Answered You can hire a professional tutor to get the answer.

QUESTION

discussion 1  Search "scholar.google.com" or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so,

discussion 1 

 Search "scholar.google.com" or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end-user decision to report (or not report) a potential incident?  

discussion 2

 Search "scholar.google.com" or your textbook. Include at least 250 words in your reply.  Indicate at least one source or reference in your original post.  Discuss ways organizations have built a CSIRT. What are the components to building an effective and successful CSIRT team?  

assignment 1

 Using a Web browser, visit the site www.honeynet.org. What is this Web site, and what does it offer the information security professional? Visit the “Know your Enemy” whitepaper series and select a paper based on the recommendation of your professor. Read it and prepare a short overview for your class

assignment 2 

Using a web browser, search for “incident response template.” Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not?

discussions  reply

The last consumer serves their crucial roles and also an important part of incident report. It treats like a real viewer who is act as witness of that incident. The last or final consumer should be anyone from the public. The last consumer is that person who has the most important information about the incident which will help to identify the issues and to resolve it. The circumstance through which any of important data is captured is most important to know. So to avoid these situation it is very important to make suitable and effective protection policies which helps to procure the details. It is also depends the data which is collected from the identify site which gives their measures to resolve the issue. (Huang, 2006)

Last consumers are encouraged to report suspicious occurrences

Any of associates can make significant contributions to their company's security efforts, like when you do not have system rules or training to cover an unexpected event, and then blog makers and both improve to stay as secure as possible. There are a lot of risk-based businesses, though people do not necessarily tell them how this behaviour is behaved when another happens. For example, when people report incidents that improve their organization and become more flexible for cyber attacks, reported incidents also prevent specific employees and allow for solving an ongoing data violation before the results get increased. In fact, reporting of events is an important aspect of security and business data security rules. (Wick, 1989)

Things which affect the decision of last consumer to report incident

To report an incident is very important and the success and failure of report is truly depends on its reliability and how it prepares. It is also necessary from the point of safety concern, if it is not correct than it will gives negative impact and make the situation of high risk. It will allow easy access to their reports that will be controlled in a non-punitive manner and it will be better learned about the event and the change in system will prevent it from reviving. Currently there are significant problems with local and national incident reporting systems, in which the poor security culture in the punitive action organization lacks understanding of the understanding among the persons. (Ashenden, 2008)

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question