Question: Incident response plan includes the processes, procedures, and documentation related to how your organization detects, responds to , and recovers from incidents. Cyber threats, natural

Incident response plan includes the processes, procedures, and documentation related to how your organization detects, responds to, and recovers from incidents.
Cyber threats, natural disasters, and unplanned outages are examples of incidents that will impact your network, systems, and devices. When you have a proper plan, you will be prepared to handle incidents when they happen, mitigate the threats and associated risks, and recover quickly.
Exercise
You are the Computer Security Incident Response Team (CSIRT) leader for a major e-commerce website, and you are currently responding to a security incident where you believe attackers used a SQL injection attack to steal transaction records from your backend database. Currently, only the core CSIRT members are responding.
Incident response plan document is usually submitted after the system has been restored. The incident response team creates a report of the incident, and it includes what was discovered, how it was discovered, what was done, and the results. The report acts as a corporate memory and can be used for future incidents. It can also be used for communications to the internal and external stakeholders.
Step 1: Develop a communication plan that describes the nature, timing, and audiences for communications to the internal and external stakeholders that you believe need to be notified.
Deliverables
Submit the Cyber Security Incident Response Plan (you can use the attached sample as a guide).

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Cyber Security Incident Response Plan Outline 1 Executive Summary Overview of the incident and its impact on the organization Summary of the response ... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!