Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

What is the purpose of a cirt plan

08/12/2021 Client: muhammad11 Deadline: 2 Day

Managing Risk in Information Systems

Powered by vLab Solutions

JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES

LABORATORY MANUAL TO ACCOMPANY

VERSION 2.0

INSTRUCTOR VERSION

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

90

Introduction

When a company experiences a computer incident, its security team that collects and

monitors incidents must make a decision. That decision is whether the incident is benign,

or whether it signals a greater problem, such as an attempted (or successful) security

breach.

When people hear “security breach,” they often imagine sinister hackers bypassing

firewalls to steal top secret plans. The attack might be one of thousands, a “noisy” spray

of exploits across a network. Or the attack might be targeted solely at one company and,

as the attacker hopes, more stealthy.

In any case, as different pieces of evidence are collected, it becomes easier to confirm

whether a breach really has occurred and, if so, how it must be handled by a specialized

team of security professionals. These special teams are referred to as computer incident

response teams (CIRTs). A CIRT team operates on the actions laid out in a CIRT plan.

The purpose of a computer incident response team (CIRT) plan is to mitigate risks found

in the seven domains of a typical IT infrastructure.

When tasked to manage a security breach, a CIRT team will identify, analyze, and

contain the extent of the security breach. Then they will get rid of the breach and

whatever traces—a virus or other malware—were left behind. Next, as some business

functions might have been affected, the CIRT team helps recover from the breach. Lastly,

the CIRT team discusses and improves its CIRT plan based on lessons learned during a

review session.

In this lab, you will explain how CIRT plans mitigate risks, you will identify where CIRT

monitoring and security operation tasks occur throughout an IT infrastructure, you will

identify the security controls and countermeasures that mitigate risk, and you will create a

CIRT response plan.

Learning Objectives

Upon completing this lab, you will be able to:

Explain how a CIRT plan can help mitigate risks found in the seven domains of a

typical IT infrastructure.

Lab #10 Creating a CIRT Response Plan for a Typical IT Infrastructure

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

93

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Instructor Lab Manual

Hands-On Steps

Note: This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access to Microsoft® Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files.

3. Review the Mock IT infrastructure for a health care IT infrastructure servicing patients with life-threatening conditions (see Figure 1).

Figure 1 Mock IT infrastructure

4. Identify and then document the security controls and security countermeasures you can implement throughout Figure 1 to help mitigate risk from unauthorized access and access to intellectual property or customer privacy data.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

94 | LAB #10 Creating a CIRT Response Plan for a Typical IT Infrastructure

5. Review the steps for creating a CIRT plan as outlined in the following table:

Step Description of Step

Preparation What tools, applications, laptops, and communication devices are needed to address computer/security incident response for this specific breach?

Identification When an incident is reported, it must be identified, classified, and documented. During this step, the following information is needed: validating the incident; identifying its nature, if an incident has occurred; identifying and protecting the evidence; and logging and reporting the event or incident.

Containment The immediate objective is to limit the scope and magnitude of the computer/security-related incident as quickly as possible, rather than allow the incident to continue to gain evidence for identifying and/or prosecuting the perpetrator.

Eradication The next priority is to remove the computer/security-related incident or breach’s effects.

Recovery Recovery is specific to bringing back into production those IT systems, applications, and assets that were affected by the security-related incident.

Post-Mortem Review Following up on an incident after the recovery tasks and services are completed is a critical last step in the overall methodology. A post-mortem report should include a complete explanation of the incident and the resolution and applicable configuration management, security countermeasures, and implementation recommendations to prevent the security incident or breach from occurring again.

Note: The post-mortem review is arguably the most important step as CIRT team members re-evaluate their actions with the valuable luxury of hindsight. When the CIRT members are able to look back to compare what they saw and how it related to what happened next, they can continually improve what they offer the organization.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

95

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Instructor Lab Manual

6. Create a CIRT response plan approach according to the six-step methodology unique to the risks associated with the item you choose from the following:

 Internet ingress/egress at ASA_Student

 Headquarters’ departmental VLANs on LAN Switch 1 and 2 with cleartext

privacy data

 Remote branch office locations connected through the WAN

 Data center/server farm at ASA_Instructor

Note: This completes the lab. Close the Web browser, if you have not already done so.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Math Guru
Top Grade Tutor
Instant Assignments
Assignments Hut
A+GRADE HELPER
Top Class Results
Writer Writer Name Offer Chat
Math Guru

ONLINE

Math Guru

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$45 Chat With Writer
Top Grade Tutor

ONLINE

Top Grade Tutor

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$34 Chat With Writer
Instant Assignments

ONLINE

Instant Assignments

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$38 Chat With Writer
Assignments Hut

ONLINE

Assignments Hut

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$43 Chat With Writer
A+GRADE HELPER

ONLINE

A+GRADE HELPER

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$15 Chat With Writer
Top Class Results

ONLINE

Top Class Results

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$16 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Sheffield hallam finance office - Big Data and Blockchain Technology - Crystal structure ppt presentation - American Nurses Association - Stone age necklace craft - Which of the following material has maximum ductility answer - Stevenson operations management 13th edition citation - Module 05 Discussion - When Disaster Strikes - Management by exception is a practice whereby managers focus more closely on ________. - Skinpen by bellus medical for sale - KINROSS Gold and Challenge in Brazil and The Bread Scandal and Loblaw's Ethical Culture - Letter from birmingham jail pathos essay - Information Systems - “strategic brand management”, 4th edition, kevin l. keller, pearson, isbn 978-0-13-266425-7. - Arguments for and against physician assisted suicide - Starbucks: Venti Social Responsibility and Brand Strategy - Big w fishing rods - Elements of an ethical sampling plan in nursing - WAS THE INDUSTRIAL REVOLUTION A PUBLIC HEALTH DISASTER OR BOON?" DISCUSS - Designs: Experimental Designs, Quasi Experiments, and Non-Experimental Designs - 3874 presentation - One way design psychology - Nature analogies worksheet answers - Internal and external stakeholders of a hospital - Deliverable 3 - Confidence Intervals - Jib grades of electrician - Www lufthansa com us en free baggage rules - Figurative language for sadness - Firm risk scorecard risk classification system - Burke litwin model of organisational change - 3 5 x 1 2 - No joking around with naming triangles joke 11 - Catholic social justice organisations - Yushan bicycles learning to ride abroad pdf - Surface tension of tap water - How to apply ion boardroom theme - Heart probs - Journal of Criminal Justice. - Commemorative speech examples about fathers - A _____ person achieves a balance between risk and payoff. - Team proposal soc 110 week 5 - Calculating and reporting healthcare statistics chapter 7 test - Imagery examples in the book thief - Yamaha yds 2.13 software download - Anorexia y bulimia en puerto rico - Where can you buy colgate wisp in canada - Hrm 2 marks questions and answers - Genesis summary chapter 1 - Arman long term parking 1982 - Sociology - Role and purpose of accounting information systems - Civil rights matrix - Tectonic map of hypothetical ocean basin - How to write a self critique paper - Steep turns common errors - Che che kule meaning - Plumpton college veterinary nursing - Peter johnson police scanner tasmania - Matt teachout - Proximodistal trend of body growth - What was the ghazu what was the ummah - Positive risk examples in software project - Community health - Cpt code for urolift procedure - Advantages and disadvantages of urban areas - Red cross arcmail sign in - Hardware, Software, and Network Requirements - Glencoe states of matter virtual lab - Indexed sequential file organization - Www gcflearnfree org excel 2010 - Module 1 - Legal and Ethical Case Project - MKT/421T - Distinguish between infrasonic and ultrasonic sound waves - Resource data management rdm - Penn foster information literacy exam answers - Bornavirus in birds symptoms - An atlas of impossible longing summary - Coventry auto parts bunbury - Zen and the art of faking it sparknotes - A Comprehensive Review of the Best Widower Dating Site - Ironport messaging gateway appliance - Management information system case study - Highline university mentor program case questions - 5448 kincaid street pittsburgh pa - How to prepare a bank reconciliation and record adjustments - Real estate listing system - Access guided project 1 2 - Alaska fisheries science center - Grundfos magna1 fault codes - Cedar ward whipps cross - Unit VII Annotated Bibliography - TEAM MANAGEMENT assignment 1 - Network filters and transmission lines books free download - Denmark shire fire restrictions - Bus/475 - Foldable saint andrew's cross plans - Quantum physics practice test - Bbc weather paris next week - Ovens and murray advertiser - 340 B Discussion