SlideShare a Scribd company logo
1 of 1
Download to read offline
Study the following scenario and discuss and determine the answers to the incident response
questions that is listed below
Scenario 1: Worm and Distributed Denial of Service (DDoS) Agent Invasion. Consider the details
of the organization and the CSIRC when formulating your answer This scenario is about a small,
family-owned investment firm. The organization has only one location and less than 100
employees. On a Monday morning, a new worm is released; it spreads itself through removable
media, and it can copy itself to open Windows shares. When the worm infects a host, it installs a
DDoS agent. It was several hours after the worm started to spread before antivirus signatures
became available. The organization had already incurred widespread infections. The investment
firm has hired you as security expert who often use the security models of security incident
handling.
Preparation: Answers will vary especially based upon the CSIRC details. Examples:
1. Would the organization consider this activity to be an incident? If so, which of the organizations
policies does this activity violate?
2. What measures are in place to attempt to prevent this type of incident from re-occurring, or to
limit its impact?
Detection and Analysis: Answers will vary especially based upon the CSIRC details. Examples:
1. What indicators of the incident might the organization detect? Which indicators would cause
someone to think that an incident might have occurred?
2. What additional tools might be needed to detect this particular incident?
3. How would you highlight the handling of this incident?
Containment, and Recovery: Answers will vary especially based upon the CSIRC details.
Examples:
1. What strategy should the organization take to contain the incident? Why is this strategy
preferable to others?
2. What additional tools might be needed to respond to this particular incident?
3. Which personnel would be involved in the containment, and/or recovery processes?
4. What sources of evidence, if any, should the organization acquire? How would the evidence be
acquired?

More Related Content

Similar to Study the following scenario and discuss and determine the a.pdf

sophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdfsophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdfDennis Reyes
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference Rea & Associates
 
How to recover from your next data breach
How to recover from your next data breachHow to recover from your next data breach
How to recover from your next data breachSILO Compliance Systems
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentJonathan Sinclair
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...Symantec
 
Using Threat Intelligence to Improve Your Company.pdf
Using Threat Intelligence to Improve Your Company.pdfUsing Threat Intelligence to Improve Your Company.pdf
Using Threat Intelligence to Improve Your Company.pdfCyFirma1
 
Incident ResponseAs a security professional, you will.docx
 Incident ResponseAs a security professional, you will.docx Incident ResponseAs a security professional, you will.docx
Incident ResponseAs a security professional, you will.docxMARRY7
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptxlochanrajdahal
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfinfosec train
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfShivamSharma909
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourYasser Mohammed
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?nathan816428
 
Importance Of Structured Incident Response Process
Importance Of Structured Incident Response ProcessImportance Of Structured Incident Response Process
Importance Of Structured Incident Response ProcessAnton Chuvakin
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015Andreanne Clarke
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxsoulscout02
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - HackersDendreon
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 

Similar to Study the following scenario and discuss and determine the a.pdf (20)

sophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdfsophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdf
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
 
How to recover from your next data breach
How to recover from your next data breachHow to recover from your next data breach
How to recover from your next data breach
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity component
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
 
Using Threat Intelligence to Improve Your Company.pdf
Using Threat Intelligence to Improve Your Company.pdfUsing Threat Intelligence to Improve Your Company.pdf
Using Threat Intelligence to Improve Your Company.pdf
 
Incident ResponseAs a security professional, you will.docx
 Incident ResponseAs a security professional, you will.docx Incident ResponseAs a security professional, you will.docx
Incident ResponseAs a security professional, you will.docx
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?
 
Importance Of Structured Incident Response Process
Importance Of Structured Incident Response ProcessImportance Of Structured Incident Response Process
Importance Of Structured Incident Response Process
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - Hackers
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 

More from babitasingh698417

Sukis utility function is Where C1 is consumpt.pdf
Sukis utility function is     Where C1 is consumpt.pdfSukis utility function is     Where C1 is consumpt.pdf
Sukis utility function is Where C1 is consumpt.pdfbabitasingh698417
 
Subject Organizational Behaviour This is a long essay quest.pdf
Subject Organizational Behaviour This is a long essay quest.pdfSubject Organizational Behaviour This is a long essay quest.pdf
Subject Organizational Behaviour This is a long essay quest.pdfbabitasingh698417
 
successfully converting a 1point conversion is 10 The pro.pdf
successfully converting a 1point conversion is 10 The pro.pdfsuccessfully converting a 1point conversion is 10 The pro.pdf
successfully converting a 1point conversion is 10 The pro.pdfbabitasingh698417
 
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdfSubtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdfbabitasingh698417
 
Subject Marketing Management Questions 1 Explain Four st.pdf
Subject Marketing Management Questions 1 Explain Four st.pdfSubject Marketing Management Questions 1 Explain Four st.pdf
Subject Marketing Management Questions 1 Explain Four st.pdfbabitasingh698417
 
Subject Data Structures and Algorithm Analysis for Python.pdf
Subject Data Structures and Algorithm Analysis for Python.pdfSubject Data Structures and Algorithm Analysis for Python.pdf
Subject Data Structures and Algorithm Analysis for Python.pdfbabitasingh698417
 
Sub Alternative research paradigm Do not copy from chatgp.pdf
Sub Alternative research paradigm  Do not copy from chatgp.pdfSub Alternative research paradigm  Do not copy from chatgp.pdf
Sub Alternative research paradigm Do not copy from chatgp.pdfbabitasingh698417
 
Su grupo de laboratorio debe identificar la clase de un cnid.pdf
Su grupo de laboratorio debe identificar la clase de un cnid.pdfSu grupo de laboratorio debe identificar la clase de un cnid.pdf
Su grupo de laboratorio debe identificar la clase de un cnid.pdfbabitasingh698417
 
Study figure 65 after reading the accompanying text Restat.pdf
Study figure 65 after reading the accompanying text Restat.pdfStudy figure 65 after reading the accompanying text Restat.pdf
Study figure 65 after reading the accompanying text Restat.pdfbabitasingh698417
 
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdfStun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdfbabitasingh698417
 
Students from 2011 showed that about 25 of all Vancouver re.pdf
Students from 2011 showed that about 25 of all Vancouver re.pdfStudents from 2011 showed that about 25 of all Vancouver re.pdf
Students from 2011 showed that about 25 of all Vancouver re.pdfbabitasingh698417
 
Study all the materials in Chapter 2 of an introduction to p.pdf
Study all the materials in Chapter 2 of an introduction to p.pdfStudy all the materials in Chapter 2 of an introduction to p.pdf
Study all the materials in Chapter 2 of an introduction to p.pdfbabitasingh698417
 
Students at a major university in Southern California are co.pdf
Students at a major university in Southern California are co.pdfStudents at a major university in Southern California are co.pdf
Students at a major university in Southern California are co.pdfbabitasingh698417
 
Students at a local university have the option of taking fre.pdf
Students at a local university have the option of taking fre.pdfStudents at a local university have the option of taking fre.pdf
Students at a local university have the option of taking fre.pdfbabitasingh698417
 
Student Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdfStudent Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdfbabitasingh698417
 
Student debt Financial aid staff at a local university are .pdf
Student debt Financial aid staff at a local university are .pdfStudent debt Financial aid staff at a local university are .pdf
Student debt Financial aid staff at a local university are .pdfbabitasingh698417
 
struct S double x int ip int a12 Assuming.pdf
struct S    double x   int ip   int a12    Assuming.pdfstruct S    double x   int ip   int a12    Assuming.pdf
struct S double x int ip int a12 Assuming.pdfbabitasingh698417
 
Stripetastic grasshoppers are black with stripes A red stri.pdf
Stripetastic grasshoppers are black with stripes A red stri.pdfStripetastic grasshoppers are black with stripes A red stri.pdf
Stripetastic grasshoppers are black with stripes A red stri.pdfbabitasingh698417
 
Stringtown Iron Works es un pequeo astillero ficticio en la.pdf
Stringtown Iron Works es un pequeo astillero ficticio en la.pdfStringtown Iron Works es un pequeo astillero ficticio en la.pdf
Stringtown Iron Works es un pequeo astillero ficticio en la.pdfbabitasingh698417
 
STP priority 49152 STP priority 32768 In the above network c.pdf
STP priority 49152 STP priority 32768 In the above network c.pdfSTP priority 49152 STP priority 32768 In the above network c.pdf
STP priority 49152 STP priority 32768 In the above network c.pdfbabitasingh698417
 

More from babitasingh698417 (20)

Sukis utility function is Where C1 is consumpt.pdf
Sukis utility function is     Where C1 is consumpt.pdfSukis utility function is     Where C1 is consumpt.pdf
Sukis utility function is Where C1 is consumpt.pdf
 
Subject Organizational Behaviour This is a long essay quest.pdf
Subject Organizational Behaviour This is a long essay quest.pdfSubject Organizational Behaviour This is a long essay quest.pdf
Subject Organizational Behaviour This is a long essay quest.pdf
 
successfully converting a 1point conversion is 10 The pro.pdf
successfully converting a 1point conversion is 10 The pro.pdfsuccessfully converting a 1point conversion is 10 The pro.pdf
successfully converting a 1point conversion is 10 The pro.pdf
 
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdfSubtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
 
Subject Marketing Management Questions 1 Explain Four st.pdf
Subject Marketing Management Questions 1 Explain Four st.pdfSubject Marketing Management Questions 1 Explain Four st.pdf
Subject Marketing Management Questions 1 Explain Four st.pdf
 
Subject Data Structures and Algorithm Analysis for Python.pdf
Subject Data Structures and Algorithm Analysis for Python.pdfSubject Data Structures and Algorithm Analysis for Python.pdf
Subject Data Structures and Algorithm Analysis for Python.pdf
 
Sub Alternative research paradigm Do not copy from chatgp.pdf
Sub Alternative research paradigm  Do not copy from chatgp.pdfSub Alternative research paradigm  Do not copy from chatgp.pdf
Sub Alternative research paradigm Do not copy from chatgp.pdf
 
Su grupo de laboratorio debe identificar la clase de un cnid.pdf
Su grupo de laboratorio debe identificar la clase de un cnid.pdfSu grupo de laboratorio debe identificar la clase de un cnid.pdf
Su grupo de laboratorio debe identificar la clase de un cnid.pdf
 
Study figure 65 after reading the accompanying text Restat.pdf
Study figure 65 after reading the accompanying text Restat.pdfStudy figure 65 after reading the accompanying text Restat.pdf
Study figure 65 after reading the accompanying text Restat.pdf
 
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdfStun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
 
Students from 2011 showed that about 25 of all Vancouver re.pdf
Students from 2011 showed that about 25 of all Vancouver re.pdfStudents from 2011 showed that about 25 of all Vancouver re.pdf
Students from 2011 showed that about 25 of all Vancouver re.pdf
 
Study all the materials in Chapter 2 of an introduction to p.pdf
Study all the materials in Chapter 2 of an introduction to p.pdfStudy all the materials in Chapter 2 of an introduction to p.pdf
Study all the materials in Chapter 2 of an introduction to p.pdf
 
Students at a major university in Southern California are co.pdf
Students at a major university in Southern California are co.pdfStudents at a major university in Southern California are co.pdf
Students at a major university in Southern California are co.pdf
 
Students at a local university have the option of taking fre.pdf
Students at a local university have the option of taking fre.pdfStudents at a local university have the option of taking fre.pdf
Students at a local university have the option of taking fre.pdf
 
Student Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdfStudent Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdf
 
Student debt Financial aid staff at a local university are .pdf
Student debt Financial aid staff at a local university are .pdfStudent debt Financial aid staff at a local university are .pdf
Student debt Financial aid staff at a local university are .pdf
 
struct S double x int ip int a12 Assuming.pdf
struct S    double x   int ip   int a12    Assuming.pdfstruct S    double x   int ip   int a12    Assuming.pdf
struct S double x int ip int a12 Assuming.pdf
 
Stripetastic grasshoppers are black with stripes A red stri.pdf
Stripetastic grasshoppers are black with stripes A red stri.pdfStripetastic grasshoppers are black with stripes A red stri.pdf
Stripetastic grasshoppers are black with stripes A red stri.pdf
 
Stringtown Iron Works es un pequeo astillero ficticio en la.pdf
Stringtown Iron Works es un pequeo astillero ficticio en la.pdfStringtown Iron Works es un pequeo astillero ficticio en la.pdf
Stringtown Iron Works es un pequeo astillero ficticio en la.pdf
 
STP priority 49152 STP priority 32768 In the above network c.pdf
STP priority 49152 STP priority 32768 In the above network c.pdfSTP priority 49152 STP priority 32768 In the above network c.pdf
STP priority 49152 STP priority 32768 In the above network c.pdf
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonJericReyAuditor
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Science lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lessonScience lesson Moon for 4th quarter lesson
Science lesson Moon for 4th quarter lesson
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 

Study the following scenario and discuss and determine the a.pdf

  • 1. Study the following scenario and discuss and determine the answers to the incident response questions that is listed below Scenario 1: Worm and Distributed Denial of Service (DDoS) Agent Invasion. Consider the details of the organization and the CSIRC when formulating your answer This scenario is about a small, family-owned investment firm. The organization has only one location and less than 100 employees. On a Monday morning, a new worm is released; it spreads itself through removable media, and it can copy itself to open Windows shares. When the worm infects a host, it installs a DDoS agent. It was several hours after the worm started to spread before antivirus signatures became available. The organization had already incurred widespread infections. The investment firm has hired you as security expert who often use the security models of security incident handling. Preparation: Answers will vary especially based upon the CSIRC details. Examples: 1. Would the organization consider this activity to be an incident? If so, which of the organizations policies does this activity violate? 2. What measures are in place to attempt to prevent this type of incident from re-occurring, or to limit its impact? Detection and Analysis: Answers will vary especially based upon the CSIRC details. Examples: 1. What indicators of the incident might the organization detect? Which indicators would cause someone to think that an incident might have occurred? 2. What additional tools might be needed to detect this particular incident? 3. How would you highlight the handling of this incident? Containment, and Recovery: Answers will vary especially based upon the CSIRC details. Examples: 1. What strategy should the organization take to contain the incident? Why is this strategy preferable to others? 2. What additional tools might be needed to respond to this particular incident? 3. Which personnel would be involved in the containment, and/or recovery processes? 4. What sources of evidence, if any, should the organization acquire? How would the evidence be acquired?