SlideShare a Scribd company logo
Study the following scenario and discuss and determine the answers to the incident response
questions that is listed below
Scenario 1: Worm and Distributed Denial of Service (DDoS) Agent Invasion. Consider the details
of the organization and the CSIRC when formulating your answer This scenario is about a small,
family-owned investment firm. The organization has only one location and less than 100
employees. On a Monday morning, a new worm is released; it spreads itself through removable
media, and it can copy itself to open Windows shares. When the worm infects a host, it installs a
DDoS agent. It was several hours after the worm started to spread before antivirus signatures
became available. The organization had already incurred widespread infections. The investment
firm has hired you as security expert who often use the security models of security incident
handling.
Preparation: Answers will vary especially based upon the CSIRC details. Examples:
1. Would the organization consider this activity to be an incident? If so, which of the organizations
policies does this activity violate?
2. What measures are in place to attempt to prevent this type of incident from re-occurring, or to
limit its impact?
Detection and Analysis: Answers will vary especially based upon the CSIRC details. Examples:
1. What indicators of the incident might the organization detect? Which indicators would cause
someone to think that an incident might have occurred?
2. What additional tools might be needed to detect this particular incident?
3. How would you highlight the handling of this incident?
Containment, and Recovery: Answers will vary especially based upon the CSIRC details.
Examples:
1. What strategy should the organization take to contain the incident? Why is this strategy
preferable to others?
2. What additional tools might be needed to respond to this particular incident?
3. Which personnel would be involved in the containment, and/or recovery processes?
4. What sources of evidence, if any, should the organization acquire? How would the evidence be
acquired?

More Related Content

Similar to Study the following scenario and discuss and determine the a.pdf

sophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdfsophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdf
Dennis Reyes
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
Rea & Associates
 
How to recover from your next data breach
How to recover from your next data breachHow to recover from your next data breach
How to recover from your next data breach
SILO Compliance Systems
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity component
Jonathan Sinclair
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
Symantec
 
Using Threat Intelligence to Improve Your Company.pdf
Using Threat Intelligence to Improve Your Company.pdfUsing Threat Intelligence to Improve Your Company.pdf
Using Threat Intelligence to Improve Your Company.pdf
CyFirma1
 
Incident ResponseAs a security professional, you will.docx
 Incident ResponseAs a security professional, you will.docx Incident ResponseAs a security professional, you will.docx
Incident ResponseAs a security professional, you will.docx
MARRY7
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
lochanrajdahal
 
Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
Strategy&, a member of the PwC network
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
infosec train
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
ShivamSharma909
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
Yasser Mohammed
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?
nathan816428
 
Importance Of Structured Incident Response Process
Importance Of Structured Incident Response ProcessImportance Of Structured Incident Response Process
Importance Of Structured Incident Response Process
Anton Chuvakin
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
Andreanne Clarke
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
soulscout02
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - Hackers
Dendreon
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
Clearnetwork
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
- Mark - Fullbright
 

Similar to Study the following scenario and discuss and determine the a.pdf (20)

sophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdfsophos-four-key-tips-from-incident-response-experts.pdf
sophos-four-key-tips-from-incident-response-experts.pdf
 
2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference 2022 Rea & Associates' Cybersecurity Conference
2022 Rea & Associates' Cybersecurity Conference
 
How to recover from your next data breach
How to recover from your next data breachHow to recover from your next data breach
How to recover from your next data breach
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity component
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
 
Using Threat Intelligence to Improve Your Company.pdf
Using Threat Intelligence to Improve Your Company.pdfUsing Threat Intelligence to Improve Your Company.pdf
Using Threat Intelligence to Improve Your Company.pdf
 
Incident ResponseAs a security professional, you will.docx
 Incident ResponseAs a security professional, you will.docx Incident ResponseAs a security professional, you will.docx
Incident ResponseAs a security professional, you will.docx
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
 
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdfTop_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
Top_20_Incident_Responder_Interview_Questions_and_Answers_1.pdf
 
Top 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdfTop 20 Incident Responder Interview Questions and Answers (1).pdf
Top 20 Incident Responder Interview Questions and Answers (1).pdf
 
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero HourEXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
EXTERNAL - Whitepaper - 5 Steps to Weather the Zero Hour
 
Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?Proactive Security - Principled Aspiration or Marketing Buzzword?
Proactive Security - Principled Aspiration or Marketing Buzzword?
 
Importance Of Structured Incident Response Process
Importance Of Structured Incident Response ProcessImportance Of Structured Incident Response Process
Importance Of Structured Incident Response Process
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 
Legal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptxLegal and Ethical Implications of Cybersecurity.pptx
Legal and Ethical Implications of Cybersecurity.pptx
 
The Black Report - Hackers
The Black Report - HackersThe Black Report - Hackers
The Black Report - Hackers
 
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by ClearnetworkCybersecurity: A Manufacturers Guide by Clearnetwork
Cybersecurity: A Manufacturers Guide by Clearnetwork
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 

More from babitasingh698417

Sukis utility function is Where C1 is consumpt.pdf
Sukis utility function is     Where C1 is consumpt.pdfSukis utility function is     Where C1 is consumpt.pdf
Sukis utility function is Where C1 is consumpt.pdf
babitasingh698417
 
Subject Organizational Behaviour This is a long essay quest.pdf
Subject Organizational Behaviour This is a long essay quest.pdfSubject Organizational Behaviour This is a long essay quest.pdf
Subject Organizational Behaviour This is a long essay quest.pdf
babitasingh698417
 
successfully converting a 1point conversion is 10 The pro.pdf
successfully converting a 1point conversion is 10 The pro.pdfsuccessfully converting a 1point conversion is 10 The pro.pdf
successfully converting a 1point conversion is 10 The pro.pdf
babitasingh698417
 
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdfSubtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
babitasingh698417
 
Subject Marketing Management Questions 1 Explain Four st.pdf
Subject Marketing Management Questions 1 Explain Four st.pdfSubject Marketing Management Questions 1 Explain Four st.pdf
Subject Marketing Management Questions 1 Explain Four st.pdf
babitasingh698417
 
Subject Data Structures and Algorithm Analysis for Python.pdf
Subject Data Structures and Algorithm Analysis for Python.pdfSubject Data Structures and Algorithm Analysis for Python.pdf
Subject Data Structures and Algorithm Analysis for Python.pdf
babitasingh698417
 
Sub Alternative research paradigm Do not copy from chatgp.pdf
Sub Alternative research paradigm  Do not copy from chatgp.pdfSub Alternative research paradigm  Do not copy from chatgp.pdf
Sub Alternative research paradigm Do not copy from chatgp.pdf
babitasingh698417
 
Su grupo de laboratorio debe identificar la clase de un cnid.pdf
Su grupo de laboratorio debe identificar la clase de un cnid.pdfSu grupo de laboratorio debe identificar la clase de un cnid.pdf
Su grupo de laboratorio debe identificar la clase de un cnid.pdf
babitasingh698417
 
Study figure 65 after reading the accompanying text Restat.pdf
Study figure 65 after reading the accompanying text Restat.pdfStudy figure 65 after reading the accompanying text Restat.pdf
Study figure 65 after reading the accompanying text Restat.pdf
babitasingh698417
 
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdfStun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
babitasingh698417
 
Students from 2011 showed that about 25 of all Vancouver re.pdf
Students from 2011 showed that about 25 of all Vancouver re.pdfStudents from 2011 showed that about 25 of all Vancouver re.pdf
Students from 2011 showed that about 25 of all Vancouver re.pdf
babitasingh698417
 
Study all the materials in Chapter 2 of an introduction to p.pdf
Study all the materials in Chapter 2 of an introduction to p.pdfStudy all the materials in Chapter 2 of an introduction to p.pdf
Study all the materials in Chapter 2 of an introduction to p.pdf
babitasingh698417
 
Students at a major university in Southern California are co.pdf
Students at a major university in Southern California are co.pdfStudents at a major university in Southern California are co.pdf
Students at a major university in Southern California are co.pdf
babitasingh698417
 
Students at a local university have the option of taking fre.pdf
Students at a local university have the option of taking fre.pdfStudents at a local university have the option of taking fre.pdf
Students at a local university have the option of taking fre.pdf
babitasingh698417
 
Student Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdfStudent Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdf
babitasingh698417
 
Student debt Financial aid staff at a local university are .pdf
Student debt Financial aid staff at a local university are .pdfStudent debt Financial aid staff at a local university are .pdf
Student debt Financial aid staff at a local university are .pdf
babitasingh698417
 
struct S double x int ip int a12 Assuming.pdf
struct S    double x   int ip   int a12    Assuming.pdfstruct S    double x   int ip   int a12    Assuming.pdf
struct S double x int ip int a12 Assuming.pdf
babitasingh698417
 
Stripetastic grasshoppers are black with stripes A red stri.pdf
Stripetastic grasshoppers are black with stripes A red stri.pdfStripetastic grasshoppers are black with stripes A red stri.pdf
Stripetastic grasshoppers are black with stripes A red stri.pdf
babitasingh698417
 
Stringtown Iron Works es un pequeo astillero ficticio en la.pdf
Stringtown Iron Works es un pequeo astillero ficticio en la.pdfStringtown Iron Works es un pequeo astillero ficticio en la.pdf
Stringtown Iron Works es un pequeo astillero ficticio en la.pdf
babitasingh698417
 
STP priority 49152 STP priority 32768 In the above network c.pdf
STP priority 49152 STP priority 32768 In the above network c.pdfSTP priority 49152 STP priority 32768 In the above network c.pdf
STP priority 49152 STP priority 32768 In the above network c.pdf
babitasingh698417
 

More from babitasingh698417 (20)

Sukis utility function is Where C1 is consumpt.pdf
Sukis utility function is     Where C1 is consumpt.pdfSukis utility function is     Where C1 is consumpt.pdf
Sukis utility function is Where C1 is consumpt.pdf
 
Subject Organizational Behaviour This is a long essay quest.pdf
Subject Organizational Behaviour This is a long essay quest.pdfSubject Organizational Behaviour This is a long essay quest.pdf
Subject Organizational Behaviour This is a long essay quest.pdf
 
successfully converting a 1point conversion is 10 The pro.pdf
successfully converting a 1point conversion is 10 The pro.pdfsuccessfully converting a 1point conversion is 10 The pro.pdf
successfully converting a 1point conversion is 10 The pro.pdf
 
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdfSubtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
Subtopic 3 Demonstrate awareness of own cultural bias Stude.pdf
 
Subject Marketing Management Questions 1 Explain Four st.pdf
Subject Marketing Management Questions 1 Explain Four st.pdfSubject Marketing Management Questions 1 Explain Four st.pdf
Subject Marketing Management Questions 1 Explain Four st.pdf
 
Subject Data Structures and Algorithm Analysis for Python.pdf
Subject Data Structures and Algorithm Analysis for Python.pdfSubject Data Structures and Algorithm Analysis for Python.pdf
Subject Data Structures and Algorithm Analysis for Python.pdf
 
Sub Alternative research paradigm Do not copy from chatgp.pdf
Sub Alternative research paradigm  Do not copy from chatgp.pdfSub Alternative research paradigm  Do not copy from chatgp.pdf
Sub Alternative research paradigm Do not copy from chatgp.pdf
 
Su grupo de laboratorio debe identificar la clase de un cnid.pdf
Su grupo de laboratorio debe identificar la clase de un cnid.pdfSu grupo de laboratorio debe identificar la clase de un cnid.pdf
Su grupo de laboratorio debe identificar la clase de un cnid.pdf
 
Study figure 65 after reading the accompanying text Restat.pdf
Study figure 65 after reading the accompanying text Restat.pdfStudy figure 65 after reading the accompanying text Restat.pdf
Study figure 65 after reading the accompanying text Restat.pdf
 
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdfStun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
Stun verilerinin satrlarda ve satr verilerinin stunlarda g.pdf
 
Students from 2011 showed that about 25 of all Vancouver re.pdf
Students from 2011 showed that about 25 of all Vancouver re.pdfStudents from 2011 showed that about 25 of all Vancouver re.pdf
Students from 2011 showed that about 25 of all Vancouver re.pdf
 
Study all the materials in Chapter 2 of an introduction to p.pdf
Study all the materials in Chapter 2 of an introduction to p.pdfStudy all the materials in Chapter 2 of an introduction to p.pdf
Study all the materials in Chapter 2 of an introduction to p.pdf
 
Students at a major university in Southern California are co.pdf
Students at a major university in Southern California are co.pdfStudents at a major university in Southern California are co.pdf
Students at a major university in Southern California are co.pdf
 
Students at a local university have the option of taking fre.pdf
Students at a local university have the option of taking fre.pdfStudents at a local university have the option of taking fre.pdf
Students at a local university have the option of taking fre.pdf
 
Student Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdfStudent Learning Objectives 1 Identify the regions of the d.pdf
Student Learning Objectives 1 Identify the regions of the d.pdf
 
Student debt Financial aid staff at a local university are .pdf
Student debt Financial aid staff at a local university are .pdfStudent debt Financial aid staff at a local university are .pdf
Student debt Financial aid staff at a local university are .pdf
 
struct S double x int ip int a12 Assuming.pdf
struct S    double x   int ip   int a12    Assuming.pdfstruct S    double x   int ip   int a12    Assuming.pdf
struct S double x int ip int a12 Assuming.pdf
 
Stripetastic grasshoppers are black with stripes A red stri.pdf
Stripetastic grasshoppers are black with stripes A red stri.pdfStripetastic grasshoppers are black with stripes A red stri.pdf
Stripetastic grasshoppers are black with stripes A red stri.pdf
 
Stringtown Iron Works es un pequeo astillero ficticio en la.pdf
Stringtown Iron Works es un pequeo astillero ficticio en la.pdfStringtown Iron Works es un pequeo astillero ficticio en la.pdf
Stringtown Iron Works es un pequeo astillero ficticio en la.pdf
 
STP priority 49152 STP priority 32768 In the above network c.pdf
STP priority 49152 STP priority 32768 In the above network c.pdfSTP priority 49152 STP priority 32768 In the above network c.pdf
STP priority 49152 STP priority 32768 In the above network c.pdf
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
GeorgeMilliken2
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
adhitya5119
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
NgcHiNguyn25
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
Priyankaranawat4
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
taiba qazi
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
What is Digital Literacy? A guest blog from Andy McLaughlin, University of Ab...
 
The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
Main Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docxMain Java[All of the Base Concepts}.docx
Main Java[All of the Base Concepts}.docx
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Life upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for studentLife upper-Intermediate B2 Workbook for student
Life upper-Intermediate B2 Workbook for student
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdfANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
ANATOMY AND BIOMECHANICS OF HIP JOINT.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
DRUGS AND ITS classification slide share
DRUGS AND ITS classification slide shareDRUGS AND ITS classification slide share
DRUGS AND ITS classification slide share
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 

Study the following scenario and discuss and determine the a.pdf

  • 1. Study the following scenario and discuss and determine the answers to the incident response questions that is listed below Scenario 1: Worm and Distributed Denial of Service (DDoS) Agent Invasion. Consider the details of the organization and the CSIRC when formulating your answer This scenario is about a small, family-owned investment firm. The organization has only one location and less than 100 employees. On a Monday morning, a new worm is released; it spreads itself through removable media, and it can copy itself to open Windows shares. When the worm infects a host, it installs a DDoS agent. It was several hours after the worm started to spread before antivirus signatures became available. The organization had already incurred widespread infections. The investment firm has hired you as security expert who often use the security models of security incident handling. Preparation: Answers will vary especially based upon the CSIRC details. Examples: 1. Would the organization consider this activity to be an incident? If so, which of the organizations policies does this activity violate? 2. What measures are in place to attempt to prevent this type of incident from re-occurring, or to limit its impact? Detection and Analysis: Answers will vary especially based upon the CSIRC details. Examples: 1. What indicators of the incident might the organization detect? Which indicators would cause someone to think that an incident might have occurred? 2. What additional tools might be needed to detect this particular incident? 3. How would you highlight the handling of this incident? Containment, and Recovery: Answers will vary especially based upon the CSIRC details. Examples: 1. What strategy should the organization take to contain the incident? Why is this strategy preferable to others? 2. What additional tools might be needed to respond to this particular incident? 3. Which personnel would be involved in the containment, and/or recovery processes? 4. What sources of evidence, if any, should the organization acquire? How would the evidence be acquired?