...security policies and implementation | Unit 8 Assignment 1 | Create an Incident Response Policy | | John C Diggs (14473273) | 8/20/2014 | | Unit 8 Assignment 1- Incident Response Policy An Incident Response Policy (IRP) for privately operated mid-level clinics as well as for major hospitals are created to protect the confidentiality, integrity, and availability of sensitive information stored on facility workstations and servers. The IRP will keep these medical establishments within the legal requirements set forth by federal entities such as HIPPA. The overall IRP shall be a guidance point on how staff shall react in the event of a telecommunication incident. This will insure that faster mitigation, more efficient information gathering, and fewer mistakes may occur during the mitigation of an incident. The Information Security Officer (ISO) is solely responsible for incident mitigation of affected network based assets. During the creation of incident response policies the ISO may consult with IT administrators, the Disaster Recovery Team (DRT), members of the legal department, upper-management, and even vendors. This will allow the ISO to establish an appropriate course of action for any specific incident that just might happen to occur. If an incident should happen to take place, the ISO themself (through proactively monitoring the system’s baseline) can quickly identify an inappropriate system activity that may be what is causing the incident. The ISO...
Words: 336 - Pages: 2
...------------------------------------------------- Sara ------------------------------------------------- 10/11/2014 ------------------------------------------------- Week 4 Laboratory: Part 1 Part 1: Identify Necessary Policies for Business Continuity - BIA & Recovery Time Objectives Learning Objectives and Outcomes Upon completing this lab, students will be able to complete the following tasks: * Identify the major elements of a Business Continuity Plan (BCP) * Align the major elements of a Business Continuity Plan with required policy definitions * Review the results of a qualitative Business Impact Analysis (BIA) for a mock organization * Review the results of defined Recovery Time Objectives (RTOs) for mission-critical business functions and applications * Create a BCP policy defining an organization’s prioritized business functions from the BIA with assigned RTOs Week 4 Lab Part 1: Assessment Worksheet (PART A) Sample Business Impact Analysis for an IT Infrastructure Overview When conducting a BIA, you are trying to assess and align the affected IT systems, applications, and resources to their required recovery time objectives (RTOs). The prioritization of the identified mission-critical business functions will define what IT systems, applications, and resources are impacted. The RTO will drive what type of business continuity and recovery steps are needed to maintain IT operations within the specified time...
Words: 1852 - Pages: 8
...Incident Response Plan Example This document discusses the steps taken during an incident response plan. To create the plan, the steps in the following example should be replaced with contact information and specific courses of action for your organization. 1)The person who discovers the incident will call the grounds dispatch office. List possible sources of those who may discover the incident. The known sources should be provided with a contact procedure and contact list. Sources requiring contact information may be: a)Helpdesk b)Intrusion detection monitoring personnel c)A system administrator d)A firewall administrator e)A business partner f)A manager g)The security department or a security person. h)An outside source. List all sources and check off whether they have contact information and procedures. Usually each source would contact one 24/7 reachable entity such as a grounds security office. Those in the IT department may have different contact procedures than those outside the IT department. 2)If the person discovering the incident is a member of the IT department or affected department, they will proceed to step 5. 3)If the person discovering the incident is not a member of the IT department or affected department, they will call the 24/7 reachable grounds security department at xxx-xxx. 4)The grounds security office will refer to the IT emergency contact list or effected department contact list and call the designated numbers in order on the...
Words: 1230 - Pages: 5
...Study Week 6 Incident Response Policy First and foremost my name is XXXXXXXXX and I am the Senior Manager here at Gem Infosys. Here at Gem Infosys we are dedicated to protecting our organizations from attacks such as malware, adware, viruses and DDOS. Here at Gem Infosys we have also implemented some security protocols and a security policy for all our employees to adhere too as well. Under this incident response policy there will be the steps necessary to prepare, detect, contain and eradicate, recover, and reduce the network down time if any future incidents occur. The first thing we have to do is to determine the point of contact. Once that is determined, we will assemble an incident response team. The team will consist of a team leader, a network/security analyst, an internal and/or external subject matter expert, a legal counsel, a public affairs officer, and a security office contact. Once a team is assembled, the team will need to acquire the equipment necessary to detect, contain, and recover from an incident; establish the procedures and guidelines for the use of the equipment obtained; and train those who will use the equipment (Conklin, 2010). Once the suspected incident has occurred, the team must determine what type of incident has occurred, to ensure that it wasn’t a user error. All incidents will be handled as a possible security threat until they can determine whether it is or isn’t. Once the incident response team has determined that an incident most likely...
Words: 639 - Pages: 3
...Sample Email to myself Special Publication 800-61 Revision 2 Computer Security Incident Handling Guide Recommendations of the National Institute of Standards and Technology Paul Cichonski Tom Millar Tim Grance Karen Scarfone Computer Security Incident Handling Guide Recommendations of the National Institute of Standards and Technology Paul Cichonski Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security Tim Grance Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity NIST Special Publication 800-61 Revision 2 COMPUTER SECURITY August 2012 U.S. Department of Commerce Rebecca Blank, Acting Secretary National Institute of Standards and Technology Patrick D. Gallagher, Under Secretary of Commerce for Standards and Technology and Director Reports on Computer Systems Technology The Information Technology Laboratory (ITL) at the National Institute of Standards and Technology (NIST) promotes the U.S. economy and public welfare by providing technical leadership for the Nation’s measurement and standards infrastructure. ITL develops tests, test methods, reference data, proof of concept implementations, and technical analyses...
Words: 32495 - Pages: 130
... 4/1.3 Remote Access Security 5/1.4 Laptop/Removal Media Security 5/1.5 Vulnerability/Penetration Testing 6/1.6 Physical Security 6/1.7 Guidelines for Reviewing/Changing Policies 7/1.8 Policies Acceptable Use Policy 8,9,10 Password Policy 10, 11 Incident Response Policy 12, 13 User Awareness/Training Policy 14 Z-assurance is a life insurance company that provides benefit to the families of the deceased. It is an important financial plan that will help offer security to customers. The benefits can help replace the income that could have been earned to help pay off debt and life expenses. The policies of the company contain omissions, reductions in benefits and limitations. I. Procedures and Guidelines 1. Network Architecture: Z-assurance Network Architecture contains telephone system, Internet, white board, and video calling access. The router is placed in the area in which the cubicles are located. Giving employees a definite access...
Words: 2489 - Pages: 10
...the environment, so that they can devise effective and efficient backup systems. For these reasons, it is important to undertake an auditing process, which helps monitor the utilization and the performance of the security plan and the standard operating procedure. Further, there should be a high level of awareness already in place, before the implementation and deployment of an incident response squad (Ellis & Speed, 2001). This paper will discuss recommendations on the ways of minimizing or averting security incidences, the assembly of a CSIRT. Further, the paper will define the threat response plan. Minimizing the Severity and the Number of Security Breaches Indeed, the prevention of security incidents is a major milestone for the organization. However, it is not possible to eliminate all the security threats facing the organization. Further, after the incidence of a risk event, minimizing its impact should be a major priority. The process entails the following processes: establishing and enforcing all procedures and policies; upholding the support of incident mitigation and security policies from the management; assessing for organizational vulnerabilities continually and checking all computer networks and systems, to ensure that they are updated on threat elimination (Rhee, 2003). Other processes to be engaged include offering security coaching for end users and IT staffs, placing security tags that remind users of responsibilities and restrictions, and where necessary...
Words: 994 - Pages: 4
...security policy, I want to take a look at the basics of risk management. The risk management process involves answering three simple questions, what assets do you have that are worth protecting, what are the known threats to those assets, what can you do to keep those threats from actually occurring. When it comes to the assets that are worth protecting, your mind probably immediately jumps to your company's hardware inventory. First, it should educate the company's employees as to what is expected of them regarding cybersecurity (prevention). Second, it should be a guide that dictates the appropriate response to a variety of security incidents. To accomplish these two goals, you need to limit your policy to a manageable size. If you're trying to educate users on security strategies, keep the documentation short and simple. Users will usually ignore anything that's over a couple of pages long or that's overly complex. If you want to get technical, the real asset is your data. Since authentication credentials are the gateway to your data, they should also be treated as an asset that needs protecting. Clearly, passwords can be disclosed by users with no malicious intent. The resulting damage, however, can be just as serious as if the security breach were malicious. Therefore, when making your list of known threats against your assets, try to be creative and think of both malicious and casual threats. A risk management security policy focuses on...
Words: 614 - Pages: 3
...IS4550 Security Policies and Implementation INSTRUCTOR GUIDE Course Revision Table Change Date | Updated Section | Change Description | Change Rationale | Implementation Quarter | 12/20/2011 | All | New curriculum | | June 2012 | | | | | | | | | | | | | | | | | | | | | | | | | | ------------------------------------------------- ------------------------------------------------- Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing...
Words: 18421 - Pages: 74
...organization is potentially vulnerable to both internal and external threats. Identify these threats and create methods of countering them before they happen. Be able to identify the potential physical, operational, and management policy decisions that affect your information security efforts. It isn’t good enough to have a plan if the plan is unsound or has gaping holes. You must make sure that the plans you develop and the procedures you follow to ensure security make sense for the organization and are effective in addressing the organization’s needs. Be able to explain the relative advantages of the technologies available to you for authentication. You have many tools available to establish authentication processes. Some of these tools start with a password and user ID. Others involve physical devices or the physical characteristics of the person who is requesting authentication. This area is referred to as I&A. Be able to explain the relative capabilities of the technologies available to you for network security. In most situations, you can create virtual LANs, create connections that are encrypted, and isolate high-risk assets from low-risk assets. You can do so using tunneling, DMZs, and network segmenting. Be able to identify and describe the goals of information security. The three primary goals of information security are prevention, detection, and response. Your policies and systems must include these three aspects to be effective. Ideally, you want to prevent a security...
Words: 5056 - Pages: 21
...Computer Incident Response Team Assembly By Alexander R Ward November 11, 2012 In any organization preventative maintenance is strongly encouraged and sometimes mandatory. The reason for doing such actions is to prevent incidents. However, no matter how well your organization has prepared or tried to prevent an incident it will fail. Incidents happen no matter what. There is no changing that fact. But what makes and breaks organizations is how they react to the incident at hand. Planning and formulation of a team to handle incidents is something that can be difficult to do. For that reason management has to put together a team that is not only well educated, but seasoned. Putting together a team of junior professionals would be extremely detrimental to that organization, but that is not to say that a team shouldn’t consist of junior personnel. Each and every roll within an incident response team is vitally important. The Computer Security Incident Response Team (CSIRT) is designed to mitigate and handle the dangers that come with operating in a digital environment. Before we can delve into creating or assembling the CSIRT there are a few things that must be covered. By definition what is the purpose of a CSIRT? A CSIRT is there to outline the organizational structure and delineation of roles and responsibilities and to supplement an organization’s security infrastructure to investigate and minimize the threat of damage...
Words: 2436 - Pages: 10
...Ministry of Communications and Information Technology Government of India Electronics Niketan, Lodhi Road New Delhi – 110003 Discussion draft on National Cyber Security Policy “For secure computing environment and adequate trust & confidence in electronic transactions ” Your comments/feedback on this document are most welcome. Please send your valuable comments/feedback by 15 May 2011 to Dr Gulshan Rai, Director General, CERT-In, at the at the above address or on email id ‘grai@mit.gov.in’ Discussion draft Department Of Information Technology National Cyber Security Policy “For secure computing environment and adequate trust & confidence in electronic transactions ” Contents 1.0 Security of Cyber Space – Strategic perspective 1.1 IT as an engine for economic growth and prosperity 1.2 Security of cyber space - Need for action 1.3 Target audience 1.4 Securing cyber space – Key policy considerations 2.0 Cyber space – Nature of threat 2.1 Threat landscape 2.2 International cooperation 2.3 Securing cyber space – Scope of action 2.3.1 Cyber security and cyber defense 2.3.2 Cyber intelligence and cyber defense 2.4 Priorities for action 2.5 Partnership and collaborative efforts 3.0 Enabling processes 3.1 Security threat and vulnerability management 3.2 Security threat early warning and response 3.3 Security best practices - compliance and assurance 3.4 Security crisis management plan for countering cyber attacks and cyber terrorism 3.5 Security legal framework and law...
Words: 7888 - Pages: 32
...McBride Financial Website Security Plan Reggi CMGT/441 April 7, 2014 University of Phoenix McBride Financial Website Security Plan Introduction McBride financial services is upgrading their website to be more interactive with clients. The goal is to create self-serve options for clients though the website and through kiosks located in the offices. McBride wants to reduce the number of employees needed to handle client accounts using this new business plan. The new plan will increase the need for data protection to ensure that customer’s personal data is kept same during all points of the application and loan process. Implementing online loan applications means customer information will be input into web forms and then transferred to the company database. This creates the potential for hackers to steal or corrupt the data and to use it to gain access to other company servers. In order to prevent this from occurring and limiting the damage done in the case of a successful attack McBride must implement a Prevention, Detection, and Recovery plan. Prevention A prevention plan for McBride will be need to include protection for the company servers and protection for client information. The first step in this plan is to establish a demilitarized zone (DMZ) to separate the web server from the company databases and other company servers. The most secure way to implement this is to use two firewalls. The first one will be set to allow necessary traffic to the web server...
Words: 1058 - Pages: 5
...an incident response plan is put into place. In an IT environment, it is typical for multiple members of the IT Department to be part of the planning and response efforts for many security incidents. Because of this, it will be helpful that you understand how the process works. Please be sure that your response to the incident make sense and are developed by your own research on how to respond to the incident. Details on what should be included in the Incident Response Plan are below. For the deliverable, use Calibri font, Size 14. This should be in your own words. Plagiarism goes against school policy and will result in a zero for the assignment. Please note that this is 21% of your grade for the class; take the time to be detailed and I expect questions from you about it. After all, this project is all about you learning how the process works. Phase 1: Week 5 Step 1: Choose an incident type to create a response plan with. I’ve supplied a list for you below. Step 2: Find supporting materials on how to respond to the incident. You should be able to use a common search engine and find this. Phase 2 Step 3: Develop a summary of the incident that occurred; recommended 1-2 paragraphs; can be brief. If you can find an incident online that matches your project choice, you can use this summary. Make up a business name of the company that you work for. The sky is the limit in terms of what business type and name you use. Please be sure that, if your incident is one...
Words: 625 - Pages: 3
...The communication and coordination plan is vital to success of the recovery. Now the incident has been discovered the CSIRT team needs to be notified. The team lead needs to roll down the incident response procedures and identify who needs to be contacted. This action will ensure that the proper level of response is applied and minimize and further damage to the organizations networks and reputation. Controlling who knows of the incident will prevent an attacker from being tipped off to your recovery and detection efforts. All communication will be coordinated with Legal and Communication Representative. BMF will develop a comprehensive communication plan that will separately address each of the three audiences and continue to develop...
Words: 1373 - Pages: 6