Discussions Assignments | Online Homework Help
Please follow the specified instructions in the document for report and powerpoint presentation.
Using a Web browser, visit the site www.honeynet.org. What is this Web site, and what does it offer the information security professional? Visit the “Know your Enemy” white- paper series and select a paper based on the recommendation of your professor. Read it and prepare a short overview for your class.
Using a Web browser, search for “incident response template.” Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not?
Using a Web browser, perform some research on a newer malware variant that has been reported by a major malware containment vendor. Using a search engine, go to the vendor’s Web site; this could be Symantec, McAfee, or any of their competitors. Visit one malware prevention software vendor. Search for the newest malware variants and pick one. Note its name and try to understand how it works. Now look for information about that same malware from at least one other vendor. Were you able to see this malware at both vendors? If so, are there any differences in how they are reported between the two vendors?
At the end of 2006, a new edition of the Federal Rules of Civil Procedure (FRCP) went into effect. Using a Web search tool, learn more about the FRCP. What likely effect will its emphasis on electronically stored information (ESI) has on an organization’s need for a digital forensic capability?
Please upload your Disaster Recovery Plan REPORT. It is due by Sunday evening of this week before 11:00 p.m. EST. Turnitin Assignment 2
Top of Form
Bottom of Form
Develop a Complete Disaster Recovery Plan to be submitted to the executive board of your company.
Only MS Word (.doc, .docx) and Adobe Acrobat (PDF) formats are acceptable. Please note that this is formal writing, all references (peer-reviewed) mostly must be cited appropriately within the text and clearly avoid plagiarism. The paper should have a minimum of 10 pages, 1.5 spacing and Times New Roman font. A minimum of 5 peer review references must be provided. The reference style is APA. You can also have some web references alongside the stated requirement. Please see the class syllabus for additional details
Submit your Disaster Recovery Plan PowerPoint Presentation here. It is due by Sunday of this week before 11:00 PM EST.
Search “scholar.google.com” or your textbook. Discuss what role end-users typically play in incident reporting? Should end-users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end-user decision to report (or not report) a potential incident?
Search “scholar.google.com” or your textbook. Include at least 250 words in your reply. Indicate at least one source or reference in your original post. Discuss ways organizations have built a CSIRT. What are the components to building an effective and successful CSIRT team?
Search “scholar.google.com” or your textbook. Discuss how organizations have faced the challenges that incident handlers are challenged with in identifying incidents when resources have been moved to a cloud environment.
Search “scholar.google.com” or your textbook. Discuss the issues organization’s face with regards to the protection of its customer information. How might an organization notify its users that all communications are being monitored and preserved? How will end-users typically respond to such announcements?