A simulated disaster and comprehensive recovery test may involve many of an organization’s key personnel for several days: is this a reasonable burden to place on a busy, competitive company? How would you argue against the inevitable tendency to shortcut the procedure?
350 -400 words .
Chapter 19: information security response
Security plans
Physical security
Logical security
Encryption
Proper disposal of assets
Policies and training to guide employees
What to protect
Information security protects three aspects of data systems – CIA
Confidentiality – only authorized access is permitted
Integrity – protect against unauthorized alteration
Availability – data systems and data are available
Ways to improve Availability: UPS, RAID, Clustering critical servers, install failover capability
Information security risks
Threats
Vulnerabilities
controls
threats
Malicious hackers
Bored students
Unhappy employees
Helpful employees
Thieves
Lazy engineers
Hardware failure
vulnerabilities
A Threat that exploits to attach your company
Gap in protection methods
Scan regularly for vulnerabilities
controls
Preventative actions taken to stop an attack
Warning sensors
Technical solutions
Administrative actions to reduce vulnerabilities
Physical security
Fence around company’s buildings
Locked doors
Locked door on data center
Technical security
User ID and passwords
Access control list (ACL)
Controls on routers and wireless access points
Change default passwords
Lock down equipment
Data security
Types of Data:
Personally identifiable information (PII)
Student records
Medical records
Credit card or check numbers
Data security – cont’d
Protect Data:
Encrypt all portable data
Incoming and outgoing data much be encrypted using a company-approved standard
Disable USB ports
All devices mush be physically destroyed
Company documents shredded
Implement a clean desk policy
Screen saver time-out and password protected
Social engineering
Phone call from someone claiming to be Help Desk asking for ID information
Official-looking person claiming to be repairman
Hacker who search online social media looking for IT people at certain company
Person walking behind an employee towards a security door
Caller pretending to be vendor
Person quietly watching over someone’s shoulder
Dumpster diver
Incident management
Details the initial action steps necessary to:
Stop the intrusion
Contain the damage
Gather evidence as to the source
Objectives
Actual impact
Plan contents
Confirm the incident is not a false positive
Activate the response team
Open the telephone bridge
Assess the situation
Incident management team checks rest of IT systems for potential break-ins
Incident after-action review
Conduct a review within a few days of incident
Format for review questions:
What happened?
What should have happened?
What went well?
What did not go well?
What will be done differently next time?
Testing the response plan
Test the plan with the team regularly
Testing updates to the procedures
Testing for new team members
Testing may help to determine false-positives
Preserving forensic evidence
Types of evidence to collect:
Photographs
Time difference on each device
Hash of every data set
System log files
Establishing policies
Typical policies include:
Incident response
Acceptable use
Acceptable use policy should address:
Social engineering
Password management
User ID
Data policy
Patching policy
Educating employees
Employees are the number-one security threat
Essential that all employees are trained
Users should understand the importance of proper data disposal
Ongoing user awareness program
Verify training through exams
summary
Information security is an important part of the BCP
Information security requires constant vigilance to prevent criminal activity
Incident response planning must be completed before it is needed
.MsftOfcThm_Accent1_Fill {
fill:#4472C4;
}
.MsftOfcThm_Accent1_Stroke {
stroke:#4472C4;
}
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.