Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

What is the purpose of a cirt plan

08/12/2021 Client: muhammad11 Deadline: 2 Day

Managing Risk in Information Systems

Powered by vLab Solutions

JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES

LABORATORY MANUAL TO ACCOMPANY

VERSION 2.0

INSTRUCTOR VERSION

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

90

Introduction

When a company experiences a computer incident, its security team that collects and

monitors incidents must make a decision. That decision is whether the incident is benign,

or whether it signals a greater problem, such as an attempted (or successful) security

breach.

When people hear “security breach,” they often imagine sinister hackers bypassing

firewalls to steal top secret plans. The attack might be one of thousands, a “noisy” spray

of exploits across a network. Or the attack might be targeted solely at one company and,

as the attacker hopes, more stealthy.

In any case, as different pieces of evidence are collected, it becomes easier to confirm

whether a breach really has occurred and, if so, how it must be handled by a specialized

team of security professionals. These special teams are referred to as computer incident

response teams (CIRTs). A CIRT team operates on the actions laid out in a CIRT plan.

The purpose of a computer incident response team (CIRT) plan is to mitigate risks found

in the seven domains of a typical IT infrastructure.

When tasked to manage a security breach, a CIRT team will identify, analyze, and

contain the extent of the security breach. Then they will get rid of the breach and

whatever traces—a virus or other malware—were left behind. Next, as some business

functions might have been affected, the CIRT team helps recover from the breach. Lastly,

the CIRT team discusses and improves its CIRT plan based on lessons learned during a

review session.

In this lab, you will explain how CIRT plans mitigate risks, you will identify where CIRT

monitoring and security operation tasks occur throughout an IT infrastructure, you will

identify the security controls and countermeasures that mitigate risk, and you will create a

CIRT response plan.

Learning Objectives

Upon completing this lab, you will be able to:

Explain how a CIRT plan can help mitigate risks found in the seven domains of a

typical IT infrastructure.

Lab #10 Creating a CIRT Response Plan for a Typical IT Infrastructure

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

93

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Instructor Lab Manual

Hands-On Steps

Note: This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access to Microsoft® Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files.

3. Review the Mock IT infrastructure for a health care IT infrastructure servicing patients with life-threatening conditions (see Figure 1).

Figure 1 Mock IT infrastructure

4. Identify and then document the security controls and security countermeasures you can implement throughout Figure 1 to help mitigate risk from unauthorized access and access to intellectual property or customer privacy data.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

94 | LAB #10 Creating a CIRT Response Plan for a Typical IT Infrastructure

5. Review the steps for creating a CIRT plan as outlined in the following table:

Step Description of Step

Preparation What tools, applications, laptops, and communication devices are needed to address computer/security incident response for this specific breach?

Identification When an incident is reported, it must be identified, classified, and documented. During this step, the following information is needed: validating the incident; identifying its nature, if an incident has occurred; identifying and protecting the evidence; and logging and reporting the event or incident.

Containment The immediate objective is to limit the scope and magnitude of the computer/security-related incident as quickly as possible, rather than allow the incident to continue to gain evidence for identifying and/or prosecuting the perpetrator.

Eradication The next priority is to remove the computer/security-related incident or breach’s effects.

Recovery Recovery is specific to bringing back into production those IT systems, applications, and assets that were affected by the security-related incident.

Post-Mortem Review Following up on an incident after the recovery tasks and services are completed is a critical last step in the overall methodology. A post-mortem report should include a complete explanation of the incident and the resolution and applicable configuration management, security countermeasures, and implementation recommendations to prevent the security incident or breach from occurring again.

Note: The post-mortem review is arguably the most important step as CIRT team members re-evaluate their actions with the valuable luxury of hindsight. When the CIRT members are able to look back to compare what they saw and how it related to what happened next, they can continually improve what they offer the organization.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

95

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Instructor Lab Manual

6. Create a CIRT response plan approach according to the six-step methodology unique to the risks associated with the item you choose from the following:

 Internet ingress/egress at ASA_Student

 Headquarters’ departmental VLANs on LAN Switch 1 and 2 with cleartext

privacy data

 Remote branch office locations connected through the WAN

 Data center/server farm at ASA_Instructor

Note: This completes the lab. Close the Web browser, if you have not already done so.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Math Guru
Top Grade Tutor
Instant Assignments
Assignments Hut
A+GRADE HELPER
Top Class Results
Writer Writer Name Offer Chat
Math Guru

ONLINE

Math Guru

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$45 Chat With Writer
Top Grade Tutor

ONLINE

Top Grade Tutor

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$34 Chat With Writer
Instant Assignments

ONLINE

Instant Assignments

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$38 Chat With Writer
Assignments Hut

ONLINE

Assignments Hut

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$43 Chat With Writer
A+GRADE HELPER

ONLINE

A+GRADE HELPER

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$15 Chat With Writer
Top Class Results

ONLINE

Top Class Results

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$16 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Ray bradbury fahrenheit 451 inspiration - Module 09 Discussion - Brain Death: Ethical Considerations - Harvey norman moran furniture - Swot analysis for beddown - Walk right in sit right down - Ancient roman technology and engineering - Consumer autonomy in business ethics - Suzuki swift manufacturing country - Electric charge bbc bitesize - Vaso occlusive crisis nursing diagnosis - ART Appreciation - Why this class - Ring out wild bells summary - Concept development practice page 2 1 physics - Identify the competitive risks associated with cooperative strategies - Anzca part 2 course - Gotcha jessica mauboy chords - Intermediate accounting chapter 21 homework solutions - Adelaide uni cover sheet - Physics hl ib data booklet - The pedestrian analysis pdf - Case Study Analysis 1 - Australian standard as3740 2010 waterproofing of domestic wet areas - Fibonacci sequence in the bible - Types of energy sources webquest - Eating healthy speech outline - Galvanic cell experiment errors - Pastor encuentra dinero en su cartera para pagar las medicinas de su esposa. - Aws direct connect mtu - Difference between fixed displacement pump and variable displacement pump - The radicalism of the american revolution review - Armstrong and miller show series 4 - Pitcher and piano menu - Mi madre (1) en que (2) una dieta. - Mathematics vision project answers module 1 - How did president hoover respond to the depression - Greendale stadium case study answers - Formula for threshold voltage - The army crew team harvard business school - Duke ellington teddy roosevelt - General paper a level marking scheme - Book Review - Creswell and creswell research design pdf - Standard english conventions practice - 3 paragraphs anecdote of a story - Chap 7 questions MAC - Specific speed of axial flow pump - TikTok - Symbols in the namesake - Bsbrel401 answers - What is a cinquain - Career Planning and Management - Laboratory report gram staining exercise 7 - Mere christianity in spanish - I need a discussion following this instruction - Research proposal. - Citizens advice bureau towcester - Wait for graph in dbms - Derivative of ln y - Nurs340Case Study - Case Study - La beaute humaine pichon - Www footprintnetwork org en index php gfn page personal footprint - Why is photosynthesis nonspontaneous - Exclusionary Rule - What are some examples of discretionary benefits - How to find the area left of z - (2) Essays, 2-page minimum - Benefits of isometric drawing - Assignment - What is edi in healthcare - What determines reliability and creditability for good presentations - How the hr function varies between organisations in different sectors - The alpine house inc is a large retailer - Data analysis plan example pdf - Dry drayton primary school - A shipping company handles containers in three different sizes - Golden flax meal coles - Box hill high school newsletter - Arise a destination for a day spa - The project scope document is valuable for establishing - Pray tarry with me this night - A7 size in cm - Blue mountains bus routes - Elliptical settings nyt crossword clue - MK405 Unit 4 Discussion - Chest pain concept map - Human resources management st clair college - Trade support loan eligibility - Naval rank for short crossword clue - Cost benefit analysis of milgram study - Three tier web application - Trans 1 chloro 1 butene - Wk 1, HCS 430: DR 2 - Autolatina - Factor pairs of 2 - Aviation Insurance Policy Analysis Assignment - College bursar job description - Implementation plan - Local lion boone north carolina - When was the poem war photographer written