Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee
Human-written only.
24/7 Support
Anytime, anywhere.
Plagiarism Free
100% Original.
Expert Tutors
Masters & PhDs.
100% Confidential
Your privacy matters.
On-Time Delivery
Never miss a deadline.
Describe the key components within the incident response plan you identified
- Describe the key components within the incident response plan you identified. Be sure to cite the plan by including a link. ---Answer should be not more than 300 words
- In your browser, navigate to “A Six-Stage Methodology for Incident Response,” at http://my.safaribooksonline.com/book/networking/incident-response/1578702569/a-methodology-for-incident-response/ch03lev1sec2 and "Outline the six-step methodology for performing incident response. List each step and its purpose. How closely does the plan that you reviewed follow this methodology?"
- Navigate to “Security Policy Templates” at https://www.sans.org/information-security-policy/, then locate and review the “Security Response Plan Policy” and write briefly "Describe how this policy would be associated with an incident response plan."
- Create an incident response policy that grants team members full access and authority to perform forensics and maintain a chain of custody for physical evidence containment. Create this policy for the Bankwise Credit Union and write the below sections briefly in one paragraph
a) Policy Statement
b)Purpose/Objectives -Write policy’s purpose as well as its objectives; use a bulleted list for the policy definition. Define the incident response team members and the authorization and authority granted to them during a crisis or while securing an incident situation.
c) Scope- Define this policy’s scope and whom it covers. What elements, IT assets, or organization-owned assets are within the scope of this policy? What access and authority are granted to the incident response team members that may be outside of standard protocol?
d) Standards-Does this policy point to any hardware, software, or configuration standards? If so, list them here and explain the relationship of this policy to these standards
e) Procedures---Explain how you intend to implement this policy across the organization. Also, define and incorporate the six-step incident response approach here along with how the chain of custody must be maintained throughout any evidence collection process.
f) Guidelines ---- Explain any roadblocks or implementation issues that you must address in this section and how you will overcome them per defined policy guidelines. - Identify and define an incident scenario for Bankwise Credit Union. The incident must involve some type of cybersecurity issue.
- Create a brief abstract of the scenario to be approved by C-level executives.
Expert Solution
pfa
Archived Solution
Unlocked Solution
You have full access to this solution. To save a copy with all formatting and attachments, use the button below.
Already a member? Sign In
Important Note:
This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.
For ready-to-submit work, please order a fresh solution below.
For ready-to-submit work, please order a fresh solution below.
Or get 100% fresh solution
Get Custom Quote





