Preview

Assignment5

Satisfactory Essays
Open Document
Open Document
285 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assignment5
Assignment Week 5
Victor Sabani
ITT Technical Institute
Assignment Week 5
1. Describe how a CIRT plan helps an organization mitigate risk.
It helps mitigate risks by identifying which person is responsible for what task in case of.
2. A computer forensic investigation has three phases. List what they are and describe the activities that happen in each phase.
The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.
3. Following a serious incident, post-mortem review meetings are conducted to review what happened. Describe how the CIRT post-mortem review helps mitigate risk.
A CIRT plan identifies the tasks each individual team has, therefore during the review they may input critical information so that when a problem of the same category presents itself there could be steps in plan to help mitigate the response.
4. NIST SP 800-61 describes three models you can use for a CIRT. List the three models and describe how they function.
Critical incident response team: May be used by organizations with one location, or have a single team that can cover multiple locations.
Distributed incident response teams: If an organization has multiple locations this will be used, but the team at headquarters will have control of all the say at each location.
Coordinating team: Senior personnel, who provide advice to other teams, but don’t have any authority over the team.

References
Gibson, D. (2011). Managing Risk in Information Systems. Sudbury, MA: Jones & Bartlett Learning.



References: Gibson, D. (2011). Managing Risk in Information Systems. Sudbury, MA: Jones & Bartlett Learning.

You May Also Find These Documents Helpful

  • Powerful Essays

    Highly specific to one process. Team members that work in the same process can be used to address specific issues…

    • 1330 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    CMGT 410 week 5

    • 308 Words
    • 2 Pages

    Certain people within the company are expected to attend the post mortem review meeting either in person, or by telephone conference.…

    • 308 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. Coordinates the work of assigned team, including the provision of direction, monitoring performance, and participating in staff performance evaluations.…

    • 965 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    Enables the agent to work with partners and with the rest teammates managed to be able to return to the appointments made and how one could review the case and turn…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    3. Define three of the responsibilities that an Incident Response Team would have. List them and describe the responsibilities.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Isc363 Phase 3

    • 1899 Words
    • 8 Pages

    Gibson, D. (2010). Managing Risk in Information Systems. Sudbury, MA. Jones & Bartlett Learning. ISBN: 978-0-7637-9187-2…

    • 1899 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    The next step is for the investigator to take notes of the crime scene. The process of note taking should be extensive, containing even notes they may seem insignificant but may become valuable evidence later (Fisher & Fisher, 2012). At this point evidence should not be moved or touched. Next pictures are taken at the crime just as it happened. The pictures should include scales to show accuracy in the evidence produced. Next is sketching the areas where the evidence was found is a way to support the picture evidence at court. The sketches should be accurate and contain measurements of the scene.…

    • 673 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    The purpose of the CIRT plan is to identify which group is responsible for what. It also provides information for the DRP.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    2. Which items within WinAudit’s initial report would you consider to be of critical importance in a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The Incident Command System (ICS) was adapted in 1991 for use of hospital to respond to disaster. In ICS, one person is responsible for directing an emergency team. The ICS help assigned personnel to manage the area in which they are responsible for. The ICS is used to ensure that the hospital operate “effectively and efficiently” during a large-scale event…

    • 60 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Forensics

    • 3335 Words
    • 13 Pages

    The purpose of computer forensics techniques is to search, preserve and analyze information on computer systems to find potential evidence for a trial. Many of the techniques detectives use in crime scene investigations have digital counterparts, but there are also some unique aspects to computer investigations.…

    • 3335 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Computer Forensics

    • 322 Words
    • 2 Pages

    When a problem occurs, it is the responsibility of the computer forensics specialist to carefully take several steps to identify and retrieve possible evidence that may exist on a suspect’s computer. These steps include protecting the suspect’s computer, discovering all files, recovering deleted files, revealing hidden files, accessing protected or encrypted files, analyzing all the data, and providing expert consultation and/or testimony as required.…

    • 322 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Emergency Response Teams come in many forms. It could be a professional team, trained to respond in major crisis as ones maintained by FEMA, all the way through to your neighborhood ERT, composed of homeowners volunteering to watch for crime and respond to minor emergencies in the neighborhood. We will be concentrating on ERTs setup in corporations. Usually an ERT member will be a volunteer. Their main duties are to respond to work related injuries, and support for evacuations. ERT members usually go through multiple training processes, including CPR, first aid and Hazard management before being admitted to the team. One of the important functions in the ERT is a comprehensive understanding of the team communication process.…

    • 1119 Words
    • 5 Pages
    Better Essays
  • Better Essays

    References: Brown, C. Dehayes, D.W., Hoffer, J.A., Martin, E.W., Perkins, W.C. (2012) Managing Information Technology. Prentice Hall Upper Saddle River, NJ.…

    • 966 Words
    • 4 Pages
    Better Essays