Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

What is the purpose of a cirt plan

08/12/2021 Client: muhammad11 Deadline: 2 Day

Managing Risk in Information Systems

Powered by vLab Solutions

JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES

LABORATORY MANUAL TO ACCOMPANY

VERSION 2.0

INSTRUCTOR VERSION

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

90

Introduction

When a company experiences a computer incident, its security team that collects and

monitors incidents must make a decision. That decision is whether the incident is benign,

or whether it signals a greater problem, such as an attempted (or successful) security

breach.

When people hear “security breach,” they often imagine sinister hackers bypassing

firewalls to steal top secret plans. The attack might be one of thousands, a “noisy” spray

of exploits across a network. Or the attack might be targeted solely at one company and,

as the attacker hopes, more stealthy.

In any case, as different pieces of evidence are collected, it becomes easier to confirm

whether a breach really has occurred and, if so, how it must be handled by a specialized

team of security professionals. These special teams are referred to as computer incident

response teams (CIRTs). A CIRT team operates on the actions laid out in a CIRT plan.

The purpose of a computer incident response team (CIRT) plan is to mitigate risks found

in the seven domains of a typical IT infrastructure.

When tasked to manage a security breach, a CIRT team will identify, analyze, and

contain the extent of the security breach. Then they will get rid of the breach and

whatever traces—a virus or other malware—were left behind. Next, as some business

functions might have been affected, the CIRT team helps recover from the breach. Lastly,

the CIRT team discusses and improves its CIRT plan based on lessons learned during a

review session.

In this lab, you will explain how CIRT plans mitigate risks, you will identify where CIRT

monitoring and security operation tasks occur throughout an IT infrastructure, you will

identify the security controls and countermeasures that mitigate risk, and you will create a

CIRT response plan.

Learning Objectives

Upon completing this lab, you will be able to:

Explain how a CIRT plan can help mitigate risks found in the seven domains of a

typical IT infrastructure.

Lab #10 Creating a CIRT Response Plan for a Typical IT Infrastructure

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

93

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Instructor Lab Manual

Hands-On Steps

Note: This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access to Microsoft® Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files.

3. Review the Mock IT infrastructure for a health care IT infrastructure servicing patients with life-threatening conditions (see Figure 1).

Figure 1 Mock IT infrastructure

4. Identify and then document the security controls and security countermeasures you can implement throughout Figure 1 to help mitigate risk from unauthorized access and access to intellectual property or customer privacy data.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

94 | LAB #10 Creating a CIRT Response Plan for a Typical IT Infrastructure

5. Review the steps for creating a CIRT plan as outlined in the following table:

Step Description of Step

Preparation What tools, applications, laptops, and communication devices are needed to address computer/security incident response for this specific breach?

Identification When an incident is reported, it must be identified, classified, and documented. During this step, the following information is needed: validating the incident; identifying its nature, if an incident has occurred; identifying and protecting the evidence; and logging and reporting the event or incident.

Containment The immediate objective is to limit the scope and magnitude of the computer/security-related incident as quickly as possible, rather than allow the incident to continue to gain evidence for identifying and/or prosecuting the perpetrator.

Eradication The next priority is to remove the computer/security-related incident or breach’s effects.

Recovery Recovery is specific to bringing back into production those IT systems, applications, and assets that were affected by the security-related incident.

Post-Mortem Review Following up on an incident after the recovery tasks and services are completed is a critical last step in the overall methodology. A post-mortem report should include a complete explanation of the incident and the resolution and applicable configuration management, security countermeasures, and implementation recommendations to prevent the security incident or breach from occurring again.

Note: The post-mortem review is arguably the most important step as CIRT team members re-evaluate their actions with the valuable luxury of hindsight. When the CIRT members are able to look back to compare what they saw and how it related to what happened next, they can continually improve what they offer the organization.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

95

Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Instructor Lab Manual

6. Create a CIRT response plan approach according to the six-step methodology unique to the risks associated with the item you choose from the following:

 Internet ingress/egress at ASA_Student

 Headquarters’ departmental VLANs on LAN Switch 1 and 2 with cleartext

privacy data

 Remote branch office locations connected through the WAN

 Data center/server farm at ASA_Instructor

Note: This completes the lab. Close the Web browser, if you have not already done so.

Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Math Guru
Top Grade Tutor
Instant Assignments
Assignments Hut
A+GRADE HELPER
Top Class Results
Writer Writer Name Offer Chat
Math Guru

ONLINE

Math Guru

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$45 Chat With Writer
Top Grade Tutor

ONLINE

Top Grade Tutor

I find your project quite stimulating and related to my profession. I can surely contribute you with your project.

$34 Chat With Writer
Instant Assignments

ONLINE

Instant Assignments

As per my knowledge I can assist you in writing a perfect Planning, Marketing Research, Business Pitches, Business Proposals, Business Feasibility Reports and Content within your given deadline and budget.

$38 Chat With Writer
Assignments Hut

ONLINE

Assignments Hut

I am an experienced researcher here with master education. After reading your posting, I feel, you need an expert research writer to complete your project.Thank You

$43 Chat With Writer
A+GRADE HELPER

ONLINE

A+GRADE HELPER

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$15 Chat With Writer
Top Class Results

ONLINE

Top Class Results

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$16 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

0.00001 in scientific notation - The great white hope summary - Information systems infrastructure evolution and trends articles - Bellamy organic vietnam - ORGAN LED Week 8 - Intro To Project Scenario - Religion and Technology - The death of the hired man summary - Rena vite vs dialyvite - Www bankrate com calculators mortgages amortization calculator aspx - The civically engaged reader pdf - Two hazel eyed parents have a blue eyed child - Follow up discussion - Culture Presentation - 17 to the nearest 10 - Grapes of wrath summary - Advanced pathophysiology study worksheet - Historical lens definition - Does megabus have charging outlets - 100m in 9.58 seconds to km/h - Travel and dance christmas anagram - Article review - Mastermix mashed up 14 - Cryptography and Network Security - Peer response - Eng Comp II - Gyproc system solutions book - 300 words - Annoated on cybersecurity - Financial reporting practices in healthcare articles - Managerial economics froeb pdf - Sap sd resume pdf - Define logistics engineering - Need help with report. - Snhu operations and project management - Warzewitsch frog - A tow truck pulls a car along - Quality improvement proposal - 4 weeks course - PEDS - Ieee research papers on iot 2017 - Hr case study scenarios - STATISTICS - Maslow's hierarchy of needs nursing diagnosis - Case Study - Match the graphs with their parametric equations - Science riddles about energy - W7 - Durgadevi guhagar bhakta niwas - Assignment - Spums diving medical form - General ledger order of accounts - Discussion & Assignment - Paper planes urban dictionary - Evaluating the Credibility of an Academic Essay Help Service - Dynamics in nursing art and science of professional practice - What is te form - Square peg solitaire solution - Brightness of a light bulb in a circuit - Machine shop industry statistics - Commemorative speech examples about fathers - Donald super career development theory - Real time business intelligence at continental airlines case study - Equivalence point precipitation titration - Blc sharp essay format - What is the main theme of snow white - Thermochemistry and hess's law lab discussion questions - Compare and contrast homer and virgil - Keebler cracker brand nyt crossword - Does proactive sell in stores - Tic tac toe java eclipse - One fifty lashes dan murphys - Buescher cornet serial numbers - 12 hour cough relief target - Chan naylor moonee ponds - Stance essays on treating animals humanely - Transformation process in operations management examples - Most projects have one path through a network diagram - Types of perception in organizational behaviour - Aplia access code free - Bcu admissions contact number - Behavioural approach to treating phobias - Texas executive branch assignment:vetoes - Criminal justice - Merritt's bakery case study - No plagiarism/ must be original/ scholarly resources 2015 - Stoneygate children's centre preston - Myagedcare service provider portal - The honourable wally norman - The great conversation melchert pdf - Dyson company pestel analysis - 1/24 treloar crescent braybrook - Herbert l smith broward county - Best ratio for bubble mixture - Image processing literature review - Lady macbeth character traits - According to philosopher john locke, which of the following statements about human rights is true? - Blanket drag first aid - Common problems in the community - Part B: Your Marketing Plan