I’m working on a computer science question and need an explanation to help me understand better.
- Describe the key components within the incident response plan you identified. Be sure to cite the plan by including a link.
- Outline the six-step methodology for performing incident response. List each step and its purpose. How closely does the plan that you reviewed follow this methodology?
- Describe how this policy would be associated with an incident response plan.
- Policy Statement
Insert policy verbiage here. - Purpose/Objectives
Insert the policy’s purpose as well as its objectives; use a bulleted list for the policy definition. Define the incident response team members and the authorization and authority granted to them during a crisis or while securing an incident situation. - Scope
Define this policy’s scope and whom it covers. What elements, IT assets, or organization-owned assets are within the scope of this policy? What access and authority are granted to the incident response team members that may be outside of standard protocol? - Standards
Does this policy point to any hardware, software, or configuration standards? If so, list them here and explain the relationship of this policy to these standards - Procedures
Explain how you intend to implement this policy across the organization. Also, define and incorporate the six-step incident response approach here along with how the chain of custody must be maintained throughout any evidence collection process. - Guidelines
Explain any roadblocks or implementation issues that you must address in this section and how you will overcome them per defined policy guidelines. - Identify and define an incident scenario for Bankwise Credit Union. The incident must involve some type of cybersecurity issue.
- Create a brief abstract of the scenario to be approved by C-level executives.


0 comments