ISOL 534 Cumberland University Incident Response Communication Discussion Needed  Reply’s with References as u know the task please work on this too for th

ISOL 534 Cumberland University Incident Response Communication Discussion Needed  Reply’s with References as u know the task please work on this too for this week Running head: DISCUSSION
Sushma Pakala
Incident Response Communication
Introduce and discuss a relevant issue regarding Incident Response Communication.
An incident response technique can be clarified as an assortment of strategies planned
for recognizing, examining and reacting to potential security occurrences in a manner that limits
effect and supports fast recuperation. With the noteworthy increment in the pace of cybersecurity
incidents around the world, the budgetary effects because these incidents have additionally taken
off. From 2013 to 2014, the total number of security incidents has increased by 48 percent to
42.8 million incidents, and the number of companies reporting losses of US $20 million or more
has almost doubled over the same period.[1]
The US National Institute of Standards and Technology (NIST) “Computer Security
Incident Handling Guide” has been utilized to underscore the potential reconciliation focuses
between the security occurrence the executive procedures and operational hazard the board
procedure and to give a system to episode supervisors and business chiefs to connect each other
successfully. The IT framework foundation ought to be mapped to the business forms it supports,
the overseeing capacities and, eventually, the customer administrations conveyed. This enables
the occurrence administrators to appraise the general business sway quickly once they are
sensibly sure about the exactness of the episode antecedent and pointers, which normally
influence the framework components.
The success of this response would be when factors such as team member’s knowledge
and skills. Each and every one of such incidents has a human element to it. Humans unlike
machines, do make mistakes, are prone to errors, and can be coerced into giving out information
that is personal in nature or proprietary.[2] Not exclusively is cooperation inside one’s own
occurrence reaction group significant. The idea of contemporary dangers and assaults makes it
more significant than any time in recent memory that occurrence reaction groups cooperate with
different entertainers during episode reaction also. From the general terms literature it is known
that teams are not easily implemented, that the creation of a team of skilled members does not
ensure success, and that teamwork does not just happen.[2] Disappointment of incident response
groups can have sweeping consequences for their particular associations and the customer
association (e.g., low speed to arrangement, low time to recognizable proof, high number of
blunders, significant expenses, and low capacity to expel danger). Also endeavors to improve
cooperation and joint effort inside cybersecurity associations have been insignificant.
[1] Hari, M. CISA. CISSP. (2015). A Business-integrated Approach to Incident Response.
ISACA Journal Vol 6.
[2] Rick, V.D.K. Geert, K. Heather, Y. (2017). Computer Security Incident Response Team
Effectiveness: A Needs Assessment. US National Library of Medicine; National Institutes of
[3] James, F. (2019). Incident Response Methodology: The OODA Loop Explained. AT&T
Cybersecurity; AT&T Business
1 day ago
Abhijit Vijay Kumar
Incident Response Communication
Incident Response Communication
Whenever a security breach incident occurs, it is the responsibility of the incident response team to investigate,
containment, recovery, and essential to communicate to the authorities. Communication should be present in every
action of incident response. The incident response communication includes a strategy addressing compliance-related
issues, internal communications, and external communications. Addressing needs to be done considering various
factors like lowering any possible future impact, not disclosing the vulnerabilities as such to avoid another attack for
a data breach.
Steps involved for an incident response communication are formalizing incident response team activation
process which means whenever an incident is found it must be informed to the validation team for their attention to
look into the outrage so that they verify it and assign a response team for further actions and communications,
assigning a point of communication i.e., an individual for the external communications to ensure unplanned data or
information is not leaked to the public which would be more harmful to the organization, criteria creation for law
enforcement involvement is another aspect which is deciding if the law enforcement team should be involved or not
as there are pro and cons to this like gaining more public attention on the negative side and having warrant to all
areas for investigation on the positive side, developing templates for communication with customers or say
endpoints by which they are not impacted in continuing their duties and tasks, and importantly monitoring the social
media where an effective and spontaneous communication is essential as a strong response for the incident or say
cybersecurity threat.
Ioannou, Marios., Stavrou, Eliana., Bada, Maria. 2019. “Cybersecurity Culture in Computer Security Incident
Response Teams: Investigating difficulties in communication and coordination”. International Conference on
Cyber Security and Protection of Digital Services.
Moore, Erik L., Fulton, Steven P., Mancuso, Roberta A., Amador, Tristen K., Likarish, Daniel M. 2019.
“Collaborative Training and Response Communities – An Alternative to Traditional Cyber Defense Escalation”.
International Conference on Cyber Situational Awareness, Data Analytics, And Assessment (Cyber SA).
1 day ago
Ravi Teja Vemula
Security in cloud computing is made possible through applications. Cloud application security is
the process in which policies, controls, processes, and technology are defined in a business,
exchanged to all departments to secure the information for the organization. Examples of
applications that ensure information is secured appropriately and efficiently are the Microsoft
office, box, slack, and google G suite, among others. Several risks face cloud computing, and they
can be an issue to companies and businesses who opt to use cloud computing for the safety of their
information (Rittinghouse, &Ransome, 2016). Common risks associated with cloud computing
include attacks that are related to the distribution of denial services and shared computer cloud
services that may create room for unauthorized people to have access to confidential information.
Employee negligence is another risk factor associated with Cloud Application Security.
Employees who are not able to work within the policies and standards set to govern a company
risk confidential data and assets in a company or business (Singh, & Chatterjee, 2017). Data loss
is another risk in cloud computing, and it is related to businesses or applications not having some
data backups to restore information, especially when devices crash due to virus or worms. Phishing
attacks and social engineering attacks are common in cloud computing, and they are risks that
most companies are unable to tolerate. Once they attack a business, the likelihood of its fall is in a
blink of an eye. Some companies have systems that are vulnerable due to inadequate planning and
implementation of a cloud computing application, which results in risks and threats to business
hence reducing the performance of a company.
Rittinghouse, J. W., &Ransome, J. F. (2016). Cloud computing: implementation, management,
and security. CRC press.
Singh, A., & Chatterjee, K. (2017, February 1). Cloud security issues and challenges: A survey.
2 days ago
Sandeep Aswadati
Cloud Application Security
Issue Relevant cloud application security:
There are certain security issues in cloud computing that IT teams must be aware of. However, how to manage these
situations is a unique challenge. Cloud organizations may find it challenging to understand and make the best use of
their current approaches to maintaining security at the application layer (Singh, Jeong, & Park, 2016). These
challenges were addressed with the launch of the cloud application security workgroup. One of the issue relevant to
the cloud computing security is misconfiguration of application setup (Singh, Jeong, & Park, 2016).
Misconfiguration of application setup:
Misconfiguration of application setup is the single biggest threat to cloud security for any large organization. It is
because of such misconfiguration that many organizations have been attacked by viruses, worms and other malicious
codes. The most common of such cases of misconfiguration is Setup for multiple instances of a web application. This
presents the greatest risks to website security (Mehta et al., 2020). The misconfiguration of application setup may
usually be the result of forgetting the domain name of an application hosting a web site or it may be the result of not
updating the application after the launch. When an organization wants to add a web application to a new domain, they
usually configure a database security plan for that web (Mehta et al., 2020).
Account service is also another common misconfiguration as it increases the number of misconfigured objects and
makes it more difficult for admins to troubleshoot the exact details. The client-side does the same when a site is
configured with multiple login mechanisms. In both cases, it makes it more difficult for the admin to view how the
specific configuration was made (Mehta et al., 2020). This is also an easy way for attackers to reach the compromised
server. In most cases, the credentials used to log into the legitimate site are the same as those used to log into the
Cloud Application Security application. It is easy for attackers to generate these credentials in their own system. Also,
attacks exploiting the misconfiguration of passwords often fail due to error messages related to the exposed user
accounts, which usually displays a Mixed User account error message (Mehta et al., 2020).
Singh, S., Jeong, Y. S., & Park, J. H. (2016). A survey on cloud computing security: Issues, threats, and solutions.
Journal of Network and Computer Applications, 75, 200-222.
Mehta, S., Bhagwan, R., Kumar, R., Bansal, C., Maddila, C., Ashok, B., … & Kumar, A. (2020). Rex: Preventing
Bugs and Misconfiguration in Large Services Using Correlated Change Analysis. In 17th {USENIX} Symposium on
Networked Systems Design and Implementation ({NSDI} 20) (pp. 435-448).

Purchase answer to see full

Don't use plagiarized sources. Get Your Custom Essay on
ISOL 534 Cumberland University Incident Response Communication Discussion Needed  Reply’s with References as u know the task please work on this too for th
Just from $13/Page
Order Essay
Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.