Preview

Week 5 Assignment

Satisfactory Essays
Open Document
Open Document
349 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 5 Assignment
Describe how a CIRT plan helps an organization mitigate risk. A CIRT plan helps an organization mitigate risk by helping the organization prepare for incidents. This allows for the company to respond to a problem quicker than they would without a plan. One of the most important benefits to the plan is the naming of a CIR team and what their responsibilities are. This allows for the organization to train the team for what skills are needed to help the company when the problem arises. Without a plan the team does not gain the benefit to analyze the response so they will not know how to correctly fix the problem.
A computer forensic investigation has three phases. List what they are and describe the activities that happen in each phase. The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.
Following a serious incident, post-mortem review meetings are conducted to review what happened. Describe how the CIRT post-mortem review helps mitigate risk. A CIRT plan identifies the tasks each individual team has, therefore during the review they may input critical information so that when a problem of the same category presents itself there could be steps in plan to help mitigate the response.
NIST SP 800-61 describes three models you can use for a CIRT. List the three models and describe how they function. Critical incident response team: May be used by organizations with one location, or have a single team that can cover multiple locations. Distributed incident response teams: If an organization has multiple locations this will be used, but the team at headquarters will have control of all the say at each location. Coordinating team: Senior

You May Also Find These Documents Helpful

  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    1. What is the purpose of a CIRT plan? Describe what this plan does and what other plan it ties into.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The purpose of the Risk Management Plan is to provide guidelines and methods to assure that the broad range of both administrative and clinical activities at the facility are monitored and coordinated in order to reduce losses associated with consumer, employee, or visitor injuries, property loss or damage and other sources of potential facility liability.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Assignment5

    • 285 Words
    • 1 Page

    The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Week 5 Quiz

    • 531 Words
    • 3 Pages

    The purpose of the CIRT plan is to help an organization prepare for computer incidents. Preparation helps the organization identify potential incidents. Security personnel can then identify the best responses to reduce the potential damage…

    • 531 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Week 3

    • 412 Words
    • 2 Pages

    2. A quality IT Risk Mitigation Plan will include details on costs, risk prioritization, and accompanying schedule. For risk prioritization, what influence would the industry your organization operates in have on prioritizing your identified risks, threats, and vulnerabilities? Different companies have different priorities, what might be important to one organization might be minimal to other organizations. For example, a medical facility would have different prioritizations than a lawyer’s office.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Graduate Student

    • 2210 Words
    • 9 Pages

    6. Should the customer be allowed to participate in or assist the contractor in developing a…

    • 2210 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 3 Assignment 3

    • 363 Words
    • 1 Page

    Our human senses are the major and needed parts to help with Thinking or any bodily activity in general. No matter if we Disagree that our senses are accurate or weak we still use and need Them on a daily basis. Our sense of sight, hearing, touch, smell And Taste helps us guide ourselves to our thought destinations. If Human beings weren’t developed with any senses at all we would Not be able to experience a lot of many wonderful aspects through…

    • 363 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    3. Identify and implement preventative controls and measures to increase availability, decrease the disruption effects, and reduce the cost of contingency.…

    • 805 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Quiz Week 5

    • 381 Words
    • 2 Pages

    The purpose of the CIRT plan is to identify which group is responsible for what. It also provides information for the DRP.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    To assess risks and vulnerabilities with the operating IT facilities we must create a mitigation plan. The mitigation plan will ensure what actions or steps to take when a risk were to occur. If the company were to experience risk such as fire, users outages, remote access, opening unknown e-mail attachment or have equipment failure, the mitigation plan will let you know…

    • 622 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    In the event of an emergency, an emergency plan establishes authority. It lays out who should be doing what and who needs to take charge of the whole situation. Everybody knows exactly what to do, where to be and there is no confusion. The plan includes emergency evacuation routes. This is crucial in health and safety as it ensures that all involved are able to find the quickest and safest way of leaving the building. This can help to reduce injury and save lives. An emergency plan enables training opportunities. It can identify who is trained, who needs training and any additional training that may be needed to handle such emergencies. An emergency plan also enables co-ordination with other agencies. It enables the company and outside agencies to work together to ensure that training is all up-to-date and should there be an unforeseen circumstance, all persons involved know what to do. It ensures that the Company…

    • 4649 Words
    • 19 Pages
    Powerful Essays
  • Satisfactory Essays

    Risk Register

    • 277 Words
    • 2 Pages

    3. Develop a response strategy for one of the negative risks and one of the positive risks. Enter the information in the risk register. Also write a separate paragraph describing what specific tasks would need to be done to implement the strategy. Include time and cost estimates for each strategy as…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Once the risks a plan have been identified and measured, a plan is designed and implemented to…

    • 1262 Words
    • 6 Pages
    Powerful Essays