College Pal
Connecting to a pal for your paper
  • Home
  • Place Order
  • My Account
    • Register
    • Login
  • Confidentiality Policy
  • Samples
  • How It Works
  • Guarantees

Sms or Whatsapp only : US:+12403895520

 

email: [email protected]
July 12, 2024

This week’s assignment we are going to produce an Incident

computer science

 

Instructions

Incident Response Report

This week's assignment we are going to produce an Incident Response report for a fictional attack against our organization Zenith City Water. Since it is fictional, you will instead use a recent attack against another water company as the stand-in for the organization.

Assignment Guidelines

Step 1: Obviously our first step is to locate a recent incident against another water company.

Step 2: Once you have found a water company that matches-up you will begin the process of filling out the Incident Report called Week6-Form Fillable.docx and you will use the guide called Week6-Assignment Guide.pdf as a companion instruction manual for filling out the report.

Step 3: Once you have completed the Incident Report save it and submit it.

Deliverables

The Word document, Week6-Form Fillable, that has been completed.

  • attachment

    Week6-FormFillable.docx

  • attachment

    Week6-Mod-9-Presentation-Final2.pptx

You will need to use the “Week6-Assignment Guide.pdf” to assist you in filling out this report.

You will fill out the following form using the incident you chose in Week 1.

Company Background Information

What is your main industry sector? ☐ Defense Industry ☐ Financial Services ☐ Healthcare ☐ Biotech/Pharmaceutical ☐ Food Production/Distribution ☐ Utilities (water, power, etc.) ☐ Transportation/port services ☐ Technology ☐ Energy Production (oil, natural gas, etc.) ☐ R&D/University ☐ Manufacturing ☐ Other ________________________

Does your organization consider itself to be a small, small-medium, medium-sized, or large business? ☐ Small Business (less than 100 employees) ☐ Small-Medium Business (100-999 employees) ☐ Medium-sized Business (1,000-9,999 employees) ☐ Large Business (10,000 employees or more)

How long has your organization been dedicating resources to cybersecurity? ☐ Started within the last year ☐ 1-3 years ☐ 3-5 years ☐ More than 5 years

Does your organization have someone responsible for cybersecurity/information security, such as a CISO (Chief Information Security Officer) or Chief Security Officer (CSO)?

☐ Yes

☐ No

Did your organization have someone responsible for cybersecurity/information security, such as a CISO (Chief Information Security Officer) or Chief Security Officer (CSO), at the time of the incident? ( Yes / No )

☐ Yes

☐ No

1 – Type of Incident

Please identify the major category description that best fits this incident. Check all that apply: ☐ Distributed Denial of Service (DDOS) ☐ Destructive WORM ☐ Ransomware/Extortion ☐ Data Theft ☐ Intellectual Property (IP) ☐ Personally Identifiable Information (PII) ☐ Financial Data ☐ Health Records ☐ Other type of data _______________ ☐ Unknown ☐ Web page defacement ☐ Malware (Variant, if known______________) ☐ Zero-Day Malware Attack ☐ SCADA or Industrial Control System Attack ☐ Accident/Human Error ☐ System Failure ☐ Natural or Man-made (Physical) Disaster ☐ Storage/Back-up Failure ☐ Network Intrusion ☐ Third-Party Event ☐ Phishing ☐ Industrial Espionage ☐ Physical Sabotage ☐ Configuration Error ☐ Insider Attack ☐ Lost Device ☐ Outage ☐ Other ☐ Additional Entry . . .

2 – Severity of Incident (See Assignment Guide Page 10 for charts)

Impact

Financial or Asset Loss

Time-to Market Delay

Product Quality

Environment

Health & Safety

Legal

Fill out the information in the columns above. Then using the charts on Page 10, specify the Impact level.

3 – Company Posture at Time of Incident

Does your organization use a cyber risk management framework, best practice, regulation or standard as part of its cyber risk management activities?

☐ Yes

☐ No

If Yes, please identify: _________________

If you are required to be certified compliant with a technical regulation or standard, how are you assessed?

☐ Self-Assessed ☐ Self-Assessed with Third-Party Validation ☐ Third-Party Assessment and Validation ☐ Post-Market Surveillance ☐ N/A: Not Required

Are your organization’s risk management practices formally approved and expressed as policy?

☐ Yes

☐ No

Are your organization’s cybersecurity practices regularly updated based on the application of risk management processes to changes in business/mission requirements and a changing threat and technology landscape?

☐ Yes

☐ No

Is cybersecurity integrated into your organization’s enterprise risk management?

☐ Yes

☐ No

Does your organization define risk-informed policies, processes, and procedures?

☐ Yes

☐ No

If Yes, are they implemented as intended

☐ Yes

☐ No

Are they reviewed?

☐ Yes

☐ No

Does your organization have methods in place to respond effectively to changes in risk?

☐ Yes

☐ No

Do your organization’s personnel possess the knowledge and skills to perform their appointed roles and responsibilities?

☐ Yes

☐ No

Does your organization understand its dependencies and partners and receive information from partners that enable collaboration and risk-based management decisions within your organization in response to events?

☐ Yes

☐ No

4 – Timeline of Incident

What is the interval between initial cyber intrusion to target or significant system compromise (including data records compromise)? ☐ Less than 4 hours (almost immediate) ☐ 4-24 hours (less than a day) ☐ 2-7 days (less than a week) ☐ 7-30 days (more than a week, but less than a month) ☐ 30-180 days (between 1 and 6 months) ☐ 180 days-365 days ( 6 months to a year) ☐ More than a year ☐ Unknown (initial date of intrusion, and/or system compromise undetermined

What is the interval between compromise and detection of the incident’s effects? ☐ Less than 4 hours (almost immediate) ☐ 4-24 hours (less than a day) ☐ 2-7 days (less than a week) ☐ 7-30 days (more than a week, but less than a month) ☐ 30-180 days (between 1 and 6 months) ☐ 180 days-365 days ( 6 months to a year) ☐ More than a year ☐ Unknown (initial date of intrusion, and/or system compromise undetermined

What is the interval between detection of the incident and containment/mitigation? ☐ Less than 4 hours (almost immediate) ☐ 4-24 hours (less than a day) ☐ 2-7 days (less than a week) ☐ 7-30 days (more than a week, but less than a month) ☐ 30-180 days (between 1 and 6 months) ☐ 180 days-365 days ( 6 months to a year) ☐ More than a year ☐ Unknown (initial date of intrusion, and/or system compromise undetermined

5 – Apparent Goal of Attackers

What was the attacker’s apparent end-state goal? Check all that apply.

☐ Acquisition/Theft – Illicit acquisition of valuable assets for resale or extortion in a way that preserves the assets’ integrity but may incidentally damage other items in the process.

☐ Business Advantage – Increased ability to compete in a market with a given set of products. The goal is to acquire business processes or assets.

☐ Technical Advantage – Illicit improvement of a specific product or production capability. The primary goal is to acquire production processes or assets rather than a business process.

☐ Damage to Property – Injury to the target organization’s physical/electronic assets, or intellectual property.

☐ Bodily Injury/Death – Injury to or death of the target organization’s personnel.

☐ Denial – Prevent the target organization from accessing necessary data or processes.

☐ Disruption of System/Service Availability – Interference with or degradation of the target organization’s legitimate business transactions.

☐ Production Loss – Reduction or halting of the target organization’s ability to create goods and services by damaging or destroying its means of production.

☐ Environmental Harm – Adverse impact to land, air, or water resources.

☐ Degradation of Reputation – Public portrayal of the target organization in an unflattering light, causing it to lose influence, credibility, competitiveness, or stock value.

☐ Unknown – Intent of the attack is not known.

☐ Not Applicable – Attack does not appear to have been an intentional/hostile incident.

☐ Additional Entry . . .

6 – Contributing Causes

Incident Progression

Step 1

Step 2

Step 3

Step 4

Step 5

Step 6

Intentionally caused or conducted by third party vendor

☐

☐

☐

☐

☐

☐

Unintentionally/negligently introduced through third party information sharing partner (e.g., link to an infected site, or poor protection of shared materials)

☐

☐

☐

☐

☐

☐

Third party vendor infrastructure (e.g., remote access connection)

☐

☐

☐

☐

☐

☐

Third party vendor account credentials

☐

☐

☐

☐

☐

☐

Data was under third party control when compromised

☐

☐

☐

☐

☐

☐

Direct access by Insider

☐

☐

☐

☐

☐

☐

Physical access by unauthorized personnel

☐

☐

☐

☐

☐

☐

Spear phishing email attachment

☐

☐

☐

☐

☐

☐

Spear phishing email link

☐

☐

☐

☐

☐

☐

Poor Passwords

☐

☐

☐

☐

☐

☐

Stolen Authorized Credentials

☐

☐

☐

☐

☐

☐

Employee Human Error in authorized procedure (e.g., distracted/multitasking, inadequate training)

☐

☐

☐

☐

☐

☐

Employee Human Error – unauthorized/reckless activity (system or authorization misuse, benign shortcuts, etc.).

☐

☐

☐

☐

☐

☐

Improper sensor tuning

☐

☐

☐

☐

☐

☐

Malicious Insider Activity

☐

☐

☐

☐

☐

☐

Unauthorized Device (e.g., personal laptop)

☐

☐

☐

☐

☐

☐

Misconfigured Device (firewall, router, switch)

☐

☐

☐

☐

☐

☐

Compromised mobile media (e.g. USB)

☐

☐

☐

☐

☐

☐

Compromised firmware

☐

☐

☐

☐

☐

☐

Known vulnerability not patched

☐

☐

☐

☐

☐

☐

Previously unknown vulnerability

☐

☐

☐

☐

☐

☐

Brute Force attack

☐

☐

☐

☐

☐

☐

Virus w/ A/V

☐

☐

☐

&#x26

Collepals.com Plagiarism Free Papers

Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.

Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS

Why Hire Collepals.com writers to do your paper?

Quality- We are experienced and have access to ample research materials.

We write plagiarism Free Content

Confidential- We never share or sell your personal information to third parties.

Support-Chat with us today! We are always waiting to answer all your questions.

In a paragraph, share what you learned from your Survey res Share links to two sources from the Shapiro Library that yo

Related Posts

computer science

Discuss the layers of a computing system to list and briefly describe each layer. What is the importance of these combined layers? Discuss how the early hi

computer science

Write a 3- to 5-page paper in which you analyze a computer ethics cases. Read the article entitled, ‘Your Botnet is My Botnet: Analysis of a B

computer science

When designing a new application or software product that entails access control, security should be embedded throughout its development. Comp

Why Choose Us

Best Essay Writing Services- Get Quality Homework Essay Paper at Discounted Prices

At the risk of sounding immodest, we must point out that we have an elite team of writers. Ours isn’t a collection of individuals who are good at searching for information on the Internet and then conveniently re-writing the information obtained to barely beat Plagiarism Software. Who can’t do that?

Our writers have strong academic backgrounds with regards to their areas of writing. A paper on History will only be handled by a writer who is trained in that field. A paper on health care can only be dealt with by a writer qualified on matters health care. Thesis papers will only be handled by Masters’ Degree holders while Dissertations will strictly be handled by PhD holders. With such a system, you needn’t worry about the quality of work. Quality isn’t just an option, it is the only option. We don’t just employ writers, we hire professionals.

We have writers spread into all fields including but not limited to Philosophy, Economics, Business, Medicine, Nursing, Education, Technology, Tourism and Travels, Leadership, History, Poverty, Marketing, Climate Change, Social Justice, Chemistry, Mathematics, Literature, Accounting and Political Science.

Our writers are also well trained to follow client instructions as well adhere to various writing conventional writing structures as per the demand of specific articles.

They are also well versed with citation styles such as APA, MLA, Chicago, Harvard, and Oxford which come handy during the preparation of academic papers.

They also have unrivalled skill in writing language be it UK English or USA English considering that they are native English speakers. You also needn’t worry about logical flow of thought, sentence structure as well as proper use of phrases.

Our writers are also not the kind to decorate articles with unnecessary filler words. We respect your money and most importantly your trust in us. In writing, we will be precise and to the point and fill the paper with content as opposed to words aimed at beating the word count.

Our shift-system also ensures that you get fresh writers each time you send a job. This helps overcome occupational hazards brought about by fatigue. Hence, quality will consistently be at the top.

From our writers, you expect; good quality work, friendly service, timely deliveries, and adherence to client’s demands and specifications.

Once you’ve submitted your writing requests, you can go take a stroll while waiting for our all-star team of writers and editors to submit top quality work.

How Our Website Works

Get an Essay from Us

College Essays is the biggest affiliate and testbank for WriteDen. We hire writers from all over the world with an aim to give the best essays to our clients.

Our writers will help you write all your homework. They will write your papers from scratch. We also have a team of editors who read each paper from our writers just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE.

Step 1
To make an Order you only need to click ORDER NOW and we will direct you to our Order Page. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline. Deadline range from 6 hours to 30 days.

Step 2
Once done with writing your paper we will upload it to your account on our website and also forward a copy to your email.

Step 3
Upon receiving your paper, review it and if any changes are needed contact us immediately. We offer unlimited revisions at no extra cost.

Is it Safe to use our services?
We never resell papers on this site. Meaning after your purchase you will get an original copy of your assignment and you have all the rights to use the paper.

Pricing and Discounts
Our price ranges from $8-$14 per page. If you are short of Budget, contact our Live Support for a Discount Code. All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
Please note we do not have prewritten answers. We need some time to prepare a perfect essay for you.

Recent Posts

  • Unit 7_MT438_Discussion_AI in the Supply Chain
  • Unit 7_MT438_Discussion_SCA Execution
  • Unit 8 discussion_LS311: Scope of Employment
  • Unit 7 discussion_LS311: Merger and Acquisition
  • Midterm Essay
College Pal

All Rights Reserved Terms and Conditions
College pals.com Privacy Policy 2010-2018