SlideShare a Scribd company logo
1 of 1
Download to read offline
Study the following scenario and discuss and determine the
incident response handling questions that should be asked at
each stage of the incident response process. Consider the details
of the organization and the CSIRC when formulating your
questions.
This scenario is about a small, family-owned investment firm. The
organization has only one location and less than 100 employees.
On a Monday morning, a new worm is released; it spreads itself
through removable media, and it can copy itself to open Windows
shares. When the worm infects a host, it installs a DDoS agent.
It was several hours after the worm started to spread before
antivirus signatures became available. The organization had
already incurred widespread infections.
The investment firm has hired you as security expert who often
use the security models of security incident handling.
Preparation:
Answers will vary especially based upon the CSIRC details.
Examples:
Detection and Analysis:
Answers will vary especially based upon the CSIRC details.
Examples:
Containment, and Recovery:
Answers will vary especially based upon the CSIRC details.
Examples:

More Related Content

Similar to Study the following scenario and discuss and determine the i.pdf

Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerGFI Software
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdSusan Darby
 
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUAnatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUUniversity of Essex
 
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016TierPoint
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkClearnetwork
 
Real-time fallacy: how real-time your security really is?
Real-time fallacy: how real-time your security really is?Real-time fallacy: how real-time your security really is?
Real-time fallacy: how real-time your security really is?Anton Chuvakin
 
Sec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.comSec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.comBartholomew99
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeMelbourne IT
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksdinCloud Inc.
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptxlochanrajdahal
 
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...Lviv Startup Club
 
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKDATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKRobert Anderson
 
Data breach represents potential existential risk to any organization
Data breach represents potential existential risk to any organizationData breach represents potential existential risk to any organization
Data breach represents potential existential risk to any organizationRobert Anderson
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?SOCVault
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksMighty Guides, Inc.
 
SEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.comSEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.comBromleyz38
 
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptxCompanySeceon
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfinfosec train
 

Similar to Study the following scenario and discuss and determine the i.pdf (20)

Prevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability ScannerPrevent Getting Hacked by Using a Network Vulnerability Scanner
Prevent Getting Hacked by Using a Network Vulnerability Scanner
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUAnatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
 
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
Tierpoint webinar: Multi-vector DDoS attacks: detection and mitigation_Jan2016
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
Real-time fallacy: how real-time your security really is?
Real-time fallacy: how real-time your security really is?Real-time fallacy: how real-time your security really is?
Real-time fallacy: how real-time your security really is?
 
Sec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.comSec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.com
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Ransomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacksRansomware and tips to prevent ransomware attacks
Ransomware and tips to prevent ransomware attacks
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
Michael Hordych: Cybersecurity, Software Engineering & Supply Chain в Україні...
 
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISKDATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
 
Data breach represents potential existential risk to any organization
Data breach represents potential existential risk to any organizationData breach represents potential existential risk to any organization
Data breach represents potential existential risk to any organization
 
Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?Malware Attacks | How To Defend Organizations From It?
Malware Attacks | How To Defend Organizations From It?
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down Attacks
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
SEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.comSEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.com
 
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
[Infographic] The MSP Journey to AI_ML-Powered Detection and Response.pptx
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
 

More from babitasingh698417

Sukis utility function is Where C1 is consumpt.pdf
Sukis utility function is     Where C1 is consumpt.pdfSukis utility function is     Where C1 is consumpt.pdf
Sukis utility function is Where C1 is consumpt.pdfbabitasingh698417
 
Subject Organizational Behaviour This is a long essay quest.pdf
Subject Organizational Behaviour This is a long essay quest.pdfSubject Organizational Behaviour This is a long essay quest.pdf
Subject Organizational Behaviour This is a long essay quest.pdfbabitasingh698417
 
successfully converting a 1point conversion is 10 The pro.pdf
successfully converting a 1point conversion is 10 The pro.pdfsuccessfully converting a 1point conversion is 10 The pro.pdf
successfully converting a 1point conversion is 10 The pro.pdfbabitasingh698417
 
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdfSubtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdfbabitasingh698417
 
Subject Marketing Management Questions 1 Explain Four st.pdf
Subject Marketing Management Questions 1 Explain Four st.pdfSubject Marketing Management Questions 1 Explain Four st.pdf
Subject Marketing Management Questions 1 Explain Four st.pdfbabitasingh698417
 
Subject Data Structures and Algorithm Analysis for Python.pdf
Subject Data Structures and Algorithm Analysis for Python.pdfSubject Data Structures and Algorithm Analysis for Python.pdf
Subject Data Structures and Algorithm Analysis for Python.pdfbabitasingh698417
 
Sub Alternative research paradigm Do not copy from chatgp.pdf
Sub Alternative research paradigm  Do not copy from chatgp.pdfSub Alternative research paradigm  Do not copy from chatgp.pdf
Sub Alternative research paradigm Do not copy from chatgp.pdfbabitasingh698417
 
Su grupo de laboratorio debe identificar la clase de un cnid.pdf
Su grupo de laboratorio debe identificar la clase de un cnid.pdfSu grupo de laboratorio debe identificar la clase de un cnid.pdf
Su grupo de laboratorio debe identificar la clase de un cnid.pdfbabitasingh698417
 
Study figure 65 after reading the accompanying text Restat.pdf
Study figure 65 after reading the accompanying text Restat.pdfStudy figure 65 after reading the accompanying text Restat.pdf
Study figure 65 after reading the accompanying text Restat.pdfbabitasingh698417
 
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdfStun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdfbabitasingh698417
 
Students from 2011 showed that about 25 of all Vancouver re.pdf
Students from 2011 showed that about 25 of all Vancouver re.pdfStudents from 2011 showed that about 25 of all Vancouver re.pdf
Students from 2011 showed that about 25 of all Vancouver re.pdfbabitasingh698417
 
Study all the materials in Chapter 2 of an introduction to p.pdf
Study all the materials in Chapter 2 of an introduction to p.pdfStudy all the materials in Chapter 2 of an introduction to p.pdf
Study all the materials in Chapter 2 of an introduction to p.pdfbabitasingh698417
 
Students at a major university in Southern California are co.pdf
Students at a major university in Southern California are co.pdfStudents at a major university in Southern California are co.pdf
Students at a major university in Southern California are co.pdfbabitasingh698417
 
Students at a local university have the option of taking fre.pdf
Students at a local university have the option of taking fre.pdfStudents at a local university have the option of taking fre.pdf
Students at a local university have the option of taking fre.pdfbabitasingh698417
 
Student Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdfStudent Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdfbabitasingh698417
 
Student debt Financial aid staff at a local university are .pdf
Student debt Financial aid staff at a local university are .pdfStudent debt Financial aid staff at a local university are .pdf
Student debt Financial aid staff at a local university are .pdfbabitasingh698417
 
struct S double x int ip int a12 Assuming.pdf
struct S    double x   int ip   int a12    Assuming.pdfstruct S    double x   int ip   int a12    Assuming.pdf
struct S double x int ip int a12 Assuming.pdfbabitasingh698417
 
Stripetastic grasshoppers are black with stripes A red stri.pdf
Stripetastic grasshoppers are black with stripes A red stri.pdfStripetastic grasshoppers are black with stripes A red stri.pdf
Stripetastic grasshoppers are black with stripes A red stri.pdfbabitasingh698417
 
Stringtown Iron Works es un pequeo astillero ficticio en la.pdf
Stringtown Iron Works es un pequeo astillero ficticio en la.pdfStringtown Iron Works es un pequeo astillero ficticio en la.pdf
Stringtown Iron Works es un pequeo astillero ficticio en la.pdfbabitasingh698417
 
STP priority 49152 STP priority 32768 In the above network c.pdf
STP priority 49152 STP priority 32768 In the above network c.pdfSTP priority 49152 STP priority 32768 In the above network c.pdf
STP priority 49152 STP priority 32768 In the above network c.pdfbabitasingh698417
 

More from babitasingh698417 (20)

Sukis utility function is Where C1 is consumpt.pdf
Sukis utility function is     Where C1 is consumpt.pdfSukis utility function is     Where C1 is consumpt.pdf
Sukis utility function is Where C1 is consumpt.pdf
 
Subject Organizational Behaviour This is a long essay quest.pdf
Subject Organizational Behaviour This is a long essay quest.pdfSubject Organizational Behaviour This is a long essay quest.pdf
Subject Organizational Behaviour This is a long essay quest.pdf
 
successfully converting a 1point conversion is 10 The pro.pdf
successfully converting a 1point conversion is 10 The pro.pdfsuccessfully converting a 1point conversion is 10 The pro.pdf
successfully converting a 1point conversion is 10 The pro.pdf
 
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdfSubtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
 
Subject Marketing Management Questions 1 Explain Four st.pdf
Subject Marketing Management Questions 1 Explain Four st.pdfSubject Marketing Management Questions 1 Explain Four st.pdf
Subject Marketing Management Questions 1 Explain Four st.pdf
 
Subject Data Structures and Algorithm Analysis for Python.pdf
Subject Data Structures and Algorithm Analysis for Python.pdfSubject Data Structures and Algorithm Analysis for Python.pdf
Subject Data Structures and Algorithm Analysis for Python.pdf
 
Sub Alternative research paradigm Do not copy from chatgp.pdf
Sub Alternative research paradigm  Do not copy from chatgp.pdfSub Alternative research paradigm  Do not copy from chatgp.pdf
Sub Alternative research paradigm Do not copy from chatgp.pdf
 
Su grupo de laboratorio debe identificar la clase de un cnid.pdf
Su grupo de laboratorio debe identificar la clase de un cnid.pdfSu grupo de laboratorio debe identificar la clase de un cnid.pdf
Su grupo de laboratorio debe identificar la clase de un cnid.pdf
 
Study figure 65 after reading the accompanying text Restat.pdf
Study figure 65 after reading the accompanying text Restat.pdfStudy figure 65 after reading the accompanying text Restat.pdf
Study figure 65 after reading the accompanying text Restat.pdf
 
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdfStun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
 
Students from 2011 showed that about 25 of all Vancouver re.pdf
Students from 2011 showed that about 25 of all Vancouver re.pdfStudents from 2011 showed that about 25 of all Vancouver re.pdf
Students from 2011 showed that about 25 of all Vancouver re.pdf
 
Study all the materials in Chapter 2 of an introduction to p.pdf
Study all the materials in Chapter 2 of an introduction to p.pdfStudy all the materials in Chapter 2 of an introduction to p.pdf
Study all the materials in Chapter 2 of an introduction to p.pdf
 
Students at a major university in Southern California are co.pdf
Students at a major university in Southern California are co.pdfStudents at a major university in Southern California are co.pdf
Students at a major university in Southern California are co.pdf
 
Students at a local university have the option of taking fre.pdf
Students at a local university have the option of taking fre.pdfStudents at a local university have the option of taking fre.pdf
Students at a local university have the option of taking fre.pdf
 
Student Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdfStudent Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdf
 
Student debt Financial aid staff at a local university are .pdf
Student debt Financial aid staff at a local university are .pdfStudent debt Financial aid staff at a local university are .pdf
Student debt Financial aid staff at a local university are .pdf
 
struct S double x int ip int a12 Assuming.pdf
struct S    double x   int ip   int a12    Assuming.pdfstruct S    double x   int ip   int a12    Assuming.pdf
struct S double x int ip int a12 Assuming.pdf
 
Stripetastic grasshoppers are black with stripes A red stri.pdf
Stripetastic grasshoppers are black with stripes A red stri.pdfStripetastic grasshoppers are black with stripes A red stri.pdf
Stripetastic grasshoppers are black with stripes A red stri.pdf
 
Stringtown Iron Works es un pequeo astillero ficticio en la.pdf
Stringtown Iron Works es un pequeo astillero ficticio en la.pdfStringtown Iron Works es un pequeo astillero ficticio en la.pdf
Stringtown Iron Works es un pequeo astillero ficticio en la.pdf
 
STP priority 49152 STP priority 32768 In the above network c.pdf
STP priority 49152 STP priority 32768 In the above network c.pdfSTP priority 49152 STP priority 32768 In the above network c.pdf
STP priority 49152 STP priority 32768 In the above network c.pdf
 

Recently uploaded

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 

Recently uploaded (20)

call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

Study the following scenario and discuss and determine the i.pdf

  • 1. Study the following scenario and discuss and determine the incident response handling questions that should be asked at each stage of the incident response process. Consider the details of the organization and the CSIRC when formulating your questions. This scenario is about a small, family-owned investment firm. The organization has only one location and less than 100 employees. On a Monday morning, a new worm is released; it spreads itself through removable media, and it can copy itself to open Windows shares. When the worm infects a host, it installs a DDoS agent. It was several hours after the worm started to spread before antivirus signatures became available. The organization had already incurred widespread infections. The investment firm has hired you as security expert who often use the security models of security incident handling. Preparation: Answers will vary especially based upon the CSIRC details. Examples: Detection and Analysis: Answers will vary especially based upon the CSIRC details. Examples: Containment, and Recovery: Answers will vary especially based upon the CSIRC details. Examples: