Cyber Incident Response for Blue Moon Financial - Term Paper Example

Comments (1) Cite this document
Summary
As a senior security analyst for Blue Moon Financial (BMF) Company, I have detected a potential network intrusion at the middle of the night through a technician who called me to explain the suspicious act. Recently, there has been a rash of network intrusion attacks at other…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER95% of users find it useful
Cyber Incident Response for Blue Moon Financial
Read TextPreview

Extract of sample "Cyber Incident Response for Blue Moon Financial"

Download file to see previous pages The company has been faced with several challenges with respect to addressing the network intrusion attacks and cyber security issues because it is ill equipped to deal with such issues. This paper discusses how I will deal with the active network intrusion attack in the company under various sub-topics.
The first steps to take in the current scenario are to identify the nature of attack. I am the only person who is qualified and well trained to deal with such issues. Therefore, before informing anyone else about it, I will first find out the type of the attack targeted towards the company. This will be the first step towards stopping the attack because further steps cannot be initiated if the type of attack is not known well. Secondly, I will localize the source. This means that I have to use firewall and IDS logs to try to find out where the attack is coming from to be able to know whether the attack is coming from a compromised host or from the outside world. This is also essential in ensuring that the attack can be stopped as soon as possible (Sharma, et.al, 2015).
After this, the next step that I will take entails blocking the attack. Once it source and the nature of attack is clarified, I will take the necessary actions towards blocking it (Youssef, & Emam, 2011). These actions will include pulling the machines that have been attacked from the network, block the access to the network from that IP address if the attack is coming from outside. Depending on the type of the attack, I may have to use ISP if the attack is a DDoS attack. I will also backup the evidence of the attack by keeping the logs generated to ensure that I have a detailed account of the attack. I will also find other compromised machines and use appropriate tools to root out any other machines that have been attacked. The last aspect is to ensure that I do not ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Cyber Incident Response for Blue Moon Financial Term Paper”, n.d.)
Cyber Incident Response for Blue Moon Financial Term Paper. Retrieved from https://studentshare.org/information-technology/1690012-cyber-incident-response-for-blue-moon-financial
(Cyber Incident Response for Blue Moon Financial Term Paper)
Cyber Incident Response for Blue Moon Financial Term Paper. https://studentshare.org/information-technology/1690012-cyber-incident-response-for-blue-moon-financial.
“Cyber Incident Response for Blue Moon Financial Term Paper”, n.d. https://studentshare.org/information-technology/1690012-cyber-incident-response-for-blue-moon-financial.
  • Cited: 0 times
Comments (1)
Click to create a comment or rate a document
po
pollicheusebio added comment 8 months ago
Student rated this paper as
I had an issue with a term paper types of works. All until I came across this website and this particular document. Even though "Cyber Incident Response for Blue Moon Financial" is far from my interests, the structure is so great that I use it all the time as an example for my own works.

CHECK THESE SAMPLES OF Cyber Incident Response for Blue Moon Financial

Computer Incident Response Teams

...from information damage, but also their clientele and reputation will nosedive in the industry. 2. CIRT Computer Incident Response Teams (short-form 'CIRT') are special teams formed for the purpose of minimizing and controlling the impact of a security breach or other computer related emergency in the company (Brussin, Cobb, & Miora, 2003). CIRT is a also known as CERT (Computer Emergency Response Teams) and CSIRT (Computer Security Incident Response Teams) in some companies, however, they all attempt to provide security to the computer systems. 3. Need for a CIRT It depends on the company policy as well as the riskiness of information leakage or...
4 Pages(1000 words)Essay

Critical Incident Logistic Response Structure

...is meant just for the monitoring of the costs. These costs are than submitted to another unit who in t urn balances the financial considerations with the necessity of the operations. The administrations section also pays the personnel and makes sure that the compensations and reimbursements are made to the private sector for any use. Table 3. Administration Overview If this response structure is followed then not more than 3-7 heads of authority will be used and errors such as too much authority and no awareness of jurisdiction will not compromise the Critical Respond Structure's integrity. References Critical Incident Management...
4 Pages(1000 words)Essay

Incident response policy

...Incident response policy for Gem Infosys Incident response policy for Gem Infosys Introduction In the existing IT environment, incidents are common and appropriate measures should be taken to tackle them. When Incidents occur it proves much costly to an organization. Proper incident response should be an integral part of your overall security policy and risk mitigation strategy. There are clearly direct benefits in responding to security and other incidents. However, there might also be indirect financial benefits. For a software company like Gem Infosys, a formal incident response plan might help win business, because it shows that you take seriously the process of good information security. This document will provide you... with a...
2 Pages(500 words)Essay

Market and competitive analysis: Introducing Blue Moon beer to Chile

...25 April Market and Competitive Analysis - Introducing Blue Moon Beer to Chile. Executive Summary Chile is a country placed inthe Southern part of South America bordering Bolivia, Peru and Argentina. Its predominant transport mode is by road while communication is by telephony. Valparaiso city is located in central Chile and approximately 80 miles to the northwest direction of Chile’s capital city, Santiago. Chilean beer consumers have unique preferences that have revolutionized from the traditional chicha to the currently predominant pale ale and lager. Craft beer has for a long time been in existent, though its market share and consumer population has stagnated for a some while, maintaining only...
8 Pages(2000 words)Research Paper

Gem Infosys Incident-Response Policy

...Gem Infosys Incident-response policy Introduction Gem Infosys company need to put in place necessary incident-response plan in order to prevent future network breakdowns. The I.T department should have an incident response plan so that they can successfully respond to any future incidents of network breakdown. This may be done via a number of ways such as: reducing the number of systems severity, integrating the activities of Computer Security Incident Response Team (CSIRT), damage control, and having a well-defined incident response plan (Obaidat &...
1 Pages(250 words)Coursework

Incident Response Policy

...The Homeland Defense Policy The Homeland Defense Policy The United s Department of Defense’s main factions include leadingand administering all the American military forces including supporting their operations. This department coordinates all the army, air forces, marines, and navy in fighting wars, disaster management, peacekeeping, homeland security, and humanitarian aid. Therefore, the success for the department of defense policy, all the involved departments and bodies require to work and share crucial information that are of security concerns. Notably, the InfoSec Company has security policies that match with department of defense and the Homeland Defense policies to enable them work with the state security programs... Homeland Defense ...
1 Pages(250 words)Coursework

Digital Forensic Incident Response

...and determinants of the investigation is an essential part of completing the investigation successfully as well as ensuring that any further legal responsibility is shifted away from the IT firm and provided back to the recipient. References Ariffin, A., Slay, J., & Jazri, H. (2012). DIGITAL FORENSICS INSTITUTE IN MALAYSIA: THE WAY FORWARD. Digital Evidence & Electronic Signature Law Review, 951-57. Bulbul, H., Yavuzcan, H., & Ozel, M. (2013). Digital forensics: An Analytical Crime Scene Procedure Model (ACSPM). Forensic Science International, 233(1-3), 244-256. doi:10.1016/j.forsciint.2013.09.007 Garfinkel, S. L. (2013). Digital Forensics. American Scientist, 101(5), 370-377. Karie, N. M., & Venter, H. S. (2014). Toward...
8 Pages(2000 words)Research Paper

Digital forensic incident response

...Topic: Digital Forensic Incident Response for American Marketing Systems Introduction In the current digital world, incidences in computer use continue to bear high probability to affect financial reports. The risks and uncertainties in compromise are increasing in volatility. There are high chances of making away with sensitive company information. Both the private and the public sectors have suffered massive loss in frauds, software compromise, online share frauds and other resources. They have experienced massive loss even after spending so much in putting up expensive system. As these threats increases, there is a need to bridge the gaps in system management as a way...
10 Pages(2500 words)Research Paper

Construct an incident response plan

...Incident response plan Table of Contents Dynamic Vulnerability Analysis……………………………………………………..5 Purpose of the Dynamic Vulnerability Analysis Policy………………………….5 1.1 Purpose to the Firm……………………………………………………………….5 1.2 Purpose to the Employees………………………………………………………...5 1.3 Purpose to the Customer………………………………………………………….6 2. Scope of the Dynamic Vulnerability Analysis Policy…………………………….6 2.1 Central Office……………………………………………………………………..6 2.2 Branch Office……………………………………………………………………..6 3. Dynamic Vulnerability Analysis………………………………………………….7 3.1 Technical aspect of the policy…………………………………………………….8 3.2 Social Aspect of the Policy………………………………………………………..8 4. Metrics………………………………………………………………………………8 Intrusion...
8 Pages(2000 words)Research Paper

Toxic Chemical Agent Incident Response

...al affiliation Introduction Gas leakage in an industry can cause serious health problems as it enters thebody through the most vulnerable route of inhalation. In case of a gas leak, the management of the organization must respond by coming up with measures that can caution the employees and the nearby community from the toxic effects of the gas. Methyl isocyanate leakages can results to a number of effects if emergency response is not done in time. The gas can cause respiratory compromise as it results in coughing and irritation of the throat. The gas can also cause irritation of the eye as well as skin damage (Williams, 2013). Incident command system is a well-organized tool that can be used to manage...
5 Pages(1250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Cyber Incident Response for Blue Moon Financial for FREE!

Contact Us