Overview In cybersecurity, data protection should be the first priority. There a

WRITE MY ESSAY

Overview
In cybersecurity, data protection should be the first priority. There a

Overview
In cybersecurity, data protection should be the first priority. There are two basic concepts: data at rest and data in transit. Each version of data is protected slightly differently. It may be sufficient to protect data at rest with some type of encryption that is difficult to crack over a long period of time, while the data in transit only needs to be protected until it gets past the entity that is trying to decipher it. In either case, it is important to know what to do when a breach or incident occurs. Having a strong computer incident response team (CIRT) is a valuable resource for any company. The premise behind incident response is to identify an attack, contain and eradicate its effects, and minimize the risk of incident recurrence.
What is the shortest amount of time it can take to restore the system to a safe state? The shortest amount of time might not be the most cost-effective. Therefore, the company must prioritize its actions and make sure that in trying to fix the cyber incident, it doesn’t cause the company more harm. There are many incidents and actions that the CIRT needs to be ready for, so having a highly defined and well-practiced incident response plan is important for the company’s well-being. Having the proper resources, whether they are personnel or information technology related, can play a role in how fast the company recovers from the incident. Being prepared for the worst possible cases, having a strong understanding of the influences of the confidentiality, integrity, and availability (CIA) triad, and knowing how the company will react to those situations could mean the difference between company survival or deeper consequences, such as company closure. Having the proper CIRT is about having the right people for the job. This does not mean that all of senior management needs to be on the CIRT. This does mean that the company must figure out what the proper makeup of the team should be. The team members must be knowledgeable in their roles as they need to be sure that the decisions they make are in the best interests of the company.
Prompt
After reviewing Breach Analysis Simulation Scenario One, address the critical elements below:
Reflection on CIA and Data ProtectionSelect a tenet of the CIA triad and explain how the principle applies to the scenario. Justify your response with details or examples from the scenario.
Explain the issues with Secure Sockets Layer (SSL) that facilitated its deprecation and how Transport Layer Security (TLS) remedies those issues.
Incident Response PlanIn small organizations, there typically isn’t a large membership to form the CIRT. Explain how organizations with a small IT department ensure that the CIRT is prepared to handle all possible situations.
What to Submit
Your submission should be 1 to 2 pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. All sources must be cited using APA format. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.
Module Two Short Response Rubric
CriteriaExemplary (100%)Proficient (85%)Needs Improvement (55%)Not Evident (0%)Value
Reflection on CIA and Data Protection: Tenet of CIA TriadMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerSelects a tenet of the CIA triad and explains how the principle applies to the scenario, including details or examples from the scenarioAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant30
Reflection on CIA and Data Protection: Issues with SSLMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerExplains the issues with SSL that facilitated its deprecation and how TLS remedies those issuesAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant30
Incident Response Plan: Form the CIRTMeets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative mannerExplains how organizations with a small IT department ensure that the CIRT is prepared to handle all possible situationsAddresses “Proficient” criteria, but there are gaps in clarity, logic, or detailDoes not address critical element, or response is irrelevant30
Articulation of ResponseSubmission is free of errors related to citations, grammar, spelling, and organization and is presented in a professional and easy-to-read formatSubmission has no major errors related to citations, grammar, spelling, or organizationSubmission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideasSubmission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas10
Total:100%

WRITE MY ESSAY

admin Avatar

Leave a Reply

Your email address will not be published. Required fields are marked *