SlideShare a Scribd company logo
Assignment 3: Incident Response (IR) Strategic Decisions
Suppose that you have been alerted of a potential incident
involving a suspected worm spreading via buffer overflow
techniques, compromising Microsoft IIS Web servers. As the IR
Team leader, it is your responsibility to determine the next
steps.
Write a two to three (2-3) page paper in which you:
Explain in detail the initial steps that would need to be made by
you and the IR team in order to respond to this potential
incident.
Construct a process-flow diagram that illustrates the process of
determining the incident containment strategy that would be
used in this scenario, and identify which containment strategy
would be appropriate in this case, through the use of graphical
tools in Visio, or an open source alternative such as Dia. Note:
The graphically depicted solution is not included in the required
page length.
Construct a process flow diagram to illustrate the process(es)
for determining if / when notification of the incident should be
relayed to upper management, and explain how those
communications should be structured and relayed through the
use of graphical tools in Visio, or an open source alternative
such as Dia. Note: The graphically depicted solution is not
included in the required page length.
Detail the incident recovery processes for the resolution of this
incident.
Use at least three (3) quality resources in this assignment. Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Summarize the various types of disasters, response and recovery
methods.
Develop techniques for different disaster scenarios.
Use technology and information resources to research issues in
disaster recovery.
Write clearly and concisely about disaster recovery topics using
proper writing mechanics and technical style conventions.
Points: 75
Assignment 3: Incident Response (IR) Strategic Decisions
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1. Explain in detail the initial steps that would need to be made
by you and the IR team in order to respond to this potential
incident.
Weight: 15%
Did not submit or incompletely explained in detail the initial
steps that would need to be made by you and the IR team in
order to respond to this potential incident.
Insufficiently explained in detail the initial steps that would
need to be made by you and the IR team in order to respond to
this potential incident.
Partially explained in detail the initial steps that would need to
be made by you and the IR team in order to respond to this
potential incident.
Satisfactorily explained in detail the initial steps that would
need to be made by you and the IR team in order to respond to
this potential incident.
Thoroughly explained in detail the initial steps that would need
to be made by you and the IR team in order to respond to this
potential incident.
2. Construct a process-flow diagram that illustrates the process
of determining the incident containment strategy that would be
used in this scenario, and identify which containment strategy
would be appropriate in this case, through the use of graphical
tools in Visio, or an open source alternative such as Dia.
Weight: 25%
Did not submit or incompletely constructed a process-flow
diagram that illustrates the process of determining the incident
containment strategy that would be used in this scenario, and
did not submit or incompletely identified which containment
strategy would be appropriate in this case, through the use of
graphical tools in Visio, or an open source alternative such as
Dia.
Insufficiently constructed a process-flow diagram that
illustrates the process of determining the incident containment
strategy that would be used in this scenario, and insufficiently
identified which containment strategy would be appropriate in
this case, through the use of graphical tools in Visio, or an open
source alternative such as Dia.
Partially constructed a process-flow diagram that illustrates the
process of determining the incident containment strategy that
would be used in this scenario, and partially identified which
containment strategy would be appropriate in this case, through
the use of graphical tools in Visio, or an open source alternative
such as Dia.
Satisfactorily constructed a process-flow diagram that
illustrates the process of determining the incident containment
strategy that would be used in this scenario, and satisfactorily
identified which containment strategy would be appropriate in
this case, through the use of graphical tools in Visio, or an open
source alternative such as Dia.
Thoroughly constructed a process-flow diagram that illustrates
the process of determining the incident containment strategy
that would be used in this scenario, and thoroughly identified
which containment strategy would be appropriate in this case,
through the use of graphical tools in Visio, or an open source
alternative such as Dia.
3. Construct a process flow diagram to illustrate the process(es)
for determining if / when notification of the incident should be
relayed to upper management, and explain how those
communications should be structured and relayed through the
use of graphical tools in Visio, or an open source alternative
such as Dia.
Weight: 25%
Did not submit or incompletely
constructed a process flow diagram to illustrate the process(es)
for determining if / when notification of the incident should be
relayed to upper management, and did not submit or
incompletely explained how those communications should be
structured and relayed through the use of graphical tools in
Visio, or an open source alternative such as Dia.
Insufficiently constructed a process flow diagram to illustrate
the process(es) for determining if / when notification of the
incident should be relayed to upper management, and
insufficiently explained how those communications should be
structured and relayed through the use of graphical tools in
Visio, or an open source alternative such as Dia.
Partially constructed a process flow diagram to illustrate the
process(es) for determining if / when notification of the incident
should be relayed to upper management, and partially explained
how those communications should be structured and relayed
through the use of graphical tools in Visio, or an open source
alternative such as Dia.
Satisfactorily constructed a process flow diagram to illustrate
the process(es) for determining if / when notification of the
incident should be relayed to upper management, and
satisfactorily explained how those communications should be
structured and relayed through the use of graphical tools in
Visio, or an open source alternative such as Dia.
Thoroughly constructed a process flow diagram to illustrate the
process(es) for determining if / when notification of the incident
should be relayed to upper management, and thoroughly
explained how those communications should be structured and
relayed through the use of graphical tools in Visio, or an open
source alternative such as Dia.
4. Detail the incident recovery processes for the resolution of
this incident.
Weight: 20%
Did not submit or incompletely detailed the incident recovery
processes for the resolution of this incident.
Insufficiently detailed the incident recovery processes for the
resolution of this incident.
Partially detailed the incident recovery processes for the
resolution of this incident.
Satisfactorily detailed the incident recovery processes for the
resolution of this incident.
Thoroughly detailed the incident recovery processes for the
resolution of this incident.
5. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
6. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present

More Related Content

Similar to Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx

JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docxJNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
donnajames55
 
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docxJNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
vrickens
 
How to Build Your Risk Management Plan – an Effective Checklist
How to Build Your Risk Management Plan – an Effective ChecklistHow to Build Your Risk Management Plan – an Effective Checklist
How to Build Your Risk Management Plan – an Effective Checklist
Tipsographic . com
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
starkeykellye
 
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docxAssignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
ssuser562afc1
 
Disaster Recovery PlanThis assignment consists of two (2) part.docx
Disaster Recovery PlanThis assignment consists of two (2) part.docxDisaster Recovery PlanThis assignment consists of two (2) part.docx
Disaster Recovery PlanThis assignment consists of two (2) part.docx
duketjoy27252
 
Project Risk Management - Week 2 Individual Assignmen
 Project Risk Management - Week 2  Individual Assignmen Project Risk Management - Week 2  Individual Assignmen
Project Risk Management - Week 2 Individual Assignmen
troutmanboris
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
astonrenna
 
Points 160Technical Paper Risk AssessmentCriteriaUna.docx
Points 160Technical Paper Risk AssessmentCriteriaUna.docxPoints 160Technical Paper Risk AssessmentCriteriaUna.docx
Points 160Technical Paper Risk AssessmentCriteriaUna.docx
LeilaniPoolsy
 
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docxRunning head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
rtodd599
 
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docxEcon 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
jack60216
 
© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx
© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx
© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx
LynellBull52
 
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week.docx
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week.docxRead Chapters 5, 6, and 7 in our textbook. After reviewing this week.docx
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week.docx
leonorepour284
 
Points 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxPoints 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docx
LeilaniPoolsy
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
carlibradley31429
 
Assignment 5Hi Prof. Dan,This assignment is just a continuat.docx
Assignment 5Hi Prof. Dan,This assignment is just a continuat.docxAssignment 5Hi Prof. Dan,This assignment is just a continuat.docx
Assignment 5Hi Prof. Dan,This assignment is just a continuat.docx
ssuser562afc1
 
Maximo Oil and Gas 7.6.1 HSE: Incident Management overview
Maximo Oil and Gas 7.6.1 HSE: Incident Management overviewMaximo Oil and Gas 7.6.1 HSE: Incident Management overview
Maximo Oil and Gas 7.6.1 HSE: Incident Management overview
Helen Fisher
 
publicsynchronizedclass RandomSeq { private String id; pri.docx
publicsynchronizedclass RandomSeq {    private String id;    pri.docxpublicsynchronizedclass RandomSeq {    private String id;    pri.docx
publicsynchronizedclass RandomSeq { private String id; pri.docx
amrit47
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
joshua2345678
 
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docxAssignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
fredharris32
 

Similar to Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx (20)

JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docxJNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
 
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docxJNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
JNR NON-PERMANENCE RISK REPORT VCS Version 3VCS JNR Non-Per.docx
 
How to Build Your Risk Management Plan – an Effective Checklist
How to Build Your Risk Management Plan – an Effective ChecklistHow to Build Your Risk Management Plan – an Effective Checklist
How to Build Your Risk Management Plan – an Effective Checklist
 
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docxGAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
GAssignment 4 Designing Compliance within the LAN-to-WAN Domain.docx
 
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docxAssignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
Assignment 4 VoIP Part 4 (Risk Register)Utilizing the Delphi .docx
 
Disaster Recovery PlanThis assignment consists of two (2) part.docx
Disaster Recovery PlanThis assignment consists of two (2) part.docxDisaster Recovery PlanThis assignment consists of two (2) part.docx
Disaster Recovery PlanThis assignment consists of two (2) part.docx
 
Project Risk Management - Week 2 Individual Assignmen
 Project Risk Management - Week 2  Individual Assignmen Project Risk Management - Week 2  Individual Assignmen
Project Risk Management - Week 2 Individual Assignmen
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainNot.docx
 
Points 160Technical Paper Risk AssessmentCriteriaUna.docx
Points 160Technical Paper Risk AssessmentCriteriaUna.docxPoints 160Technical Paper Risk AssessmentCriteriaUna.docx
Points 160Technical Paper Risk AssessmentCriteriaUna.docx
 
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docxRunning head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
Running head VOIP WORK BREAKDOWN STRUCTURE 1VOIP WORK BRE.docx
 
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docxEcon 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
Econ 421Subsidies Problem SetSpring 20151. Suppose low-in.docx
 
© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx
© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx
© 2014 Straand may notStrayer UnivCIS 502 FacTechn.docx
 
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week.docx
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week.docxRead Chapters 5, 6, and 7 in our textbook. After reviewing this week.docx
Read Chapters 5, 6, and 7 in our textbook. After reviewing this week.docx
 
Points 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docxPoints 200 Term Paper The Rookie Chief Information Security .docx
Points 200 Term Paper The Rookie Chief Information Security .docx
 
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docxAssignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
 
Assignment 5Hi Prof. Dan,This assignment is just a continuat.docx
Assignment 5Hi Prof. Dan,This assignment is just a continuat.docxAssignment 5Hi Prof. Dan,This assignment is just a continuat.docx
Assignment 5Hi Prof. Dan,This assignment is just a continuat.docx
 
Maximo Oil and Gas 7.6.1 HSE: Incident Management overview
Maximo Oil and Gas 7.6.1 HSE: Incident Management overviewMaximo Oil and Gas 7.6.1 HSE: Incident Management overview
Maximo Oil and Gas 7.6.1 HSE: Incident Management overview
 
publicsynchronizedclass RandomSeq { private String id; pri.docx
publicsynchronizedclass RandomSeq {    private String id;    pri.docxpublicsynchronizedclass RandomSeq {    private String id;    pri.docx
publicsynchronizedclass RandomSeq { private String id; pri.docx
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
 
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docxAssignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
Assignment #1VoIP Part 3 (Quality)Suppose the VoIP project spo.docx
 

More from astonrenna

Assignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docxAssignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docx
astonrenna
 
Assignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docxAssignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docx
astonrenna
 
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxAssignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
astonrenna
 
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docxAssignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
astonrenna
 
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docxAssignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
astonrenna
 
Assignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docxAssignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docx
astonrenna
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
astonrenna
 
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docxAssignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
astonrenna
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
astonrenna
 
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docxAssignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
astonrenna
 
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docxAssignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
astonrenna
 
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docxAssignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
astonrenna
 
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxAssignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
astonrenna
 
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docxAssignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
astonrenna
 
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docxAssignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
astonrenna
 
Assignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docxAssignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docx
astonrenna
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
astonrenna
 
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docxAssignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
astonrenna
 
Assignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docxAssignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docx
astonrenna
 
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docxAssignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docx
astonrenna
 

More from astonrenna (20)

Assignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docxAssignment 4 Special Problems and Challenges and the Future of Poli.docx
Assignment 4 Special Problems and Challenges and the Future of Poli.docx
 
Assignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docxAssignment 5 Integrated Business Communication1 As a future execu.docx
Assignment 5 Integrated Business Communication1 As a future execu.docx
 
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docxAssignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
Assignment 4 The Future of Digital Crimes and Digital TerrorismDu.docx
 
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docxAssignment 4 Network Design Executive PowerPoint PresentationIn t.docx
Assignment 4 Network Design Executive PowerPoint PresentationIn t.docx
 
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docxAssignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
Assignment 4 Presentation Due Week 10 and worth 280 pointsCho.docx
 
Assignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docxAssignment 4 Engaging Families and the Community in Early Childhood.docx
Assignment 4 Engaging Families and the Community in Early Childhood.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainDue.docx
 
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docxAssignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
Assignment 4 Changing Our Lives” Thesis Statement Adaliza Rodr.docx
 
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docxAssignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
Assignment 4 Designing Compliance within the LAN-to-WAN DomainD.docx
 
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docxAssignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
Assignment 3PurposeIn assignment 3, the saga of Joseph Dunn.docx
 
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docxAssignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
Assignment 3 Views on Diversity FOR SOLUTIONS PRO.Pablo.docx
 
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docxAssignment 3 Views on DiversityPablo believes that diversity is t.docx
Assignment 3 Views on DiversityPablo believes that diversity is t.docx
 
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxAssignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
 
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docxAssignment 3 Nonverbal CommunicationImagine that you are forming .docx
Assignment 3 Nonverbal CommunicationImagine that you are forming .docx
 
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docxAssignment 3 Leadership of Richard BransonWrite a paper in whic.docx
Assignment 3 Leadership of Richard BransonWrite a paper in whic.docx
 
Assignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docxAssignment 3 Gender Identity We are socialized at every stage in .docx
Assignment 3 Gender Identity We are socialized at every stage in .docx
 
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docxAssignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
Assignment 3 Fraud Techniques Due Week 7 and worth 50 points .docx
 
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docxAssignment 3 Exploring Your CulturePart of successfully exploring.docx
Assignment 3 Exploring Your CulturePart of successfully exploring.docx
 
Assignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docxAssignment 3 Exploring Your CulturePart of successfully explo.docx
Assignment 3 Exploring Your CulturePart of successfully explo.docx
 
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docxAssignment 3 Legal Ethics, Patients’ Rights, and HIV  AIDSDue We.docx
Assignment 3 Legal Ethics, Patients’ Rights, and HIV AIDSDue We.docx
 

Recently uploaded

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
rosedainty
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
Fundacja Rozwoju Społeczeństwa Przedsiębiorczego
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
Excellence Foundation for South Sudan
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
Col Mukteshwar Prasad
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 

Recently uploaded (20)

Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)Template Jadual Bertugas Kelas (Boleh Edit)
Template Jadual Bertugas Kelas (Boleh Edit)
 
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdfESC Beyond Borders _From EU to You_ InfoPack general.pdf
ESC Beyond Borders _From EU to You_ InfoPack general.pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 

Assignment 3 Incident Response (IR) Strategic DecisionsSuppose th.docx

  • 1. Assignment 3: Incident Response (IR) Strategic Decisions Suppose that you have been alerted of a potential incident involving a suspected worm spreading via buffer overflow techniques, compromising Microsoft IIS Web servers. As the IR Team leader, it is your responsibility to determine the next steps. Write a two to three (2-3) page paper in which you: Explain in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident. Construct a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and identify which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. Construct a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and explain how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length. Detail the incident recovery processes for the resolution of this incident. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the
  • 2. student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Summarize the various types of disasters, response and recovery methods. Develop techniques for different disaster scenarios. Use technology and information resources to research issues in disaster recovery. Write clearly and concisely about disaster recovery topics using proper writing mechanics and technical style conventions. Points: 75 Assignment 3: Incident Response (IR) Strategic Decisions Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair 70-79% C Proficient 80-89% B Exemplary 90-100% A 1. Explain in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident. Weight: 15% Did not submit or incompletely explained in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident.
  • 3. Insufficiently explained in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident. Partially explained in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident. Satisfactorily explained in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident. Thoroughly explained in detail the initial steps that would need to be made by you and the IR team in order to respond to this potential incident. 2. Construct a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and identify which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. Weight: 25% Did not submit or incompletely constructed a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and did not submit or incompletely identified which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. Insufficiently constructed a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and insufficiently identified which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. Partially constructed a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and partially identified which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative
  • 4. such as Dia. Satisfactorily constructed a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and satisfactorily identified which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. Thoroughly constructed a process-flow diagram that illustrates the process of determining the incident containment strategy that would be used in this scenario, and thoroughly identified which containment strategy would be appropriate in this case, through the use of graphical tools in Visio, or an open source alternative such as Dia. 3. Construct a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and explain how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Weight: 25% Did not submit or incompletely constructed a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and did not submit or incompletely explained how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Insufficiently constructed a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and insufficiently explained how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Partially constructed a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and partially explained
  • 5. how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Satisfactorily constructed a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and satisfactorily explained how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. Thoroughly constructed a process flow diagram to illustrate the process(es) for determining if / when notification of the incident should be relayed to upper management, and thoroughly explained how those communications should be structured and relayed through the use of graphical tools in Visio, or an open source alternative such as Dia. 4. Detail the incident recovery processes for the resolution of this incident. Weight: 20% Did not submit or incompletely detailed the incident recovery processes for the resolution of this incident. Insufficiently detailed the incident recovery processes for the resolution of this incident. Partially detailed the incident recovery processes for the resolution of this incident. Satisfactorily detailed the incident recovery processes for the resolution of this incident. Thoroughly detailed the incident recovery processes for the resolution of this incident. 5. 3 references Weight: 5% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality
  • 6. choices. Exceeds number of required references; all references high quality choices. 6. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 8 errors present 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present