SlideShare a Scribd company logo
1 of 6
Assignment 3: Incident Response (IR) Strategic Decisions
Suppose that you have been alerted of a potential incident
involving a suspected worm spreading via buffer overflow
techniques, compromising Microsoft IIS Web servers. As the IR
Team leader, it is your responsibility to determine the next
steps.
Write a two to three (2-3) page paper in which you:
Explain in detail the initial steps that would need to be made by
you and the IR team in order to respond to this potential
incident.
Construct a process-flow diagram that illustrates the process of
determining the incident containment strategy that would be
used in this scenario, and identify which containment strategy
would be appropriate in this case, through the use of graphical
tools in Visio, or an open source alternative such as Dia. Note:
The graphically depicted solution is not included in the required
page length.
Construct a process flow diagram to illustrate the process(es)
for determining if / when notification of the incident should be
relayed to upper management, and explain how those
communications should be structured and relayed through the
use of graphical tools in Visio, or an open source alternative
such as Dia. Note: The graphically depicted solution is not
included in the required page length.
Detail the incident recovery processes for the resolution of this
incident.
Use at least three (3) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Summarize the various types of disasters, response and recovery
methods.
Develop techniques for different disaster scenarios.
Use technology and information resources to research issues in
disaster recovery.
Write clearly and concisely about disaster recovery topics using
proper writing mechanics and technical style conventions.
Points: 75
Assignment 3: Incident Response (IR) Strategic Decisions
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Explain in detail the initial steps that would need to be made
by you and the IR team in order to respond to this potential
incident.
Weight: 15%
Did not submit or incompletely explained in detail the initial
steps that would need to be made by you and the IR team in
order to respond to this potential incident.
Insufficiently explained in detail the initial steps that would
need to be made by you and the IR team in order to respond to
this potential incident.
Partially explained in detail the initial steps that would need to
be made by you and the IR team in order to respond to this
potential incident.
Satisfactorily explained in detail the initial steps that would
need to be made by you and the IR team in order to respond to
this potential incident.
Thoroughly explained in detail the initial steps that would need
to be made by you and the IR team in order to respond to this
potential incident.
2. Construct a process-flow diagram that illustrates the process
of determining the incident containment strategy that would be
used in this scenario, and identify which containment strategy
would be appropriate in this case, through the use of graphical
tools in Visio, or an open source alternative such as Dia.
Weight: 25%
Did not submit or incompletely constructed a process-flow
diagram that illustrates the process of determining the incident
containment strategy that would be used in this scenario, and
did not submit or incompletely identified which containment
strategy would be appropriate in this case, through the use of
graphical tools in Visio, or an open source alternative such as
Dia.
Insufficiently constructed a process-flow diagram that
illustrates the process of determining the incident containment
strategy that would be used in this scenario, and insufficiently
identified which containment strategy would be appropriate in
this case, through the use of graphical tools in Visio, or an open
source alternative such as Dia.
Partially constructed a process-flow diagram that illustrates the
process of determining the incident containment strategy that
would be used in this scenario, and partially identified which
containment strategy would be appropriate in this case, through
the use of graphical tools in Visio, or an open source alternative
such as Dia.
Satisfactorily constructed a process-flow diagram that
illustrates the process of determining the incident containment
strategy that would be used in this scenario, and satisfactorily
identified which containment strategy would be appropriate in
this case, through the use of graphical tools in Visio, or an open
source alternative such as Dia.
Thoroughly constructed a process-flow diagram that illustrates
the process of determining the incident containment strategy
that would be used in this scenario, and thoroughly identified
which containment strategy would be appropriate in this case,
through the use of graphical tools in Visio, or an open source
alternative such as Dia.
3. Construct a process flow diagram to illustrate the process(es)
for determining if / when notification of the incident should be
relayed to upper management, and explain how those
communications should be structured and relayed through the
use of graphical tools in Visio, or an open source alternative
such as Dia.
Weight: 25%
Did not submit or incompletely
constructed a process flow diagram to illustrate the process(es)
for determining if / when notification of the incident should be
relayed to upper management, and did not submit or
incompletely explained how those communications should be
structured and relayed through the use of graphical tools in
Visio, or an open source alternative such as Dia.
Insufficiently constructed a process flow diagram to illustrate
the process(es) for determining if / when notification of the
incident should be relayed to upper management, and
insufficiently explained how those communications should be
structured and relayed through the use of graphical tools in
Visio, or an open source alternative such as Dia.
Partially constructed a process flow diagram to illustrate the
process(es) for determining if / when notification of the incident
should be relayed to upper management, and partially explained
how those communications should be structured and relayed
through the use of graphical tools in Visio, or an open source
alternative such as Dia.
Satisfactorily constructed a process flow diagram to illustrate
the process(es) for determining if / when notification of the
incident should be relayed to upper management, and
satisfactorily explained how those communications should be
structured and relayed through the use of graphical tools in
Visio, or an open source alternative such as Dia.
Thoroughly constructed a process flow diagram to illustrate the
process(es) for determining if / when notification of the incident
should be relayed to upper management, and thoroughly
explained how those communications should be structured and
relayed through the use of graphical tools in Visio, or an open
source alternative such as Dia.
4. Detail the incident recovery processes for the resolution of
this incident.
Weight: 20%
Did not submit or incompletely detailed the incident recovery
processes for the resolution of this incident.
Insufficiently detailed the incident recovery processes for the
resolution of this incident.
Partially detailed the incident recovery processes for the
resolution of this incident.
Satisfactorily detailed the incident recovery processes for the
resolution of this incident.
Thoroughly detailed the incident recovery processes for the
resolution of this incident.
5. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
6. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present

More Related Content

Similar to Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx

JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docxJNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docxdonnajames55
 
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docxJNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docxvrickens
 
How to Build Your Risk Management Plan – an Effective Checklist
How to Build Your Risk Management Plan – an Effective ChecklistHow to Build Your Risk Management Plan – an Effective Checklist
How to Build Your Risk Management Plan – an Effective ChecklistTipsographic . com
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxstarkeykellye
 
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docxAssignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docxssuser562afc1
 
Disaster Recovery PlanThis assignment consists of two (2) part.docx
Disaster Recovery PlanThis assignment consists of two (2) part.docxDisaster Recovery PlanThis assignment consists of two (2) part.docx
Disaster Recovery PlanThis assignment consists of two (2) part.docxduketjoy27252
 
Project Risk Management - Week 2 Individual Assignmen
 Project Risk Management - Week 2  Individual Assignmen Project Risk Management - Week 2  Individual Assignmen
Project Risk Management - Week 2 Individual Assignmentroutmanboris
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxastonrenna
 
Points 160Technical Paper Risk AssessmentCriteriaUna.docx
Points 160Technical Paper Risk AssessmentCriteriaUna.docxPoints 160Technical Paper Risk AssessmentCriteriaUna.docx
Points 160Technical Paper Risk AssessmentCriteriaUna.docxLeilaniPoolsy
 
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docxRunning head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docxrtodd599
 
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docxEcon 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docxjack60216
 
© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx
© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx
© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docxLynellBull52
 
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week.docx
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week.docxRead Chapters 5, 6, and 7 in our textbook. After reviewing this week.docx
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week.docxleonorepour284
 
Points 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxPoints 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxLeilaniPoolsy
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxcarlibradley31429
 
Assignment 5Hi Prof. Dan,This assignment is just a continuat.docx
Assignment 5Hi Prof. Dan,This assignment is just a continuat.docxAssignment 5Hi Prof. Dan,This assignment is just a continuat.docx
Assignment 5Hi Prof. Dan,This assignment is just a continuat.docxssuser562afc1
 
Maximo Oil and Gas 7.6.1 HSE: Incident Management overview
Maximo Oil and Gas 7.6.1 HSE: Incident Management overviewMaximo Oil and Gas 7.6.1 HSE: Incident Management overview
Maximo Oil and Gas 7.6.1 HSE: Incident Management overviewHelen Fisher
 
publicsynchronizedclass RandomSeq { private String id; pri.docx
publicsynchronizedclass RandomSeq {    private String id;    pri.docxpublicsynchronizedclass RandomSeq {    private String id;    pri.docx
publicsynchronizedclass RandomSeq { private String id; pri.docxamrit47
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxjoshua2345678
 
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docxAssignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docxfredharris32
 

Similar to Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx (20)

JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docxJNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
 
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docxJNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
 
How to Build Your Risk Management Plan – an Effective Checklist
How to Build Your Risk Management Plan – an Effective ChecklistHow to Build Your Risk Management Plan – an Effective Checklist
How to Build Your Risk Management Plan – an Effective Checklist
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
 
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docxAssignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
 
Disaster Recovery PlanThis assignment consists of two (2) part.docx
Disaster Recovery PlanThis assignment consists of two (2) part.docxDisaster Recovery PlanThis assignment consists of two (2) part.docx
Disaster Recovery PlanThis assignment consists of two (2) part.docx
 
Project Risk Management - Week 2 Individual Assignmen
 Project Risk Management - Week 2  Individual Assignmen Project Risk Management - Week 2  Individual Assignmen
Project Risk Management - Week 2 Individual Assignmen
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
 
Points 160Technical Paper Risk AssessmentCriteriaUna.docx
Points 160Technical Paper Risk AssessmentCriteriaUna.docxPoints 160Technical Paper Risk AssessmentCriteriaUna.docx
Points 160Technical Paper Risk AssessmentCriteriaUna.docx
 
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docxRunning head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
 
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docxEcon 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
 
© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx
© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx
© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx
 
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week.docx
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week.docxRead Chapters 5, 6, and 7 in our textbook. After reviewing this week.docx
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week.docx
 
Points 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxPoints 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docx
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
 
Assignment 5Hi Prof. Dan,This assignment is just a continuat.docx
Assignment 5Hi Prof. Dan,This assignment is just a continuat.docxAssignment 5Hi Prof. Dan,This assignment is just a continuat.docx
Assignment 5Hi Prof. Dan,This assignment is just a continuat.docx
 
Maximo Oil and Gas 7.6.1 HSE: Incident Management overview
Maximo Oil and Gas 7.6.1 HSE: Incident Management overviewMaximo Oil and Gas 7.6.1 HSE: Incident Management overview
Maximo Oil and Gas 7.6.1 HSE: Incident Management overview
 
publicsynchronizedclass RandomSeq { private String id; pri.docx
publicsynchronizedclass RandomSeq {    private String id;    pri.docxpublicsynchronizedclass RandomSeq {    private String id;    pri.docx
publicsynchronizedclass RandomSeq { private String id; pri.docx
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
 
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docxAssignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
 

More from astonrenna

Assignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docxAssignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docxastonrenna
 
Assignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docxAssignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docxastonrenna
 
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxAssignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxastonrenna
 
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docxAssignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docxastonrenna
 
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docxAssignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docxastonrenna
 
Assignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docxAssignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docxastonrenna
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxastonrenna
 
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docxAssignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docxastonrenna
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxastonrenna
 
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docxAssignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docxastonrenna
 
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docxAssignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docxastonrenna
 
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docxAssignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docxastonrenna
 
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxAssignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxastonrenna
 
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docxAssignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docxastonrenna
 
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docxAssignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docxastonrenna
 
Assignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docxAssignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docxastonrenna
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxastonrenna
 
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docxAssignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docxastonrenna
 
Assignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docxAssignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docxastonrenna
 
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docxAssignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docxastonrenna
 

More from astonrenna (20)

Assignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docxAssignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docx
 
Assignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docxAssignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docx
 
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxAssignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
 
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docxAssignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
 
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docxAssignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
 
Assignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docxAssignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
 
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docxAssignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
 
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docxAssignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
 
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docxAssignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
 
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docxAssignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
 
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxAssignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
 
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docxAssignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
 
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docxAssignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
 
Assignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docxAssignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docx
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
 
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docxAssignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
 
Assignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docxAssignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docx
 
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docxAssignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docx
 

Recently uploaded

Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...RKavithamani
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
Privatization and Disinvestment - Meaning, Objectives, Advantages and Disadva...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 

Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx

  • 1. Assignment 3: Incident Response (IR) Strategic Decisions Suppose that you have been alerted of a potential incident involving a suspected worm spreading via buffer overflow techniques, compromising Microsoft IIS Web servers. As the IR Team leader, it is your responsibility to determine the next steps. Write a two to three (2-3) page paper in which you: Explain in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident. Construct a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and identify which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. Construct a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and explain how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. Detail the incident recovery processes for the resolution of this incident. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the
  • 2. student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Summarize the various types of disasters, response and recovery methods. Develop techniques for different disaster scenarios. Use technology and information resources to research issues in disaster recovery. Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions. Points: 75 Assignment 3: Incident Response (IR) Strategic Decisions Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Explain in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident. Weight: 15% Did not submit or incompletely explained in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident.
  • 3. Insufficiently explained in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident. Partially explained in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident. Satisfactorily explained in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident. Thoroughly explained in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident. 2. Construct a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and identify which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. Weight: 25% Did not submit or incompletely constructed a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and did not submit or incompletely identified which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. Insufficiently constructed a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and insufficiently identified which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. Partially constructed a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and partially identified which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative
  • 4. such as Dia. Satisfactorily constructed a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and satisfactorily identified which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. Thoroughly constructed a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and thoroughly identified which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. 3. Construct a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and explain how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Weight: 25% Did not submit or incompletely constructed a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and did not submit or incompletely explained how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Insufficiently constructed a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and insufficiently explained how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Partially constructed a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and partially explained
  • 5. how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Satisfactorily constructed a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and satisfactorily explained how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Thoroughly constructed a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and thoroughly explained how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. 4. Detail the incident recovery processes for the resolution of this incident. Weight: 20% Did not submit or incompletely detailed the incident recovery processes for the resolution of this incident. Insufficiently detailed the incident recovery processes for the resolution of this incident. Partially detailed the incident recovery processes for the resolution of this incident. Satisfactorily detailed the incident recovery processes for the resolution of this incident. Thoroughly detailed the incident recovery processes for the resolution of this incident. 5. 3 references Weight: 5% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality
  • 6. choices. Exceeds number of required references; all references high quality choices. 6. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 8 errors present 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present