SlideShare a Scribd company logo
1 of 2
Read the NIST documents that I provided and Chapter 12 in
your text. Select one of the following types of breaches:1. A
SQL Injection was performed by a hacker, resulting in the loss
of PII data.
2. You have discovered a covert leak (exfiltration) of sensitive
data to China.
3. Malcious code or malware was reported on multiple users'
systems.
4. Remote access for an internal user was compromised -
resulting in the loss of PII data.
5. Wireless access. You discovered an "evil twin" access point
that resulted in many of your users connecting to the hacker's
access point while working with sensitive data.
6. Compromised passwords. You discovered that an attacker
used rainbow tables to attack your domain's password file in an
offline attack. Assume that all of your user's passwords are
compromised.
7. A DoS or DDoS was performed against your system,
resulting in the loss of 3 hours of downtime and lost
revenue.Your submission should include three paragraphs and a
cover page and references for the following:
Paragraph 1: IRT Team
. What would the IRT team look like for this incident (who
would be on the team to be able to effectively handle the
event)? Justify your choices.
Paragraph 2:
Approach. Address
HOW
you would respond. What logs or tools would you use to
identify/analyze the incident? What would alert you to the
incident? What tools would you use to contain/recover from the
incident?
Paragraph 3:
Metrics. Who would you measure your team's response
effectivenss? What measurements/metrics would you track?

More Related Content

Similar to Read the NIST documents that I provided and Chapter 12 in your text..docx

Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
arri2009av
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
sunil kumar
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
sunil kumar
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
SilverGold16
 
Cyber Security DepartmentGraduation Project (407422)
Cyber Security DepartmentGraduation Project  (407422)Cyber Security DepartmentGraduation Project  (407422)
Cyber Security DepartmentGraduation Project (407422)
OllieShoresna
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docx
healdkathaleen
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
Harshil Barot
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
Kaukau9
 

Similar to Read the NIST documents that I provided and Chapter 12 in your text..docx (20)

Based on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdfBased on the below and using the 12 categories of threats identify 3 .pdf
Based on the below and using the 12 categories of threats identify 3 .pdf
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
Hacking databases
Hacking databasesHacking databases
Hacking databases
 
Andrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.pptAndrews whitakrer lecture18-security.ppt
Andrews whitakrer lecture18-security.ppt
 
System and web security
System and web securitySystem and web security
System and web security
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
 
Cyber Security DepartmentGraduation Project (407422)
Cyber Security DepartmentGraduation Project  (407422)Cyber Security DepartmentGraduation Project  (407422)
Cyber Security DepartmentGraduation Project (407422)
 
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security RisksOWASP Top 10 - The Ten Most Critical Web Application Security Risks
OWASP Top 10 - The Ten Most Critical Web Application Security Risks
 
Running head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docxRunning head Cryptography1Cryptography16.docx
Running head Cryptography1Cryptography16.docx
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Security
 
Ehical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network SecurityEhical Hacking: Unit no. 1 Information and Network Security
Ehical Hacking: Unit no. 1 Information and Network Security
 
Introduction of hacking and cracking
Introduction of hacking and crackingIntroduction of hacking and cracking
Introduction of hacking and cracking
 
Introduction To Information Security
Introduction To Information SecurityIntroduction To Information Security
Introduction To Information Security
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
 
Ethical_Hacking_ppt
Ethical_Hacking_pptEthical_Hacking_ppt
Ethical_Hacking_ppt
 
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdfASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
ASSIGNMENT 2 LOGICAL DATABASE DESIGN (CPT307).pdf
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 

More from angelicar11

Read the scenario shown below and discussa. What stage of g.docx
Read the scenario shown below and discussa. What stage of g.docxRead the scenario shown below and discussa. What stage of g.docx
Read the scenario shown below and discussa. What stage of g.docx
angelicar11
 
Read the scenario and answer the questions that followBobby Y.docx
Read the scenario and answer the questions that followBobby Y.docxRead the scenario and answer the questions that followBobby Y.docx
Read the scenario and answer the questions that followBobby Y.docx
angelicar11
 
Read the scenario below and complete what follows.Scenario.docx
Read the scenario below and complete what follows.Scenario.docxRead the scenario below and complete what follows.Scenario.docx
Read the scenario below and complete what follows.Scenario.docx
angelicar11
 
Read the scenario below. Then draft a 3–4 page business memorandum t.docx
Read the scenario below. Then draft a 3–4 page business memorandum t.docxRead the scenario below. Then draft a 3–4 page business memorandum t.docx
Read the scenario below. Then draft a 3–4 page business memorandum t.docx
angelicar11
 
Read the scenario below and complete the tasks that follow.S.docx
Read the scenario below and complete the tasks that follow.S.docxRead the scenario below and complete the tasks that follow.S.docx
Read the scenario below and complete the tasks that follow.S.docx
angelicar11
 
Read the patient case studies below. List 3 differential diagnos.docx
Read the patient case studies below. List 3 differential diagnos.docxRead the patient case studies below. List 3 differential diagnos.docx
Read the patient case studies below. List 3 differential diagnos.docx
angelicar11
 
Read the passages below and write an essay that addresses the follow.docx
Read the passages below and write an essay that addresses the follow.docxRead the passages below and write an essay that addresses the follow.docx
Read the passages below and write an essay that addresses the follow.docx
angelicar11
 
Read the passage below and answer the questions that follow.Co.docx
Read the passage below and answer the questions that follow.Co.docxRead the passage below and answer the questions that follow.Co.docx
Read the passage below and answer the questions that follow.Co.docx
angelicar11
 
Read the passage below and answer the 4 questions at the end. Do.docx
Read the passage below and answer the 4 questions at the end. Do.docxRead the passage below and answer the 4 questions at the end. Do.docx
Read the passage below and answer the 4 questions at the end. Do.docx
angelicar11
 
Read the paper titled Improving Patient Care and the Bottom Line .docx
Read the paper titled Improving Patient Care and the Bottom Line .docxRead the paper titled Improving Patient Care and the Bottom Line .docx
Read the paper titled Improving Patient Care and the Bottom Line .docx
angelicar11
 
Read the New Vice President case and respond to the following qu.docx
Read the New Vice President case and respond to the following qu.docxRead the New Vice President case and respond to the following qu.docx
Read the New Vice President case and respond to the following qu.docx
angelicar11
 

More from angelicar11 (20)

Read the section from pages 314 to 317.1. Create a chart like th.docx
Read the section from pages 314 to 317.1. Create a chart like th.docxRead the section from pages 314 to 317.1. Create a chart like th.docx
Read the section from pages 314 to 317.1. Create a chart like th.docx
 
Read the scenario below. Use the Internet to research the various .docx
Read the scenario below. Use the Internet to research the various .docxRead the scenario below. Use the Internet to research the various .docx
Read the scenario below. Use the Internet to research the various .docx
 
Read the scenario in Appendix E and the reading about the difference.docx
Read the scenario in Appendix E and the reading about the difference.docxRead the scenario in Appendix E and the reading about the difference.docx
Read the scenario in Appendix E and the reading about the difference.docx
 
Read the scenario shown below and discussa. What stage of g.docx
Read the scenario shown below and discussa. What stage of g.docxRead the scenario shown below and discussa. What stage of g.docx
Read the scenario shown below and discussa. What stage of g.docx
 
Read the scenario and answer the questions that followBobby Y.docx
Read the scenario and answer the questions that followBobby Y.docxRead the scenario and answer the questions that followBobby Y.docx
Read the scenario and answer the questions that followBobby Y.docx
 
Read the scenario below and complete what follows.Scenario.docx
Read the scenario below and complete what follows.Scenario.docxRead the scenario below and complete what follows.Scenario.docx
Read the scenario below and complete what follows.Scenario.docx
 
Read the scenario below. Then draft a 3–4 page business memorandum t.docx
Read the scenario below. Then draft a 3–4 page business memorandum t.docxRead the scenario below. Then draft a 3–4 page business memorandum t.docx
Read the scenario below. Then draft a 3–4 page business memorandum t.docx
 
Read the scenario below and complete the tasks that follow.S.docx
Read the scenario below and complete the tasks that follow.S.docxRead the scenario below and complete the tasks that follow.S.docx
Read the scenario below and complete the tasks that follow.S.docx
 
read The Red Convertible by Louise Erdrich (page 126) Describe w.docx
read The Red Convertible by Louise Erdrich (page 126) Describe w.docxread The Red Convertible by Louise Erdrich (page 126) Describe w.docx
read The Red Convertible by Louise Erdrich (page 126) Describe w.docx
 
read the project attached and write theFurther Reflection.docx
read the project attached and write theFurther Reflection.docxread the project attached and write theFurther Reflection.docx
read the project attached and write theFurther Reflection.docx
 
Read the ppt and answer the 3 questions below1.What was it a.docx
Read the ppt and answer the 3 questions below1.What was it a.docxRead the ppt and answer the 3 questions below1.What was it a.docx
Read the ppt and answer the 3 questions below1.What was it a.docx
 
Read the poem, Mother to Son written by Langston Hughes.Look u.docx
Read the poem, Mother to Son written by Langston Hughes.Look u.docxRead the poem, Mother to Son written by Langston Hughes.Look u.docx
Read the poem, Mother to Son written by Langston Hughes.Look u.docx
 
Read the poem The Love Song of J. Alfred Prufrock” by T.S. Eliot .docx
Read the poem The Love Song of J. Alfred Prufrock” by T.S. Eliot .docxRead the poem The Love Song of J. Alfred Prufrock” by T.S. Eliot .docx
Read the poem The Love Song of J. Alfred Prufrock” by T.S. Eliot .docx
 
Read the patient case studies below. List 3 differential diagnos.docx
Read the patient case studies below. List 3 differential diagnos.docxRead the patient case studies below. List 3 differential diagnos.docx
Read the patient case studies below. List 3 differential diagnos.docx
 
Read the passages below and write an essay that addresses the follow.docx
Read the passages below and write an essay that addresses the follow.docxRead the passages below and write an essay that addresses the follow.docx
Read the passages below and write an essay that addresses the follow.docx
 
Read the passage from Burning Bright” of Fahrenheit 451 which begin.docx
Read the passage from Burning Bright” of Fahrenheit 451 which begin.docxRead the passage from Burning Bright” of Fahrenheit 451 which begin.docx
Read the passage from Burning Bright” of Fahrenheit 451 which begin.docx
 
Read the passage below and answer the questions that follow.Co.docx
Read the passage below and answer the questions that follow.Co.docxRead the passage below and answer the questions that follow.Co.docx
Read the passage below and answer the questions that follow.Co.docx
 
Read the passage below and answer the 4 questions at the end. Do.docx
Read the passage below and answer the 4 questions at the end. Do.docxRead the passage below and answer the 4 questions at the end. Do.docx
Read the passage below and answer the 4 questions at the end. Do.docx
 
Read the paper titled Improving Patient Care and the Bottom Line .docx
Read the paper titled Improving Patient Care and the Bottom Line .docxRead the paper titled Improving Patient Care and the Bottom Line .docx
Read the paper titled Improving Patient Care and the Bottom Line .docx
 
Read the New Vice President case and respond to the following qu.docx
Read the New Vice President case and respond to the following qu.docxRead the New Vice President case and respond to the following qu.docx
Read the New Vice President case and respond to the following qu.docx
 

Recently uploaded

Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 

Recently uploaded (20)

diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Simple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdfSimple, Complex, and Compound Sentences Exercises.pdf
Simple, Complex, and Compound Sentences Exercises.pdf
 
What is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptxWhat is 3 Way Matching Process in Odoo 17.pptx
What is 3 Way Matching Process in Odoo 17.pptx
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...When Quality Assurance Meets Innovation in Higher Education - Report launch w...
When Quality Assurance Meets Innovation in Higher Education - Report launch w...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdfFICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
FICTIONAL SALESMAN/SALESMAN SNSW 2024.pdf
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
Ernest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell TollsErnest Hemingway's For Whom the Bell Tolls
Ernest Hemingway's For Whom the Bell Tolls
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
PANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptxPANDITA RAMABAI- Indian political thought GENDER.pptx
PANDITA RAMABAI- Indian political thought GENDER.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 

Read the NIST documents that I provided and Chapter 12 in your text..docx

  • 1. Read the NIST documents that I provided and Chapter 12 in your text. Select one of the following types of breaches:1. A SQL Injection was performed by a hacker, resulting in the loss of PII data. 2. You have discovered a covert leak (exfiltration) of sensitive data to China. 3. Malcious code or malware was reported on multiple users' systems. 4. Remote access for an internal user was compromised - resulting in the loss of PII data. 5. Wireless access. You discovered an "evil twin" access point that resulted in many of your users connecting to the hacker's access point while working with sensitive data. 6. Compromised passwords. You discovered that an attacker used rainbow tables to attack your domain's password file in an offline attack. Assume that all of your user's passwords are compromised. 7. A DoS or DDoS was performed against your system, resulting in the loss of 3 hours of downtime and lost revenue.Your submission should include three paragraphs and a cover page and references for the following: Paragraph 1: IRT Team . What would the IRT team look like for this incident (who would be on the team to be able to effectively handle the event)? Justify your choices. Paragraph 2: Approach. Address
  • 2. HOW you would respond. What logs or tools would you use to identify/analyze the incident? What would alert you to the incident? What tools would you use to contain/recover from the incident? Paragraph 3: Metrics. Who would you measure your team's response effectivenss? What measurements/metrics would you track?