Question: You have been working as a technology associate in the information systems department at Corporation Techs for almost three months now. Yesterday, you got an

You have been working as a technology associate in the information systems department at Corporation Techs for almost three months now. Yesterday, you got an e-mail, which specified that a security breach has occurred in your company. The other members of your team also received such e-mails. You checked the firewall logs and it confirmed the security breach.

Later, your team took corrective actions in the environment. They isolated the incident and assessed the damage. Today, your manager calls you and asks you to create an executive summary report detailing the events to be presented to executive management. You need to include a summary of corrective options, which may be in the form of architectural adjustments or other configuration changes that will prevent the reoccurrence of this incident in the future.

Tasks

You need to create a post-incident executive summary report that addresses a security breach. Include an overview of actions taken at each phase of the incident response. Also include suggestions for corrective modifications that would prevent the incident from reoccurring.

Required Resources

Textbook and Internet

RS Assignment 4 Post incident Executive Summay Report Template.docx (YOU MUST USE THIS TEMPLATE TO GET FULL CREDIT)

Submission Requirements

Format: Microsoft Word

Font: Arial, Size 12, Double-Space

Citation Style: APA>

Length: 12 pages>

Spelling and Grammar count

Self-Assessment Checklist

I included all six incident response phases in my executive summary report.

I displayed an understanding of firewall strategies when discussing corrective options in the report.

I concisely and clearly summarized information so that an executive can easily absorb the material.

Template

Week 3: (RS4) Assignment 4: Post-Incident Executive Summary Report

ISOL 532

{YourName}

Tasks

You need to create a post-incident executive summary reportthat addresses a security breach. Include an overview of actions taken at each phase of the incident response. Also include suggestions for corrective modifications that would prevent the incident from reoccurring.

Overview of actions taken at Incident Response Phase 1 (Preparation):

Overview of actions taken at Incident Response Phase 2 (Detection):

Overview of actions taken at Incident Response Phase 3 (Containment):

Overview of actions taken at Incident Response Phase 4 (Eradication):

Overview of actions taken at Incident Response Phase 5 (Recovery):

Overview of actions taken at Incident Response Phase 6 (Follow-up):

Firewall Strategies to Implement so as to correct the Security incidents:

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!