The corporate controller's salary would be considered - John wesley class meetings - Mental health - Aiou degree verification contact number - Autozone inc case study analysis - Www makesigns com sciposters_templates aspx - Health care management - Cloud computing refelction paper - I have called you and you are mine - Information Technology Strategic Planning - Fitness fanatics is a regional chain of health - Mcdonalds drive thru greeting - Freezing Point Depression lab - Research journal of english language and literature rjelal - Security architecture 9.1 - How was martin luther king jr a good leader - Post- Tania - The importance of partnership working with colleagues - Ender's game giant's drink - 19 function analysis homework answers - BE- Paper-1 - Camm2 data manager jobs - Legislators in the State. - Otitis media soap note example - Https www hudp260 com pages resources hudtraining_mm3_portal aspx - What is the slope of a 45 degree line - Solve 3x 2 5x 1 0 using the quadratic formula - Directional coupler transfer matrix - StrategicHumanResourcesManagement_Assessment4 - Bad sam module symptoms - Kalief browder essay - Wps prenhall com educational research - Evan company reports net income of - Cloud computing assignment questions pdf - Enterprise technical infrastructure security plan - Ideas for a school captain speech - Essential cell biology 2010 - Business analytics statement of purpose - Order # 9551 - Coca cola mode of entry in india - Definition of the word fatigue - Massacre of the dreamers essays on xicanisma pdf - Butcher willows shopping centre - Roast leg of lamb woolworths - Secret life of bees chapter 3 questions and answers - Proposal for implementing it security management - Devil rays swim team - Caroline bowen multiple oppositions - SBAR - Echtgeld online Casino Spiele – welche Vorteile haben Sie? - Unisa microsoft office download - HW - Issues facing woolworths - Edinburgh napier social sciences - Honeywell products price list - Respond to this discussion - Mm cm m km - Project: Part 2: Putting Social Advocacy Skills into Action-6361-project - Aoa network diagrams use only - Informal paper - Six kingdoms of life characteristics - Pandora ring size comparison - In establishing warranties on hdtv sets - Www webtools citynet net - Writing for television radio and new media 11th edition pdf - Byrne and clore reward need satisfaction theory - Vodafone erp implementation failure - Answer both of these prompts. - Fraser island camping zones map - A carnival game offers cash prize - Glaukon seems to think that people are - Selfie Editor - Accounting movie summary and analysis - Soc 262 definition of race - Week 1 plagiarism free - Permutations and combinations hsc questions - Mov project management - Essay - Mise en scène cinéma et lecture pdf - Starbucks product line and mix - Pros and cons of being a union steward - Icity bcu ac uk - National code of practice for working at heights - Suppose that there are 10 million workers in canada - ___________ is primarily a performer's art form - Mini golf castro valley groupon - What is a voluntary statement