discussion 5 gowtham

(RS) Discussion Question 5: Incident Response Strategies

Discussion Requirements

You are provided a handout that describes a scenario in which an incident occurred along with corrective actions taken. The handout also includes a description of the phases of information security incident response.

Tasks

Discuss the phases of a typical information security incident response. Using the information presented in the handout, discuss the following questions:

  • What are the effective responses to a security breach?
  • Which actions you would recommend for each phase?

Summarize your thoughts in a Microsoft Word document checking for spelling and grammar, then submit it directly (cut & paste) into the discussion thread. Respond to at least two other students’ views to engage in a meaningful debate regarding their posts or to defend your post.

Required Resources

Submission Requirements

  • Format: Please enter directly into the Discussion Question window
  • Citation Style: Follow APA
  • At least 300 words
  • Spelling and Grammar count so I suggest you first type your post into MS Word and check for spelling and grammar. You can then cut & Paste into the Discussion Question thread.

Self-Assessment Checklist

  • I identified effective responses to a security breach.
  • I recommended at least one action for each phase.
  • I responded to at least two other students’ views to engage in a meaningful debate regarding their choices or to defend my choices.




ORDER YOUR ORIGINAL PAPER

Request for a custom paper or place a new order

Assignment Solutions For You


THE BEST CUSTOM ESSAY WRITING SERVICE AT YOUR FINGERTIPS

Forget All Your Assignment & Essay Related Worries By Simply Filling Order Form