SlideShare a Scribd company logo
Task 4: Computer Incident Response Team Plan –
· Loss of company information on a lost company-owned tablet
that was left at a security checkpoint in an airport.
· Due to the swipe pattern being easily followed, the person was
able to log in quickly to the device. All of the usernames and
passwords had been saved on the deviceComplete all
HIGHLIGHTED areas below. >
Appendix A – Incident Response Worksheet
Preparation:
What tools, applications, laptops, and communication devices
were needed to address the Computer Incident Response for this
specific breach?
Identification: When an incident is reported, it must be
identified, classified, and documented. During this step, the
following information is needed:
· Identify the nature of the incident
· What Business Process was impacted
· What threat was identified
· What weakness was identified
· What risk was identified
· What was the Risk Factor/Impact of the incident
· What was the RTO, MTD and RPO assigned to the business
process
· What hardware, software, database and other resource were
impacted
Containment: The immediate objective is to limit the scope and
magnitude of the computer/security-related incident as quickly
as possible, rather than allow the incident to continue to gain
evidence for identifying and/or prosecuting the perpetrator.
· What needs to be done to limit the scope of the incident
Eradication: The next priority is to remove the
computer/security-related incident or breach’s effects.
· What needs to be done to mitigate the risk of the incident
Recovery: Recovery is specific to bringing back into production
those IT systems, applications, and assets that were affected by
the security-related incident.
· What needs to be done to recover the IT systems
· What procedures need to be used and are they covered in the
Disaster Recovery Plan
· Would the Business Continuity Plan be executed in response
to this incident
· Would any issues be identified that would lead to updates to
the BIA, BCP or DR plans.

More Related Content

Similar to Task 4 Computer Incident Response Team Plan – · Loss of company.docx

INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
Soetam Rizky
 
Risk Management
Risk ManagementRisk Management
Risk Management
ijtsrd
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
StevenTharp2
 
Sensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident ChecklistSensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident Checklist
- Mark - Fullbright
 
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docxThreat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
herthalearmont
 
You have been hired as a consultant to design BCP for SanGrafix, a v.docx
You have been hired as a consultant to design BCP for SanGrafix, a v.docxYou have been hired as a consultant to design BCP for SanGrafix, a v.docx
You have been hired as a consultant to design BCP for SanGrafix, a v.docx
shantayjewison
 
Business Process Identification WorksheetForm # BPID01Page.docx
Business Process Identification WorksheetForm # BPID01Page.docxBusiness Process Identification WorksheetForm # BPID01Page.docx
Business Process Identification WorksheetForm # BPID01Page.docx
RAHUL126667
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
Accellis Technology Group
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
Piyush Jain
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
Veronica Pereira
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
Atef Yassin
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
keturahhazelhurst
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
walterl4
 
Cybersecurity Crisis Management Introduction
Cybersecurity Crisis Management IntroductionCybersecurity Crisis Management Introduction
Cybersecurity Crisis Management Introduction
Naor Penso
 
Contingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery PlanningContingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery Planningmmohamme1124
 
MIS 22 Disaster Management
MIS 22 Disaster ManagementMIS 22 Disaster Management
MIS 22 Disaster Management
Tushar B Kute
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
Adv Prashant Mali
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
muhammad awais
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
penetration Tester
 

Similar to Task 4 Computer Incident Response Team Plan – · Loss of company.docx (20)

INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Disaster Recovery Planning
Disaster Recovery PlanningDisaster Recovery Planning
Disaster Recovery Planning
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
L11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptxL11 Transition And Key Roles and SAT ROB IRP.pptx
L11 Transition And Key Roles and SAT ROB IRP.pptx
 
Sensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident ChecklistSensitive Data Exposure Incident Checklist
Sensitive Data Exposure Incident Checklist
 
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docxThreat Mitigation WorksheetForm # TM01Page ____ of _____.docx
Threat Mitigation WorksheetForm # TM01Page ____ of _____.docx
 
You have been hired as a consultant to design BCP for SanGrafix, a v.docx
You have been hired as a consultant to design BCP for SanGrafix, a v.docxYou have been hired as a consultant to design BCP for SanGrafix, a v.docx
You have been hired as a consultant to design BCP for SanGrafix, a v.docx
 
Business Process Identification WorksheetForm # BPID01Page.docx
Business Process Identification WorksheetForm # BPID01Page.docxBusiness Process Identification WorksheetForm # BPID01Page.docx
Business Process Identification WorksheetForm # BPID01Page.docx
 
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
What to Do After a Cyberattack: A Cybersecurity Incident Response Plan presen...
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Powerpoint v7
Powerpoint v7Powerpoint v7
Powerpoint v7
 
What is dr and bc 12-2017
What is dr and bc 12-2017What is dr and bc 12-2017
What is dr and bc 12-2017
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
 
Chapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docxChapter 3 Evaluating RiskTermsRiskHow l.docx
Chapter 3 Evaluating RiskTermsRiskHow l.docx
 
Cybersecurity Crisis Management Introduction
Cybersecurity Crisis Management IntroductionCybersecurity Crisis Management Introduction
Cybersecurity Crisis Management Introduction
 
Contingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery PlanningContingency Planning And Disaster Recovery Planning
Contingency Planning And Disaster Recovery Planning
 
MIS 22 Disaster Management
MIS 22 Disaster ManagementMIS 22 Disaster Management
MIS 22 Disaster Management
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
chapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crimechapter 3 ethics: computer and internet crime
chapter 3 ethics: computer and internet crime
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 

More from deanmtaylor1545

Assignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docxAssignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docx
deanmtaylor1545
 
Assignment 1 Why are the originalraw data not readily us.docx
Assignment 1 Why are the originalraw data not readily us.docxAssignment 1 Why are the originalraw data not readily us.docx
Assignment 1 Why are the originalraw data not readily us.docx
deanmtaylor1545
 
Assignment 1 Refer to the attached document and complete the .docx
Assignment 1 Refer to the attached document and complete the .docxAssignment 1 Refer to the attached document and complete the .docx
Assignment 1 Refer to the attached document and complete the .docx
deanmtaylor1545
 
Assignment 1 Remote Access Method EvaluationLearning Ob.docx
Assignment 1 Remote Access Method EvaluationLearning Ob.docxAssignment 1 Remote Access Method EvaluationLearning Ob.docx
Assignment 1 Remote Access Method EvaluationLearning Ob.docx
deanmtaylor1545
 
Assignment 1 Please read ALL directions below before startin.docx
Assignment 1 Please read ALL directions below before startin.docxAssignment 1 Please read ALL directions below before startin.docx
Assignment 1 Please read ALL directions below before startin.docx
deanmtaylor1545
 
Assignment 1 Inmates Rights and Special CircumstancesCriteria.docx
Assignment 1 Inmates Rights and Special CircumstancesCriteria.docxAssignment 1 Inmates Rights and Special CircumstancesCriteria.docx
Assignment 1 Inmates Rights and Special CircumstancesCriteria.docx
deanmtaylor1545
 
Assignment 1 Go back through the business press (Fortune, The Ec.docx
Assignment 1 Go back through the business press (Fortune, The Ec.docxAssignment 1 Go back through the business press (Fortune, The Ec.docx
Assignment 1 Go back through the business press (Fortune, The Ec.docx
deanmtaylor1545
 
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docxAssignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
deanmtaylor1545
 
Assignment 1 1. Using a Microsoft Word document, please post one.docx
Assignment 1 1. Using a Microsoft Word document, please post one.docxAssignment 1 1. Using a Microsoft Word document, please post one.docx
Assignment 1 1. Using a Microsoft Word document, please post one.docx
deanmtaylor1545
 
Assignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docxAssignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docx
deanmtaylor1545
 
Assignment 1  Due Monday 92319 By using linear and nonlinear .docx
Assignment 1  Due Monday 92319 By using linear and nonlinear .docxAssignment 1  Due Monday 92319 By using linear and nonlinear .docx
Assignment 1  Due Monday 92319 By using linear and nonlinear .docx
deanmtaylor1545
 
Assignment 1This assignment is due in Module 8. There are many v.docx
Assignment 1This assignment is due in Module 8. There are many v.docxAssignment 1This assignment is due in Module 8. There are many v.docx
Assignment 1This assignment is due in Module 8. There are many v.docx
deanmtaylor1545
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
deanmtaylor1545
 
ASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docx
ASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docxASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docx
ASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docx
deanmtaylor1545
 
Assignment 1Select one of these three philosophers (Rousseau, Lo.docx
Assignment 1Select one of these three philosophers (Rousseau, Lo.docxAssignment 1Select one of these three philosophers (Rousseau, Lo.docx
Assignment 1Select one of these three philosophers (Rousseau, Lo.docx
deanmtaylor1545
 
Assignment 1Scenario 1You are developing a Windows auditing pl.docx
Assignment 1Scenario 1You are developing a Windows auditing pl.docxAssignment 1Scenario 1You are developing a Windows auditing pl.docx
Assignment 1Scenario 1You are developing a Windows auditing pl.docx
deanmtaylor1545
 
Assignment 1Research by finding an article or case study discus.docx
Assignment 1Research by finding an article or case study discus.docxAssignment 1Research by finding an article or case study discus.docx
Assignment 1Research by finding an article or case study discus.docx
deanmtaylor1545
 
Assignment 1Positioning Statement and MottoUse the pro.docx
Assignment 1Positioning Statement and MottoUse the pro.docxAssignment 1Positioning Statement and MottoUse the pro.docx
Assignment 1Positioning Statement and MottoUse the pro.docx
deanmtaylor1545
 
ASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docx
ASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docxASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docx
ASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docx
deanmtaylor1545
 
assignment 1Essay Nuclear ProliferationThe proliferation of.docx
assignment 1Essay Nuclear ProliferationThe proliferation of.docxassignment 1Essay Nuclear ProliferationThe proliferation of.docx
assignment 1Essay Nuclear ProliferationThe proliferation of.docx
deanmtaylor1545
 

More from deanmtaylor1545 (20)

Assignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docxAssignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docx
 
Assignment 1 Why are the originalraw data not readily us.docx
Assignment 1 Why are the originalraw data not readily us.docxAssignment 1 Why are the originalraw data not readily us.docx
Assignment 1 Why are the originalraw data not readily us.docx
 
Assignment 1 Refer to the attached document and complete the .docx
Assignment 1 Refer to the attached document and complete the .docxAssignment 1 Refer to the attached document and complete the .docx
Assignment 1 Refer to the attached document and complete the .docx
 
Assignment 1 Remote Access Method EvaluationLearning Ob.docx
Assignment 1 Remote Access Method EvaluationLearning Ob.docxAssignment 1 Remote Access Method EvaluationLearning Ob.docx
Assignment 1 Remote Access Method EvaluationLearning Ob.docx
 
Assignment 1 Please read ALL directions below before startin.docx
Assignment 1 Please read ALL directions below before startin.docxAssignment 1 Please read ALL directions below before startin.docx
Assignment 1 Please read ALL directions below before startin.docx
 
Assignment 1 Inmates Rights and Special CircumstancesCriteria.docx
Assignment 1 Inmates Rights and Special CircumstancesCriteria.docxAssignment 1 Inmates Rights and Special CircumstancesCriteria.docx
Assignment 1 Inmates Rights and Special CircumstancesCriteria.docx
 
Assignment 1 Go back through the business press (Fortune, The Ec.docx
Assignment 1 Go back through the business press (Fortune, The Ec.docxAssignment 1 Go back through the business press (Fortune, The Ec.docx
Assignment 1 Go back through the business press (Fortune, The Ec.docx
 
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docxAssignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
 
Assignment 1 1. Using a Microsoft Word document, please post one.docx
Assignment 1 1. Using a Microsoft Word document, please post one.docxAssignment 1 1. Using a Microsoft Word document, please post one.docx
Assignment 1 1. Using a Microsoft Word document, please post one.docx
 
Assignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docxAssignment 1  Dealing with Diversity in America from Reconstructi.docx
Assignment 1  Dealing with Diversity in America from Reconstructi.docx
 
Assignment 1  Due Monday 92319 By using linear and nonlinear .docx
Assignment 1  Due Monday 92319 By using linear and nonlinear .docxAssignment 1  Due Monday 92319 By using linear and nonlinear .docx
Assignment 1  Due Monday 92319 By using linear and nonlinear .docx
 
Assignment 1This assignment is due in Module 8. There are many v.docx
Assignment 1This assignment is due in Module 8. There are many v.docxAssignment 1This assignment is due in Module 8. There are many v.docx
Assignment 1This assignment is due in Module 8. There are many v.docx
 
Assignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docxAssignment 1TextbookInformation Systems for Business and Beyond.docx
Assignment 1TextbookInformation Systems for Business and Beyond.docx
 
ASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docx
ASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docxASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docx
ASSIGNMENT 1TASK FORCE COMMITTEE REPORTISSUE AND SOLUTI.docx
 
Assignment 1Select one of these three philosophers (Rousseau, Lo.docx
Assignment 1Select one of these three philosophers (Rousseau, Lo.docxAssignment 1Select one of these three philosophers (Rousseau, Lo.docx
Assignment 1Select one of these three philosophers (Rousseau, Lo.docx
 
Assignment 1Scenario 1You are developing a Windows auditing pl.docx
Assignment 1Scenario 1You are developing a Windows auditing pl.docxAssignment 1Scenario 1You are developing a Windows auditing pl.docx
Assignment 1Scenario 1You are developing a Windows auditing pl.docx
 
Assignment 1Research by finding an article or case study discus.docx
Assignment 1Research by finding an article or case study discus.docxAssignment 1Research by finding an article or case study discus.docx
Assignment 1Research by finding an article or case study discus.docx
 
Assignment 1Positioning Statement and MottoUse the pro.docx
Assignment 1Positioning Statement and MottoUse the pro.docxAssignment 1Positioning Statement and MottoUse the pro.docx
Assignment 1Positioning Statement and MottoUse the pro.docx
 
ASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docx
ASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docxASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docx
ASSIGNMENT 1Hearing Versus ListeningDescribe how you le.docx
 
assignment 1Essay Nuclear ProliferationThe proliferation of.docx
assignment 1Essay Nuclear ProliferationThe proliferation of.docxassignment 1Essay Nuclear ProliferationThe proliferation of.docx
assignment 1Essay Nuclear ProliferationThe proliferation of.docx
 

Recently uploaded

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 

Task 4 Computer Incident Response Team Plan – · Loss of company.docx

  • 1. Task 4: Computer Incident Response Team Plan – · Loss of company information on a lost company-owned tablet that was left at a security checkpoint in an airport. · Due to the swipe pattern being easily followed, the person was able to log in quickly to the device. All of the usernames and passwords had been saved on the deviceComplete all HIGHLIGHTED areas below. > Appendix A – Incident Response Worksheet Preparation: What tools, applications, laptops, and communication devices were needed to address the Computer Incident Response for this specific breach? Identification: When an incident is reported, it must be identified, classified, and documented. During this step, the following information is needed: · Identify the nature of the incident · What Business Process was impacted · What threat was identified · What weakness was identified · What risk was identified · What was the Risk Factor/Impact of the incident · What was the RTO, MTD and RPO assigned to the business process · What hardware, software, database and other resource were impacted Containment: The immediate objective is to limit the scope and magnitude of the computer/security-related incident as quickly as possible, rather than allow the incident to continue to gain evidence for identifying and/or prosecuting the perpetrator. · What needs to be done to limit the scope of the incident Eradication: The next priority is to remove the computer/security-related incident or breach’s effects. · What needs to be done to mitigate the risk of the incident
  • 2. Recovery: Recovery is specific to bringing back into production those IT systems, applications, and assets that were affected by the security-related incident. · What needs to be done to recover the IT systems · What procedures need to be used and are they covered in the Disaster Recovery Plan · Would the Business Continuity Plan be executed in response to this incident · Would any issues be identified that would lead to updates to the BIA, BCP or DR plans.