W Hudson Homework 2
.docx
keyboard_arrow_up
School
Kennesaw State University *
*We aren’t endorsed by this school
Course
7350
Subject
Computer Science
Date
Jan 9, 2024
Type
docx
Pages
4
Uploaded by BaronKnowledge10070
William Hudson
CYBR7350
HW # 2
1. Research and identify various incident response (IR) templates/guidelines for organizations. Please list three examples (e.g., NIST, CISA, various private/public organizations, etc.). (15 points)
The three incident response plans that I read about are:
a.
NIST Special Publication 800-61 Rev.2: Computer Security Incident Handling Guide
b.
CISA National Cyber Incident Response Plan (NCRIP)
c.
SANS Organization Incident Handling Templates
The NIST SP 800-61 Rev.2 publication provides a comprehensive guide for establishing an effective incident response program. It covers various aspects of incident handling, including preparation, detection and analysis, containment, eradication, and recovery (Cichonski, et al.
2012). It is the official incident response guide of the Department of Commerce and is platform, operating system, protocol and application agnostic, making it a versatile tool for any organization to strengthen their incident response processes. The publication details the need for incident response, reviews the basic incident handling steps, advises of the suggested data to collect, provides additional resources that may be helpful when handling an incident, and seeks to provide an overall understanding and methodology that allows organizations to tailor an IR plan that is specific to their unique needs. The National Cyber Incident Response Plan is published by the Department of Homeland Security is designed to be the “strategic framework for operational coordination among federal and SLTT [State, Local, Tribal, Territorial] governments, the private sector, and international partners” (CISA, 2016). It seeks to ensure continuity and approach standardization for all organizations, allowing for a united and organized effort in response to cyber incidents. The NCRIP offers resources that establish a common framework for evaluating the severity of a cyber incident to assist in the communication efforts during a cyber incident. It also provides a guideline on reporting cyber incidents to the federal government, key points of contact, and the roles and responsibilities for federal agencies during a cyber incident. The NCRIP also defines the core capabilities of organizations and provides critical tasks an organization should complete to ensure a strong response to any cyber incident. The SANS Incident Handling Templates are a collection of templates created by and maintained by the SANS Institute, and can be accessed here
. Rather than a collection standards and guidelines for creating an IR policy within the organization, the SANS Institute has condensed several specific documents that are meant to be used by incident response personnel to document important information before and during a cyber incident. There are templates to hep responders annotate communications efforts during an incident, templates
to help responders determine what key information should be captured, chain of custody logs and other documents that would help responders organize the work they do during the
William Hudson
CYBR7350
HW # 2
incident. They are one of the few organizations that specify that the templates they provide are free for use to any business. Their templates appear to be designed for hands-on use by the incident responders rather than a methodology for how to create a plan to respond. 2. Analyze and articulate the differences and similarities between at least two of the templates. (30 points)
The NIST SP 800-61 Rev. 2 and NCRIP are very similar in fact that they are both created by governmental entities that seek to help an organization improve their incident response posture by providing methodologies, guidelines, and standards that can be implemented regardless of an organization’s specific hardware, software, or network configurations. They both contain a massive amount of information designed to help all organizations create an IR
plan regardless of the organization’s current security posture. They both offer very detailed information about cybersecurity and incident response as a whole and are meant to be used to build out a feasible program. Both documents seek to outline the roles and responsibilities of the different parties that may be involved in a cyber incident, as well as providing information on where to obtain more assistance. There are some tools that can be used to help identify and triage incidents, but these documents are mainly used for an organization to create an IR plan by providing information about the important targets and functions within the organization, offering an outline that should be followed for maximum effectiveness in drafting an IR plan.
Conversely, the SANS collection of incident response plans appears to be designed with the front-line incident responder who is actively working the incident in mind. Rather than long-
winded explanations of all the things to consider, the SANS collection of documents are specific to different parts of the incident response process, such as chain of custody collection documents, communication logs, and individual system triage forms. The SANS collection assumes that the person using their forms are already versed in information technology and cyber security, whereas a manager without a technical background can build an IR plan using the NIST SP 800-61 Rev 2 and NCRIP. 3. Which template would you recommend for Kennesaw State University and why? (30 points)
In cybersecurity, the best defenses are those that have a layered approach. Because of that, I would recommend a combination of these templates to ensure a strong incident response plan for Kennesaw State University. I would recommend using CISA’s NCRIP as the main building block to the IR plan because it provides information specifically to state governments. This is an important distinction versus the NIST SP 800-61 Rev 2 due to KSU being a part of the USG system which receives funding from the state government. The NCRIP goes into great detail on the roles and responsibilities for all governmental entities and provides links to specific agencies
to assist in the incident response process. In addition to the NCRIP, I would recommend having
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
In this discussion post, you will analyze and provide your perspective on why, in spite of verbose information and data on the likelihood and impact of a cybersecurity event, many organizations do not properly prepare for one. Begin by reading the article “Why Organizations Don’t Prepare for Information Security Incidents”.
After reading the article provided above, respond to the following prompts in your post:
Post at least three reasons you think organizations don’t prepare for information security incidents.
Many applications that impact security and privacy are free. As a consumer, do you see more value in paying for an application that is more secure and does not use your personal information as part of the transaction? Justify your answer.
arrow_forward
17
18
19
According to the NIST Cybersecurity Framework, an organization can use the Framework as a key part of its systematic process for identifying, assessing, and managing
cybersecurity risk.
Based on your reading of the NIST Cybersecurity Framework, please select all the appropriate statement(s) that guide organizations on how the Framework can be used.
0 000
The Framework is not designed to replace existing processes; an organization can use its current process and overlay it onto the Framework to determine gaps in its
current cybersecurity risk approach and develop a roadmap to improvement.
The Framework is designed to complement existing business and cybersecurity operations.
It can serve as the foundation for a new cybersecurity program or a mechanism for improving an existing program.
The Framework is designed to completely replace existing cybersecurity management practices and requires that organizations start fresh when "moving to the
framework"
O O O O
The Framework…
arrow_forward
Have you ever seen someone being harassed or bullied by someone else over the internet? When you initially learned of the issue, what was the very first thing that went through your head? How did you get at the conclusion that the individual had been the target of bullying conduct prior to your intervention? In other words, how did you come to that conclusion?
arrow_forward
1. You've just been hired as a Chief Information Security Officer for a small startup. They've written four applications and just got funding to go live. Before they do so, they realized they've never had a cybersecurity professional, so they've hired you. While there are hundreds of things to do, you are asked to come up with a list of your top TEN (10) items, in a bulleted list, to focus on in the first day or two. These can be questions to ask or actions to take, and aren't meant to be the full solution, but the initial things you'll do to get control of the situation. Provide a NUMBERED LIST of TEN (10) items that is your initial list of priority areas to focus on and potential actions to take. Do not use more than one line per item. Many aswers are correct, so credit is given for coming up with ten good and comprehensive focus areas based on what we've covered in class, in the labs, and in our readings.
arrow_forward
Have you ever seen an instance of internet bullying or harassment? How did you react when you first heard about it? The person has apparently been the target of bullying previous to your intervention; please explain how you arrived at this judgment.
arrow_forward
Interns who appear to be violating many security policies are confronted by the CISO, who hears their complaints. The company claims its employees don't encrypt their computers, listen to music without a license, share files between work and personal devices, waste too much time on social media, and illegally access pornographic material. The CISO suggests drafting a security document (Rules of Behavior) with at least 15 rules outlining the conduct that is and is not acceptable on the company's network.
arrow_forward
A security policy is a document that provides employees with clear instructions about acceptable use of company confidential information, explains how the company secures data resources and what it expects of the people who work with this information. Most importantly, the policy is designed with enough flexibility to be amended when necessary.
You are working in organization X, and you are supposed to develop an issue-specific security policy, you can pick one issue from Table.1 [1] (In the photos)
Your Task is:
To develop the different sections of your policy and adequate procedure(s), you can refer to SANS Policy Templates [2].
References:
[1] Developing an Information Security Policy: A Case Study Approach, Fayez Hussain Alqahtani. 4th Information Systems International Conference 2017, ISICO 2017, 6-8 November 2017, Bali, Indonesia.
[2] https://www.sans.org/information-security-policy/
arrow_forward
Explain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework.
-The NIST Cybersecurity Framework is a set of mandatory rules for organizations to follow in order to protect themselves against cybersecurity risks.
-The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks.
-The NIST Cybersecurity Framework is a system of computers that monitors national cybersecurity threats and relays the information to businesses and other organizations.
-The NIST Cybersecurity Framework is a cybersecurity software package available to organizations from NIST intended to bolster firewall capabilities.
arrow_forward
Complete the "FIA's Complaints Registration Form" to report an incident of cybercrime. What's the trick?
arrow_forward
What larger concepts and patterns currently account for most instances of cybercrime? Please include citations if you'd want a full answer.
arrow_forward
CYB/405 **Who are the stakeholders although there may be multiple for some**
Who are the KEY STAKEHOLDERS for EACH plan and policy:
CYBERSECURITY PLANS:
-Vendor management plan
-Incident Response Plan
-Business Continuity Plan
-Disaster Recovery Plan
CYBERSECURITY POLICIES:
-Virus and spyware protection policy
-Firewall policy
- Intrusion prevention policy
-Host Integrity policy
arrow_forward
providing an explanation of the concept and concrete illustrations of how to identify levels of exposure?
arrow_forward
What do you think of the Act Creating the Agency for Cybersecurity and Infrastructure Security? Why don't you provide a source to back up your claim?
arrow_forward
You've been warned about a ransomware assault known as Ryuk. Assume that each infected device will cost you $100 to restore your files.
Write a one-page executive briefing (in memo style) outlining the following actions to address the danger you've identified:
Find out about a security danger and/or breach and study the information you findAssess the danger and prepare a briefing for senior management (a one-page paper in Word, PDF, etc.)Write a concise summary of the main aspects of the problemWhat effect, if any, could it have on St. Eligius?Make suggestions for short-term measures to reduce the risk.Suggestions for long-term mitigation
arrow_forward
State the details of an incident that you have read about (Example: breach due to attack, employee theft of data, etc.) and then use the incident response steps to analyze how you would handle the incident. Be certain to clearly name and define each step (Step 1: Identifying the Incident, etc.).
arrow_forward
You are assigned as a Cyber Investigator to a Computer Crimes Unit within the Department of Homeland Security. In your role, you are responsible for responding to crime scenes to collect items of digital evidence and conducting subsequent examinations of the things ordered. Legal analysis is inherent in your position, and you are required to document your legal authority for each investigation.
Today, you responded to a College Dormitory to investigate an unidentified individual downloading Child Sexual Abuse Material (CSAM). In the proceeding days, you downloaded 200 Gigabytes of known CSAM from a user over Peer2Peer software. During the download, you were able to identify the Suspect's Internet Protocol Address, as well as a Port Number. You specified the Suspect was using IP Address 71.143.70.239:8451. Subsequently, the Internet Service Provider identified that l leased the IP Address to University Dorm Rooms.
After coordinating with the university Office of Technology…
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Related Questions
- In this discussion post, you will analyze and provide your perspective on why, in spite of verbose information and data on the likelihood and impact of a cybersecurity event, many organizations do not properly prepare for one. Begin by reading the article “Why Organizations Don’t Prepare for Information Security Incidents”. After reading the article provided above, respond to the following prompts in your post: Post at least three reasons you think organizations don’t prepare for information security incidents. Many applications that impact security and privacy are free. As a consumer, do you see more value in paying for an application that is more secure and does not use your personal information as part of the transaction? Justify your answer.arrow_forward17 18 19 According to the NIST Cybersecurity Framework, an organization can use the Framework as a key part of its systematic process for identifying, assessing, and managing cybersecurity risk. Based on your reading of the NIST Cybersecurity Framework, please select all the appropriate statement(s) that guide organizations on how the Framework can be used. 0 000 The Framework is not designed to replace existing processes; an organization can use its current process and overlay it onto the Framework to determine gaps in its current cybersecurity risk approach and develop a roadmap to improvement. The Framework is designed to complement existing business and cybersecurity operations. It can serve as the foundation for a new cybersecurity program or a mechanism for improving an existing program. The Framework is designed to completely replace existing cybersecurity management practices and requires that organizations start fresh when "moving to the framework" O O O O The Framework…arrow_forwardHave you ever seen someone being harassed or bullied by someone else over the internet? When you initially learned of the issue, what was the very first thing that went through your head? How did you get at the conclusion that the individual had been the target of bullying conduct prior to your intervention? In other words, how did you come to that conclusion?arrow_forward
- 1. You've just been hired as a Chief Information Security Officer for a small startup. They've written four applications and just got funding to go live. Before they do so, they realized they've never had a cybersecurity professional, so they've hired you. While there are hundreds of things to do, you are asked to come up with a list of your top TEN (10) items, in a bulleted list, to focus on in the first day or two. These can be questions to ask or actions to take, and aren't meant to be the full solution, but the initial things you'll do to get control of the situation. Provide a NUMBERED LIST of TEN (10) items that is your initial list of priority areas to focus on and potential actions to take. Do not use more than one line per item. Many aswers are correct, so credit is given for coming up with ten good and comprehensive focus areas based on what we've covered in class, in the labs, and in our readings.arrow_forwardHave you ever seen an instance of internet bullying or harassment? How did you react when you first heard about it? The person has apparently been the target of bullying previous to your intervention; please explain how you arrived at this judgment.arrow_forwardInterns who appear to be violating many security policies are confronted by the CISO, who hears their complaints. The company claims its employees don't encrypt their computers, listen to music without a license, share files between work and personal devices, waste too much time on social media, and illegally access pornographic material. The CISO suggests drafting a security document (Rules of Behavior) with at least 15 rules outlining the conduct that is and is not acceptable on the company's network.arrow_forward
- A security policy is a document that provides employees with clear instructions about acceptable use of company confidential information, explains how the company secures data resources and what it expects of the people who work with this information. Most importantly, the policy is designed with enough flexibility to be amended when necessary. You are working in organization X, and you are supposed to develop an issue-specific security policy, you can pick one issue from Table.1 [1] (In the photos) Your Task is: To develop the different sections of your policy and adequate procedure(s), you can refer to SANS Policy Templates [2]. References: [1] Developing an Information Security Policy: A Case Study Approach, Fayez Hussain Alqahtani. 4th Information Systems International Conference 2017, ISICO 2017, 6-8 November 2017, Bali, Indonesia. [2] https://www.sans.org/information-security-policy/arrow_forwardExplain the purpose of the National Institute of Standards Technology (NIST) Cybersecurity Framework. -The NIST Cybersecurity Framework is a set of mandatory rules for organizations to follow in order to protect themselves against cybersecurity risks. -The NIST Cybersecurity Framework is a voluntary guide that helps organizations understand and protect themselves against cybersecurity risks. -The NIST Cybersecurity Framework is a system of computers that monitors national cybersecurity threats and relays the information to businesses and other organizations. -The NIST Cybersecurity Framework is a cybersecurity software package available to organizations from NIST intended to bolster firewall capabilities.arrow_forwardComplete the "FIA's Complaints Registration Form" to report an incident of cybercrime. What's the trick?arrow_forward
- What larger concepts and patterns currently account for most instances of cybercrime? Please include citations if you'd want a full answer.arrow_forwardCYB/405 **Who are the stakeholders although there may be multiple for some** Who are the KEY STAKEHOLDERS for EACH plan and policy: CYBERSECURITY PLANS: -Vendor management plan -Incident Response Plan -Business Continuity Plan -Disaster Recovery Plan CYBERSECURITY POLICIES: -Virus and spyware protection policy -Firewall policy - Intrusion prevention policy -Host Integrity policyarrow_forwardproviding an explanation of the concept and concrete illustrations of how to identify levels of exposure?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781305082168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781305082168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning