SlideShare a Scribd company logo
1 of 21
COM520 Written Assignment 7
Assignment: Windows Incident Handling Tools
Assignment Requirements
Responding to incidents in an efficient and repeatable manner
depends on having the right tools in place
before incidents occur. While there are many types of tools and
utilities available for different purposes,
some tools support incident handling tasks well. As a security
administrator for Ken 7 Windows Limited,
you have been given the task of evaluating various software
tools for computer security incident response
team (CSIRT) use.
You should recommend at least one tool for each of the main
CSIRT categories of functional needs. You
can select from the list of functional needs given below. For
each software tool you should select the most
appropriate functional need(s), it best meets.
Review the text sheet titled Tool Summary (provided below).
After you identify the functional needs each
tool fulfills, describe which tool, or tools, you would
recommend for the Ken 7 Windows Limited CSIRT.
Explain the reasons for your choice.
Submission Requirements
-Space
Self-Assessment Checklist
fied the correct function to secure incidents of
Ken 7 Windows Limited.
tools.
Required Resources (provided below)
Windows Access Control and
Authentication
Case Scenario for Rationale: Importance of
Windows Access Control and Authentication
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 1
Ken 7 Windows Limited is a manufacturer of Windows for
residential and commercial builders. Ken 7
Windows Limited carries a variety of Windows and related
products. It supplies builders with all of the
tools and supplies to install finished Windows in any type of
building.
Ken 7 Windows Limited has just purchased a new enterprise
resource planning (ERP) software package
to help control costs and increase both quality and customer
responsiveness. The ERP software collects
and stores information including:
Ken 7 Windows Limited has identified six basic roles for users
in the new ERP software:
—maintain ERP data and system operation.
—run planning software and generate requirements
reports.
—enter operational data (receiving,
shipping, and product progress
during manufacturing).
—manage department personnel.
—generate purchasing documents based on
planning requirements.
—maintain cost and accounting data.
Access controls limit what users or roles can do with different
types of data. For example, consider the
following types of data:
—raw materials and labor costs, including
the cost of finished goods.
—cost, amount of labor, and time
required to produce finished
goods.
—rules for determining when raw
materials, components, or
supplies should be purchased.
Through access control:
Shop Floor
users.
users.
During the analysis phase of the ERP implementation, Ken 7
Windows Limited raised concerns about
users being able to access restricted data.
able to login to shop floor computers.
applications and data.
The ERP implementation team suggested the following access
control measures to protect restricted
data.
onal unit (OU) in Active Directory for
shop floor computers.
users to the shop floor OU.
access for all non-HR users to
restricted data.
Implementation of several access control measures helped Ken 7
Windows Limited to restrict the data
access. Hence access control and authentication is important, as
it helped Ken 7 Windows Limited in
reducing costs and increasing profits.
Tools Summary
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 1
http://www.emc.com/security/rsa-archer/rsa-archer-incident-
management.htm
“Archer Incident Management centralizes and streamlines the
complete case management
lifecycle for cyber and physical incidents and ethics violations.
Archer’s web-based solution
allows you to capture organizational events that may escalate
into incidents, evaluate incident
criticality, and assign response team members based on business
impact and regulatory
requirements. You can also consolidate response procedures,
manage investigations end-to-end,
and report on trends, losses, recovery efforts and related
incidents. Powered by the Archer
SmartSuite Framework, the Incident Management software
solution allows you to effectively
handle incidents that occur anywhere you do business from
detection through analysis and
resolution.”
g:
http://www.d3security.com/products/incident-reporting
“The Incident Reporting Software module is at the core of D3’s
end-to-end integrated security
management technology or virtual Security Operations Center
(vSOC). The incident reporting
application is easy-to-use and fully customizable. The flexible
customization options allow
incident forms, tasks and analysis reports to be designed to your
organizations unique
requirements. This greatly reduces unnecessary incident form
fields, streamlines adoption of the
system by staff and ensures the appropriate information is being
collected.”
http://airt.leune.com/
“AIRT is a web-based application that has been designed and
developed to support the day to
day operations of a computer security incident response team.
The application supports highly
automated processing of incident reports and facilitates
coordination of multiple incidents by a
security operations center.”
http://www.emc.com/security/rsa-archer/rsa-archer-incident-
management.htm
http://www.d3security.com/products/incident-reporting
http://airt.leune.com/
Tools Summary
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 2
http://www.bestpractical.com/index.html
“RT for Incident Response helps your CERT or CSIRT team to
efficiently track computer security
incidents big and small. Collaborating with staff from top
Incident Response teams, we've built a
tool designed to help you manage your entire incident handling
workflow. RTIR builds on RT to
track Incident Reports, Incidents which tie together those
reports and your Investigations into root
causes and ideal remediation’s. RTIR extends RT with custom
data extraction, reporting and
workflow tools as well as a user experience centered around the
Incident handling process. Best
Practical offers a full suite of customization, training,
deployment and support services for RTIR.
Please contact us for more information.”
http://www.bmc.com/products/product-listing/22735072-
106757-2391.html
“Build powerful business workflow applications for Web,
Windows, UNIX, and Linux environments
AR System provides a consolidated Service Process
Management platform for automating and
managing Service Management business processes.
that speeds the handling of
unique processes
-of-the-box workflow modules commonly used in
automating service processes, such as
notifications, escalations and approvals
tinually align with the
needs of the business
-time
management applications
Web References: Links to Web references in this document are
subject to change without prior notice.
These links were last verified on June 26, 2013.
http://www.bestpractical.com/index.html
http://www.bmc.com/products/product-listing/22735072-
106757-2391.html
Match Tools to CSIRT Functional Needs
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 1
Responding to incidents in an efficient and repeatable manner
depends on having the right tools in place
before incidents occur. While there are many types of tools and
utilities available for different purposes,
some tools support incident handling tasks well. As a security
administrator for Ken 7 Windows Limited,
you have been given the task of evaluating various software
tools for CSIRT use. You should recommend
at least one tool for each of the main CSIRT categories of
functional needs. You can select from the list of
functional needs given below. For each software tool you should
select the most appropriate functional
need(s), it best meets.
Review the text sheet titled Tool Summary given to you as a
handout. After you identify the functional
needs each tool fulfills, describe which tool, or tools, you
would recommend for the Ken 7 Windows
Limited CSIRT. Explain the reasons for your choice.
Select from these CSIRT functional needs:
a. Tracking incidents
b. Reporting on incidents
c. Archiving incidents
d. Communicating incident information
e. Managing an incident’s tasks and activities
Software tools (note which CSIRT functional needs each
product meets):
1. Archer Incident Management
2. D3 Incident Reporting
3. Application for Incident Response Teams (AIRT)
4. Request Tracker for Incident Response (RTIR)
5. BMC Remedy Action Request System
Which of the tools listed would you recommend for Ken 7
Windows Limited CSIRT? Why?
COM520 Written Assignment 7
Assignment: Windows Incident Handling Tools
Assignment Requirements
Responding to incidents in an efficient and repeatable manner
depends on having the right tools in place
before incidents occur. While there are many types of tools and
utilities available for different purposes,
some tools support incident handling tasks well. As a security
administrator for Ken 7 Windows Limited,
you have been given the task of evaluating various software
tools for computer security incident response
team (CSIRT) use.
You should recommend at least one tool for each of the main
CSIRT categories of functional needs. You
can select from the list of functional needs given below. For
each software tool you should select the most
appropriate functional need(s), it best meets.
Review the text sheet titled Tool Summary (provided below).
After you identify the functional needs each
tool fulfills, describe which tool, or tools, you would
recommend for the Ken 7 Windows Limited CSIRT.
Explain the reasons for your choice.
Submission Requirements
-Space
Citation Style: APA Style
Self-Assessment Checklist
Ken 7 Windows Limited.
tools.
Required Resources (provided below)
Windows Access Control and
Authentication
Case Scenario for Rationale: Importance of
Windows Access Control and Authentication
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 1
Ken 7 Windows Limited is a manufacturer of Windows for
residential and commercial builders. Ken 7
Windows Limited carries a variety of Windows and related
products. It supplies builders with all of the
tools and supplies to install finished Windows in any type of
building.
Ken 7 Windows Limited has just purchased a new enterprise
resource planning (ERP) software package
to help control costs and increase both quality and customer
responsiveness. The ERP software collects
and stores information including:
g requirements
Ken 7 Windows Limited has identified six basic roles for users
in the new ERP software:
—maintain ERP data and system operation.
—run planning software and generate requirements
reports.
—enter operational data (receiving,
shipping, and product progress
during manufacturing).
—manage department personnel.
—generate purchasing documents based on
planning requirements.
—maintain cost and accounting data.
Access controls limit what users or roles can do with different
types of data. For example, consider the
following types of data:
—raw materials and labor costs, including
the cost of finished goods.
etails—cost, amount of labor, and time
required to produce finished
goods.
—rules for determining when raw
materials, components, or
supplies should be purchased.
Through access control:
only by Accounting users.
users.
users.
During the analysis phase of the ERP implementation, Ken 7
Windows Limited raised concerns about
users being able to access restricted data.
applications and data.
The ERP implementation team suggested the following access
control measures to protect restricted
data.
shop floor computers.
users to the shop floor OU.
the ERP software to deny
access for all non-HR users to
restricted data.
Implementation of several access control measures helped Ken 7
Windows Limited to restrict the data
access. Hence access control and authentication is important, as
it helped Ken 7 Windows Limited in
reducing costs and increasing profits.
Tools Summary
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 1
http://www.emc.com/security/rsa-archer/rsa-archer-incident-
management.htm
“Archer Incident Management centralizes and streamlines the
complete case management
lifecycle for cyber and physical incidents and ethics violations.
Archer’s web-based solution
allows you to capture organizational events that may escalate
into incidents, evaluate incident
criticality, and assign response team members based on business
impact and regulatory
requirements. You can also consolidate response procedures,
manage investigations end-to-end,
and report on trends, losses, recovery efforts and related
incidents. Powered by the Archer
SmartSuite Framework, the Incident Management software
solution allows you to effectively
handle incidents that occur anywhere you do business from
detection through analysis and
resolution.”
http://www.d3security.com/products/incident-reporting
“The Incident Reporting Software module is at the core of D3’s
end-to-end integrated security
management technology or virtual Security Operations Center
(vSOC). The incident reporting
application is easy-to-use and fully customizable. The flexible
customization options allow
incident forms, tasks and analysis reports to be designed to your
organizations unique
requirements. This greatly reduces unnecessary incident form
fields, streamlines adoption of the
system by staff and ensures the appropriate information is being
collected.”
http://airt.leune.com/
“AIRT is a web-based application that has been designed and
developed to support the day to
day operations of a computer security incident response team.
The application supports highly
automated processing of incident reports and facilitates
coordination of multiple incidents by a
security operations center.”
http://www.emc.com/security/rsa-archer/rsa-archer-incident-
management.htm
http://www.d3security.com/products/incident-reporting
http://airt.leune.com/
Tools Summary
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 2
http://www.bestpractical.com/index.html
“RT for Incident Response helps your CERT or CSIRT team to
efficiently track computer security
incidents big and small. Collaborating with staff from top
Incident Response teams, we've built a
tool designed to help you manage your entire incident handling
workflow. RTIR builds on RT to
track Incident Reports, Incidents which tie together those
reports and your Investigations into root
causes and ideal remediation’s. RTIR extends RT with custom
data extraction, reporting and
workflow tools as well as a user experience centered around the
Incident handling process. Best
Practical offers a full suite of customization, training,
deployment and support services for RTIR.
Please contact us for more information.”
http://www.bmc.com/products/product-listing/22735072-
106757-2391.html
“Build powerful business workflow applications for Web,
Windows, UNIX, and Linux environments
AR System provides a consolidated Service Process
Management platform for automating and
managing Service Management business processes.
outdated manual systems with process automation
that speeds the handling of
unique processes
-of-the-box workflow modules commonly used in
automating service processes, such as
notifications, escalations and approvals
systems across the enterprise
needs of the business
-time
management applications
Capture and track critical business data”
Web References: Links to Web references in this document are
subject to change without prior notice.
These links were last verified on June 26, 2013.
http://www.bestpractical.com/index.html
http://www.bmc.com/products/product-listing/22735072-
106757-2391.html
Match Tools to CSIRT Functional Needs
© 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning
Company. All rights reserved.
www.jblearning.com Page 1
Responding to incidents in an efficient and repeatable manner
depends on having the right tools in place
before incidents occur. While there are many types of tools and
utilities available for different purposes,
some tools support incident handling tasks well. As a security
administrator for Ken 7 Windows Limited,
you have been given the task of evaluating various software
tools for CSIRT use. You should recommend
at least one tool for each of the main CSIRT categories of
functional needs. You can select from the list of
functional needs given below. For each software tool you should
select the most appropriate functional
need(s), it best meets.
Review the text sheet titled Tool Summary given to you as a
handout. After you identify the functional
needs each tool fulfills, describe which tool, or tools, you
would recommend for the Ken 7 Windows
Limited CSIRT. Explain the reasons for your choice.
Select from these CSIRT functional needs:
a. Tracking incidents
b. Reporting on incidents
c. Archiving incidents
d. Communicating incident information
e. Managing an incident’s tasks and activities
Software tools (note which CSIRT functional needs each
product meets):
1. Archer Incident Management
2. D3 Incident Reporting
3. Application for Incident Response Teams (AIRT)
4. Request Tracker for Incident Response (RTIR)
5. BMC Remedy Action Request System
Which of the tools listed would you recommend for Ken 7
Windows Limited CSIRT? Why?

More Related Content

Similar to COM520 Written Assignment 7 Assignment Windows Incident.docx

HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소GE코리아
 
Medical Store Management System Software Engineering 1
Medical Store Management System Software Engineering 1Medical Store Management System Software Engineering 1
Medical Store Management System Software Engineering 1hani2253
 
Real-Time Monitoring System For Healthcare Services - Silver touch
Real-Time Monitoring System For Healthcare Services - Silver touchReal-Time Monitoring System For Healthcare Services - Silver touch
Real-Time Monitoring System For Healthcare Services - Silver touchSAP Silver Touch
 
Healthcare software service provider - Silver Touch
Healthcare software service provider - Silver TouchHealthcare software service provider - Silver Touch
Healthcare software service provider - Silver TouchSAP Silver Touch
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management Systemvivek shah
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfsagaraccura
 
Landing Page and Case Management
Landing Page and Case ManagementLanding Page and Case Management
Landing Page and Case ManagementIRJET Journal
 
Ajith H N-Profile
Ajith H N-ProfileAjith H N-Profile
Ajith H N-ProfileAjith H N
 
looksoftware Case Study: All Out Security
looksoftware Case Study: All Out Securitylooksoftware Case Study: All Out Security
looksoftware Case Study: All Out SecurityFresche Solutions
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstractsncct
 
SE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringSE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringAmr E. Mohamed
 
SE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringSE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringAmr E. Mohamed
 
Medical Store Management System Software Engineering Project
Medical Store Management System Software Engineering ProjectMedical Store Management System Software Engineering Project
Medical Store Management System Software Engineering Projecthani2253
 
Active directory solutions brochure
Active directory solutions brochureActive directory solutions brochure
Active directory solutions brochureZoho Corporation
 
Chapter_01.ppt
Chapter_01.pptChapter_01.ppt
Chapter_01.pptMSahibKhan
 

Similar to COM520 Written Assignment 7 Assignment Windows Incident.docx (20)

HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소HMI/SCADA 리스크 감소
HMI/SCADA 리스크 감소
 
Medical Store Management System Software Engineering 1
Medical Store Management System Software Engineering 1Medical Store Management System Software Engineering 1
Medical Store Management System Software Engineering 1
 
Real-Time Monitoring System For Healthcare Services - Silver touch
Real-Time Monitoring System For Healthcare Services - Silver touchReal-Time Monitoring System For Healthcare Services - Silver touch
Real-Time Monitoring System For Healthcare Services - Silver touch
 
Healthcare software service provider - Silver Touch
Healthcare software service provider - Silver TouchHealthcare software service provider - Silver Touch
Healthcare software service provider - Silver Touch
 
Employee Management System
Employee Management SystemEmployee Management System
Employee Management System
 
Kiran_CV
Kiran_CVKiran_CV
Kiran_CV
 
Note This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdfNote This project is broken up into Windows and Mac version.pdf
Note This project is broken up into Windows and Mac version.pdf
 
Landing Page and Case Management
Landing Page and Case ManagementLanding Page and Case Management
Landing Page and Case Management
 
Resume_New
Resume_NewResume_New
Resume_New
 
Ajith H N-Profile
Ajith H N-ProfileAjith H N-Profile
Ajith H N-Profile
 
VEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEMVEHICLE MANAGEMENT SYSTEM
VEHICLE MANAGEMENT SYSTEM
 
looksoftware Case Study: All Out Security
looksoftware Case Study: All Out Securitylooksoftware Case Study: All Out Security
looksoftware Case Study: All Out Security
 
Asp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ AbstractsAsp Abstracts, Sample Copy 15+ Abstracts
Asp Abstracts, Sample Copy 15+ Abstracts
 
SE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software EngineeringSE18_Lec 01_Introduction to Software Engineering
SE18_Lec 01_Introduction to Software Engineering
 
SE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software EnginerringSE_Lec 01_ Introduction to Software Enginerring
SE_Lec 01_ Introduction to Software Enginerring
 
Medical Store Management System Software Engineering Project
Medical Store Management System Software Engineering ProjectMedical Store Management System Software Engineering Project
Medical Store Management System Software Engineering Project
 
Performance testing wreaking balls
Performance testing wreaking ballsPerformance testing wreaking balls
Performance testing wreaking balls
 
Internship
InternshipInternship
Internship
 
Active directory solutions brochure
Active directory solutions brochureActive directory solutions brochure
Active directory solutions brochure
 
Chapter_01.ppt
Chapter_01.pptChapter_01.ppt
Chapter_01.ppt
 

More from mccormicknadine86

Option #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docxOption #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docxmccormicknadine86
 
Option 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docxOption 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docxmccormicknadine86
 
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docxOption Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docxmccormicknadine86
 
Option A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docxOption A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docxmccormicknadine86
 
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docxOption 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docxmccormicknadine86
 
OPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docxOPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docxmccormicknadine86
 
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docxOption 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docxmccormicknadine86
 
Option A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docxOption A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docxmccormicknadine86
 
Option #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docxOption #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docxmccormicknadine86
 
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docxOption 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docxmccormicknadine86
 
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docxOption 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docxmccormicknadine86
 
Option #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docxOption #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docxmccormicknadine86
 
Option A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docxOption A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docxmccormicknadine86
 
opic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docxopic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docxmccormicknadine86
 
Option 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docxOption 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docxmccormicknadine86
 
Option #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docxOption #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docxmccormicknadine86
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxmccormicknadine86
 
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docxOpen the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docxmccormicknadine86
 
onsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docxonsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docxmccormicknadine86
 
Operations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docxOperations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docxmccormicknadine86
 

More from mccormicknadine86 (20)

Option #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docxOption #2Researching a Leader Complete preliminary rese.docx
Option #2Researching a Leader Complete preliminary rese.docx
 
Option 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docxOption 1 ImperialismThe exploitation of  colonial resources.docx
Option 1 ImperialismThe exploitation of  colonial resources.docx
 
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docxOption Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
Option Wireless LTD v. OpenPeak, Inc.Be sure to save an elec.docx
 
Option A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docxOption A Land SharkWhen is a shark just a shark Consider the.docx
Option A Land SharkWhen is a shark just a shark Consider the.docx
 
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docxOption 3 Discuss your thoughts on drugs and deviance. Do you think .docx
Option 3 Discuss your thoughts on drugs and deviance. Do you think .docx
 
OPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docxOPTION 2 Can we make the changes we need to make After the pandemi.docx
OPTION 2 Can we make the changes we need to make After the pandemi.docx
 
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docxOption 1 You will create a PowerPoint (or equivalent) of your p.docx
Option 1 You will create a PowerPoint (or equivalent) of your p.docx
 
Option A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docxOption A Description of Dance StylesSelect two styles of danc.docx
Option A Description of Dance StylesSelect two styles of danc.docx
 
Option #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docxOption #2Provide several slides that explain the key section.docx
Option #2Provide several slides that explain the key section.docx
 
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docxOption 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
Option 2 Slavery vs. Indentured ServitudeExplain how and wh.docx
 
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docxOption 2 ArtSelect any 2 of works of art about the Holocaus.docx
Option 2 ArtSelect any 2 of works of art about the Holocaus.docx
 
Option #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docxOption #1 Stanford University Prison Experiment Causality, C.docx
Option #1 Stanford University Prison Experiment Causality, C.docx
 
Option A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docxOption A  Gender CrimesCriminal acts occur against individu.docx
Option A  Gender CrimesCriminal acts occur against individu.docx
 
opic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docxopic 4 Discussion Question 1 May students express religious bel.docx
opic 4 Discussion Question 1 May students express religious bel.docx
 
Option 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docxOption 1Choose a philosopher who interests you. Research that p.docx
Option 1Choose a philosopher who interests you. Research that p.docx
 
Option #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docxOption #1The Stanford University Prison Experiment Structu.docx
Option #1The Stanford University Prison Experiment Structu.docx
 
Operationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docxOperationaland Organizational SecurityChapter 3Princ.docx
Operationaland Organizational SecurityChapter 3Princ.docx
 
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docxOpen the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
Open the file (Undergrad Reqt_Individual In-Depth Case Study) for in.docx
 
onsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docxonsider whether you think means-tested programs, such as the Tem.docx
onsider whether you think means-tested programs, such as the Tem.docx
 
Operations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docxOperations security - PPT should cover below questions (chapter 1 to.docx
Operations security - PPT should cover below questions (chapter 1 to.docx
 

Recently uploaded

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 

Recently uploaded (20)

Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 

COM520 Written Assignment 7 Assignment Windows Incident.docx

  • 1. COM520 Written Assignment 7 Assignment: Windows Incident Handling Tools Assignment Requirements Responding to incidents in an efficient and repeatable manner depends on having the right tools in place before incidents occur. While there are many types of tools and utilities available for different purposes, some tools support incident handling tasks well. As a security administrator for Ken 7 Windows Limited, you have been given the task of evaluating various software tools for computer security incident response team (CSIRT) use. You should recommend at least one tool for each of the main CSIRT categories of functional needs. You can select from the list of functional needs given below. For each software tool you should select the most appropriate functional need(s), it best meets. Review the text sheet titled Tool Summary (provided below). After you identify the functional needs each tool fulfills, describe which tool, or tools, you would recommend for the Ken 7 Windows Limited CSIRT. Explain the reasons for your choice. Submission Requirements
  • 2. -Space Self-Assessment Checklist fied the correct function to secure incidents of Ken 7 Windows Limited. tools. Required Resources (provided below) Windows Access Control and Authentication Case Scenario for Rationale: Importance of Windows Access Control and Authentication © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 1 Ken 7 Windows Limited is a manufacturer of Windows for
  • 3. residential and commercial builders. Ken 7 Windows Limited carries a variety of Windows and related products. It supplies builders with all of the tools and supplies to install finished Windows in any type of building. Ken 7 Windows Limited has just purchased a new enterprise resource planning (ERP) software package to help control costs and increase both quality and customer responsiveness. The ERP software collects and stores information including: Ken 7 Windows Limited has identified six basic roles for users in the new ERP software: —maintain ERP data and system operation. —run planning software and generate requirements reports. —enter operational data (receiving, shipping, and product progress during manufacturing). —manage department personnel. —generate purchasing documents based on planning requirements. —maintain cost and accounting data. Access controls limit what users or roles can do with different types of data. For example, consider the
  • 4. following types of data: —raw materials and labor costs, including the cost of finished goods. —cost, amount of labor, and time required to produce finished goods. —rules for determining when raw materials, components, or supplies should be purchased. Through access control: Shop Floor users. users. During the analysis phase of the ERP implementation, Ken 7 Windows Limited raised concerns about users being able to access restricted data. able to login to shop floor computers. applications and data. The ERP implementation team suggested the following access control measures to protect restricted data. onal unit (OU) in Active Directory for
  • 5. shop floor computers. users to the shop floor OU. access for all non-HR users to restricted data. Implementation of several access control measures helped Ken 7 Windows Limited to restrict the data access. Hence access control and authentication is important, as it helped Ken 7 Windows Limited in reducing costs and increasing profits. Tools Summary © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 1 http://www.emc.com/security/rsa-archer/rsa-archer-incident- management.htm “Archer Incident Management centralizes and streamlines the complete case management lifecycle for cyber and physical incidents and ethics violations. Archer’s web-based solution
  • 6. allows you to capture organizational events that may escalate into incidents, evaluate incident criticality, and assign response team members based on business impact and regulatory requirements. You can also consolidate response procedures, manage investigations end-to-end, and report on trends, losses, recovery efforts and related incidents. Powered by the Archer SmartSuite Framework, the Incident Management software solution allows you to effectively handle incidents that occur anywhere you do business from detection through analysis and resolution.” g: http://www.d3security.com/products/incident-reporting “The Incident Reporting Software module is at the core of D3’s end-to-end integrated security management technology or virtual Security Operations Center (vSOC). The incident reporting application is easy-to-use and fully customizable. The flexible customization options allow incident forms, tasks and analysis reports to be designed to your organizations unique requirements. This greatly reduces unnecessary incident form fields, streamlines adoption of the system by staff and ensures the appropriate information is being collected.”
  • 7. http://airt.leune.com/ “AIRT is a web-based application that has been designed and developed to support the day to day operations of a computer security incident response team. The application supports highly automated processing of incident reports and facilitates coordination of multiple incidents by a security operations center.” http://www.emc.com/security/rsa-archer/rsa-archer-incident- management.htm http://www.d3security.com/products/incident-reporting http://airt.leune.com/ Tools Summary © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 2 http://www.bestpractical.com/index.html “RT for Incident Response helps your CERT or CSIRT team to efficiently track computer security
  • 8. incidents big and small. Collaborating with staff from top Incident Response teams, we've built a tool designed to help you manage your entire incident handling workflow. RTIR builds on RT to track Incident Reports, Incidents which tie together those reports and your Investigations into root causes and ideal remediation’s. RTIR extends RT with custom data extraction, reporting and workflow tools as well as a user experience centered around the Incident handling process. Best Practical offers a full suite of customization, training, deployment and support services for RTIR. Please contact us for more information.” http://www.bmc.com/products/product-listing/22735072- 106757-2391.html “Build powerful business workflow applications for Web, Windows, UNIX, and Linux environments AR System provides a consolidated Service Process Management platform for automating and managing Service Management business processes. that speeds the handling of unique processes -of-the-box workflow modules commonly used in automating service processes, such as notifications, escalations and approvals tinually align with the
  • 9. needs of the business -time management applications Web References: Links to Web references in this document are subject to change without prior notice. These links were last verified on June 26, 2013. http://www.bestpractical.com/index.html http://www.bmc.com/products/product-listing/22735072- 106757-2391.html Match Tools to CSIRT Functional Needs © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 1 Responding to incidents in an efficient and repeatable manner depends on having the right tools in place before incidents occur. While there are many types of tools and utilities available for different purposes, some tools support incident handling tasks well. As a security administrator for Ken 7 Windows Limited, you have been given the task of evaluating various software
  • 10. tools for CSIRT use. You should recommend at least one tool for each of the main CSIRT categories of functional needs. You can select from the list of functional needs given below. For each software tool you should select the most appropriate functional need(s), it best meets. Review the text sheet titled Tool Summary given to you as a handout. After you identify the functional needs each tool fulfills, describe which tool, or tools, you would recommend for the Ken 7 Windows Limited CSIRT. Explain the reasons for your choice. Select from these CSIRT functional needs: a. Tracking incidents b. Reporting on incidents c. Archiving incidents d. Communicating incident information e. Managing an incident’s tasks and activities Software tools (note which CSIRT functional needs each product meets): 1. Archer Incident Management 2. D3 Incident Reporting 3. Application for Incident Response Teams (AIRT)
  • 11. 4. Request Tracker for Incident Response (RTIR) 5. BMC Remedy Action Request System Which of the tools listed would you recommend for Ken 7 Windows Limited CSIRT? Why? COM520 Written Assignment 7 Assignment: Windows Incident Handling Tools Assignment Requirements Responding to incidents in an efficient and repeatable manner depends on having the right tools in place before incidents occur. While there are many types of tools and utilities available for different purposes, some tools support incident handling tasks well. As a security administrator for Ken 7 Windows Limited, you have been given the task of evaluating various software tools for computer security incident response team (CSIRT) use. You should recommend at least one tool for each of the main CSIRT categories of functional needs. You can select from the list of functional needs given below. For each software tool you should select the most appropriate functional need(s), it best meets.
  • 12. Review the text sheet titled Tool Summary (provided below). After you identify the functional needs each tool fulfills, describe which tool, or tools, you would recommend for the Ken 7 Windows Limited CSIRT. Explain the reasons for your choice. Submission Requirements -Space Citation Style: APA Style Self-Assessment Checklist Ken 7 Windows Limited. tools. Required Resources (provided below) Windows Access Control and Authentication
  • 13. Case Scenario for Rationale: Importance of Windows Access Control and Authentication © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 1 Ken 7 Windows Limited is a manufacturer of Windows for residential and commercial builders. Ken 7 Windows Limited carries a variety of Windows and related products. It supplies builders with all of the tools and supplies to install finished Windows in any type of building. Ken 7 Windows Limited has just purchased a new enterprise resource planning (ERP) software package to help control costs and increase both quality and customer responsiveness. The ERP software collects and stores information including: g requirements Ken 7 Windows Limited has identified six basic roles for users in the new ERP software: —maintain ERP data and system operation. —run planning software and generate requirements reports. —enter operational data (receiving, shipping, and product progress
  • 14. during manufacturing). —manage department personnel. —generate purchasing documents based on planning requirements. —maintain cost and accounting data. Access controls limit what users or roles can do with different types of data. For example, consider the following types of data: —raw materials and labor costs, including the cost of finished goods. etails—cost, amount of labor, and time required to produce finished goods. —rules for determining when raw materials, components, or supplies should be purchased. Through access control: only by Accounting users. users. users. During the analysis phase of the ERP implementation, Ken 7 Windows Limited raised concerns about users being able to access restricted data.
  • 15. applications and data. The ERP implementation team suggested the following access control measures to protect restricted data. shop floor computers. users to the shop floor OU. the ERP software to deny access for all non-HR users to restricted data. Implementation of several access control measures helped Ken 7 Windows Limited to restrict the data access. Hence access control and authentication is important, as it helped Ken 7 Windows Limited in reducing costs and increasing profits. Tools Summary © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Page 1
  • 16. http://www.emc.com/security/rsa-archer/rsa-archer-incident- management.htm “Archer Incident Management centralizes and streamlines the complete case management lifecycle for cyber and physical incidents and ethics violations. Archer’s web-based solution allows you to capture organizational events that may escalate into incidents, evaluate incident criticality, and assign response team members based on business impact and regulatory requirements. You can also consolidate response procedures, manage investigations end-to-end, and report on trends, losses, recovery efforts and related incidents. Powered by the Archer SmartSuite Framework, the Incident Management software solution allows you to effectively handle incidents that occur anywhere you do business from detection through analysis and resolution.” http://www.d3security.com/products/incident-reporting “The Incident Reporting Software module is at the core of D3’s end-to-end integrated security management technology or virtual Security Operations Center (vSOC). The incident reporting application is easy-to-use and fully customizable. The flexible customization options allow
  • 17. incident forms, tasks and analysis reports to be designed to your organizations unique requirements. This greatly reduces unnecessary incident form fields, streamlines adoption of the system by staff and ensures the appropriate information is being collected.” http://airt.leune.com/ “AIRT is a web-based application that has been designed and developed to support the day to day operations of a computer security incident response team. The application supports highly automated processing of incident reports and facilitates coordination of multiple incidents by a security operations center.” http://www.emc.com/security/rsa-archer/rsa-archer-incident- management.htm http://www.d3security.com/products/incident-reporting http://airt.leune.com/ Tools Summary © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
  • 18. www.jblearning.com Page 2 http://www.bestpractical.com/index.html “RT for Incident Response helps your CERT or CSIRT team to efficiently track computer security incidents big and small. Collaborating with staff from top Incident Response teams, we've built a tool designed to help you manage your entire incident handling workflow. RTIR builds on RT to track Incident Reports, Incidents which tie together those reports and your Investigations into root causes and ideal remediation’s. RTIR extends RT with custom data extraction, reporting and workflow tools as well as a user experience centered around the Incident handling process. Best Practical offers a full suite of customization, training, deployment and support services for RTIR. Please contact us for more information.” http://www.bmc.com/products/product-listing/22735072- 106757-2391.html “Build powerful business workflow applications for Web, Windows, UNIX, and Linux environments AR System provides a consolidated Service Process Management platform for automating and managing Service Management business processes.
  • 19. outdated manual systems with process automation that speeds the handling of unique processes -of-the-box workflow modules commonly used in automating service processes, such as notifications, escalations and approvals systems across the enterprise needs of the business -time management applications Capture and track critical business data” Web References: Links to Web references in this document are subject to change without prior notice. These links were last verified on June 26, 2013. http://www.bestpractical.com/index.html http://www.bmc.com/products/product-listing/22735072- 106757-2391.html Match Tools to CSIRT Functional Needs © 2014 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.
  • 20. www.jblearning.com Page 1 Responding to incidents in an efficient and repeatable manner depends on having the right tools in place before incidents occur. While there are many types of tools and utilities available for different purposes, some tools support incident handling tasks well. As a security administrator for Ken 7 Windows Limited, you have been given the task of evaluating various software tools for CSIRT use. You should recommend at least one tool for each of the main CSIRT categories of functional needs. You can select from the list of functional needs given below. For each software tool you should select the most appropriate functional need(s), it best meets. Review the text sheet titled Tool Summary given to you as a handout. After you identify the functional needs each tool fulfills, describe which tool, or tools, you would recommend for the Ken 7 Windows Limited CSIRT. Explain the reasons for your choice. Select from these CSIRT functional needs: a. Tracking incidents b. Reporting on incidents c. Archiving incidents d. Communicating incident information e. Managing an incident’s tasks and activities
  • 21. Software tools (note which CSIRT functional needs each product meets): 1. Archer Incident Management 2. D3 Incident Reporting 3. Application for Incident Response Teams (AIRT) 4. Request Tracker for Incident Response (RTIR) 5. BMC Remedy Action Request System Which of the tools listed would you recommend for Ken 7 Windows Limited CSIRT? Why?