Professional Documents
Culture Documents
Module 6 Assignment 1: Professor Fred Rose
Module 6 Assignment 1: Professor Fred Rose
Module 6 Assignment 1: Professor Fred Rose
There are different cyber threats like malware, ransomware, DDoS attacks, Data breaches
and etc.
We need to keep the internet safe and secure when reliable things happen.
Where incidence response plan is one of the methodologies to address and manage the
It is mainly used to limit the damage, Recover (Fix/patch), Prevent recurrence, Prevent
CSIRT (Computer Security Incidence Response Team) is a body which receives and analyses
There are different types of CSIRTs are available it mainly depends on their activities, focus,
1. CSIRT- depend on the type of organization and the required level of support.
2. Security policy
From the above discussions incident response plan useful to create the CSIRT.
Most of the functions performed by the CSIRT are the same as the incident response plan.
Also, the incidence response plan is a high-level tool that a firm can use to effectively deal
with the It security incidents. This Incidence Response plans also help to discover the correct
members for your CSIRT, where it delivers a strong reserve for IT safety teams to
By using these two we might ensure the 24/7 availability to the incident.
Module 6 Assignment 3
References:
Wells, A., Walker, C., Walker, T., & Abarca, D. (2007). Disaster recovery. Upper Saddle