SlideShare a Scribd company logo
1 of 2
Refer:
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublicati
on800-55r1.pdf
Read the NIST documents that I provided and Chapter 12 in
your text. Select one of the following types of breaches:1. A
SQL Injection was performed by a hacker, resulting in the loss
of PII data.
2. You have discovered a covert leak (exfiltration) of sensitive
data to China.
3. Malcious code or malware was reported on multiple users'
systems.
4. Remote access for an internal user was compromised -
resulting in the loss of PII data.
5. Wireless access. You discovered an "evil twin" access point
that resulted in many of your users connecting to the hacker's
access point while working with sensitive data.
6. Compromised passwords. You discovered that an attacker
used rainbow tables to attack your domain's password file in an
offline attack. Assume that all of your user's passwords are
compromised.
7. A DoS or DDoS was performed against your system,
resulting in the loss of 3 hours of downtime and lost
revenue.Your submission should include three paragraphs and a
cover page and references for the following:
Paragraph 1: IRT Team
. What would the IRT team look like for this incident (who
would be on the team to be able to effectively handle the
event)? Justify your choices.
Paragraph 2:
Approach. Address
HOW
you would respond. What logs or tools would you use to
identify/analyze the incident? What would alert you to the
incident? What tools would you use to contain/recover from the
incident?
Paragraph 3:
Metrics. Who would you measure your team's response
effectivenss? What measurements/metrics would you track?

More Related Content

Similar to Refer  httpsnvlpubs.nist.govnistpubsLegacySPnistspecialpub.docx

30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
Kaukau9
 
2 secure systems design
2   secure systems design2   secure systems design
2 secure systems design
drewz lin
 

Similar to Refer  httpsnvlpubs.nist.govnistpubsLegacySPnistspecialpub.docx (20)

System and web security
System and web securitySystem and web security
System and web security
 
Secure coding guidelines
Secure coding guidelinesSecure coding guidelines
Secure coding guidelines
 
Cyper security & Ethical hacking
Cyper security & Ethical hackingCyper security & Ethical hacking
Cyper security & Ethical hacking
 
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
30ITSecurityThreatsVulnerabilitiesandCountermeasuresV1.ppt
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Computer Security
Computer SecurityComputer Security
Computer Security
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Security
 
Network security
Network securityNetwork security
Network security
 
OWASP Top 10 Web Attacks (2017) with Prevention Methods
OWASP Top 10 Web Attacks (2017) with Prevention MethodsOWASP Top 10 Web Attacks (2017) with Prevention Methods
OWASP Top 10 Web Attacks (2017) with Prevention Methods
 
Web Application Security 101
Web Application Security 101Web Application Security 101
Web Application Security 101
 
Web & Cloud Security in the real world
Web & Cloud Security in the real worldWeb & Cloud Security in the real world
Web & Cloud Security in the real world
 
2 secure systems design
2   secure systems design2   secure systems design
2 secure systems design
 
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security TechniquesEncryption in the Public Cloud: 16 Bits of Advice for Security Techniques
Encryption in the Public Cloud: 16 Bits of Advice for Security Techniques
 
Network Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptxNetwork Security v1.0 - Module 1.pptx
Network Security v1.0 - Module 1.pptx
 
Security and Linux Security
Security and Linux SecuritySecurity and Linux Security
Security and Linux Security
 
Web security: concepts and tools used by attackers
Web security: concepts and tools used by attackersWeb security: concepts and tools used by attackers
Web security: concepts and tools used by attackers
 
Web and Mobile Application Security
Web and Mobile Application SecurityWeb and Mobile Application Security
Web and Mobile Application Security
 
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
Avoiding Application Attacks: A Guide to Preventing the OWASP Top 10 from Hap...
 
ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10ITE v5.0 - Chapter 10
ITE v5.0 - Chapter 10
 
Application Security Vulnerabilities: OWASP Top 10 -2007
Application Security Vulnerabilities: OWASP Top 10  -2007Application Security Vulnerabilities: OWASP Top 10  -2007
Application Security Vulnerabilities: OWASP Top 10 -2007
 

More from lorent8

ReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docxReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docx
lorent8
 
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docxReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
lorent8
 
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docxReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
lorent8
 
References and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docxReferences and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docx
lorent8
 
References Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docxReferences Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docx
lorent8
 
References Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docxReferences Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docx
lorent8
 
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docxReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
lorent8
 
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docxReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
lorent8
 
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docxReference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
lorent8
 
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docxReference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
lorent8
 
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docxReference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
lorent8
 
Reference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docxReference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docx
lorent8
 

More from lorent8 (20)

ReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docxReferencesConclusionThe capacity to adapt is crucial.docx
ReferencesConclusionThe capacity to adapt is crucial.docx
 
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docxReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
ReferencesBarrenger, S., Draine, J., Angell, B., & Herman, D. (2.docx
 
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docxReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
ReferencesAlhabash, S., & Ma, M. (January 2017). A Tale of F.docx
 
References and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docxReferences and Citationshttpowl.excelsior.educitatio.docx
References and Citationshttpowl.excelsior.educitatio.docx
 
References Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docxReferences Located to Support Project Research and Writing.Origi.docx
References Located to Support Project Research and Writing.Origi.docx
 
References must be in APA citation format. Post must be a minimum of.docx
References must be in APA citation format. Post must be a minimum of.docxReferences must be in APA citation format. Post must be a minimum of.docx
References must be in APA citation format. Post must be a minimum of.docx
 
References Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docxReferences Abomhara, M. (2015). Cyber security and the internet .docx
References Abomhara, M. (2015). Cyber security and the internet .docx
 
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docxReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
ReferenceLis, G. A., Hanson, P., Burgermeister, D., & Banfiel.docx
 
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docxReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
ReferenceArticleModule 18 Correlational ResearchMagnitude,.docx
 
Reference Book Managing Criminal Justice Organizations An Intr.docx
Reference Book Managing Criminal Justice Organizations An Intr.docxReference Book Managing Criminal Justice Organizations An Intr.docx
Reference Book Managing Criminal Justice Organizations An Intr.docx
 
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docxReference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
Reference Ch. 1 of Public Finance from the Wk 1 Learning A.docx
 
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docxReference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
Reference the Harvard Business Case The Ready-to-Eat Breakfast Ce.docx
 
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docxReference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
Reference pp. 87-88 in Ch. 4 of Managing Innovation and Entr.docx
 
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docxReference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
Reference Source Book-Wiley plus - 3-1 Week 1 Case Questions E.docx
 
reference is needed APA 6TH STYLEAS simple as possible because i.docx
reference is needed APA 6TH STYLEAS simple as possible because i.docxreference is needed APA 6TH STYLEAS simple as possible because i.docx
reference is needed APA 6TH STYLEAS simple as possible because i.docx
 
Reference htt.docx
Reference htt.docxReference htt.docx
Reference htt.docx
 
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docxReference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
Reference Hitt, M. A., Miller, C. C., & Colella, A. (2015). O.docx
 
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docxreference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
reference book  Heneman, H., Judge, T. & Kammeyer-Mueller. (2018.docx
 
Reference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docxReference Article1st published in May 2015doi 10.1049etr.docx
Reference Article1st published in May 2015doi 10.1049etr.docx
 
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docx
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docxRefer to the assigned text EmergencyPlanning (Perry & Lindel.docx
Refer to the assigned text EmergencyPlanning (Perry & Lindel.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
ZurliaSoop
 

Recently uploaded (20)

Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 

Refer  httpsnvlpubs.nist.govnistpubsLegacySPnistspecialpub.docx

  • 1. Refer: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublicati on800-55r1.pdf Read the NIST documents that I provided and Chapter 12 in your text. Select one of the following types of breaches:1. A SQL Injection was performed by a hacker, resulting in the loss of PII data. 2. You have discovered a covert leak (exfiltration) of sensitive data to China. 3. Malcious code or malware was reported on multiple users' systems. 4. Remote access for an internal user was compromised - resulting in the loss of PII data. 5. Wireless access. You discovered an "evil twin" access point that resulted in many of your users connecting to the hacker's access point while working with sensitive data. 6. Compromised passwords. You discovered that an attacker used rainbow tables to attack your domain's password file in an offline attack. Assume that all of your user's passwords are compromised. 7. A DoS or DDoS was performed against your system, resulting in the loss of 3 hours of downtime and lost revenue.Your submission should include three paragraphs and a cover page and references for the following: Paragraph 1: IRT Team . What would the IRT team look like for this incident (who
  • 2. would be on the team to be able to effectively handle the event)? Justify your choices. Paragraph 2: Approach. Address HOW you would respond. What logs or tools would you use to identify/analyze the incident? What would alert you to the incident? What tools would you use to contain/recover from the incident? Paragraph 3: Metrics. Who would you measure your team's response effectivenss? What measurements/metrics would you track?