Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

IT429 Northern Virginia Community College Risk Management Discussion

IT429 Northern Virginia Community College Risk Management Discussion

IT429 Northern Virginia Community College Risk Management Discussion
Question Description
Question 1: Incident Management Scenario
Introduction:
Scenarios exercises can be helpful learning tools. They allow practitioners to think about and experience different types of challenges and respond in a safe environment. For this exercise you will review a scenario individually, then engage in a group discussion a to further develop insight into the scenario. The scenario for this exercise was taken from the NIST incident response document. Read through the scenario and refer to the NIST report if necessary.
Instructions;
Read the scenario from the NIST Incident Response Document below and post your responses to the following questions:
From what sources might the incident response team gather evidence?
What would the team do to keep the investigation confidential?
How would the handling of this incident change if the team identified an internal host responsible for the leaks?
How would the handling of this incident change if the team found a rootkit installed on the internal host responsible for the leaks?
Scenario 3: Stolen Documents
On a Monday morning, the organization’s legal department receives a call from the Federal Bureau of Investigation (FBI) regarding some suspicious activity involving the organization’s systems. Later that day, an FBI agent meets with members of management and the legal department to discuss the activity. The FBI has been investigating activity involving public posting of sensitive government documents, and some of the documents reportedly belong to the organization. The agent asks for the organization’s assistance, and management asks for the incident response team’s assistance in acquiring the necessary evidence to determine if these documents are legitimate or not and how they might have been leaked. (NIST)
Reference:
. [PDF file size 1446KB] Retrieved from http://nvlpubs.nist.gov/nistpubs/SpecialPublicatio”¦Computer Security Incident Handling Guide Recommendations of the National Institute of Standards and Technology (Links to an external site.)Links to an external site.Cichonsk, P., Miller, T., Grance, T., Scarfone, K. (2012).
Question 2:
Please define each of these (Qualitative vs. Quantitative) and give 2 examples of how each of these can be applied within conducting a risk assessment.
Question 3: Risk, Assessments and Threats to Security
Instructions;
Review the following documents. Use the material in the readings and outside source material, especially current cyber threat reports.
Bayne, J. (2002). An Overview of Threat and Risk Assessment (Links to an external site.)Links to an external site.. SANS. [PDF File Size 62KB] Retrieved from https://www.sans.org/reading-room/whitepapers/audi”¦
NIST. (2017) Framework for Improving Critical Infrastructure Protection. Draft Version 1.0 (Links to an external site.)Links to an external site.. [PDF File Size 1801KB] Retrieved from https://www.nist.gov/sites/default/files/documents”¦
G., Goguen, A., & Feringa, A. (2002, July). Risk Management Guide for Information Technology Systems (Links to an external site.)Links to an external site. [PDF file size 478 KB]. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-30/”¦
Discuss the following questions: Cite your work:
What is Risk Management?
Why is it important when applied to business needs?
Read the SANS article. What is a risk assessment?
List and describe the core areas of an assessment outlined in the article.
After answering these questions, can you please go on my blackboard and reply to 2 students for each post. So 6 total replies to students. I will give you my login info. The initial answer you can do within 1 day, the replies to other students is due Sunday July 14th by 11:59pm.
Please put coresspanding citations after each answer. Not at once at the end.

“Place your order now for a similar assignment and have exceptional work written by our team of experts, guaranteeing you A results.”

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Homework Discussion only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Homework Discussion are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Homework Discussion is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Homework Discussion, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.