Effective responses to a security breach
(RS) DISCUSSION QUESTION 5: INCIDENT RESPONSE STRATEGIES
Discussion Requirements
You are provided a handout that describes a scenario in which an incident occurred along with corrective actions taken. The handout also includes a description of the phases of information security incident response.
Tasks
Discuss the phases of a typical information security incident response. Using the information presented in the handout, discuss the following questions:
What are the effective responses to a security breach?
Which actions you would recommend for each phase?
Summarize your thoughts in a Microsoft Word document checking for spelling and grammar, then submit it directly (cut & paste) into the discussion thread. Respond to at least two other students’ views to engage in a meaningful debate regarding their posts or to defend your post.
Required Resources
Textbook and Internet
NIST SP 800-30: Guide for Conducting Risk Assessments
Handout: Incident Response Strategies
Submission Requirements
Format: Please enter directly into the Discussion Question window
Citation Style: Follow APA
At least 300 words
Answer preview to effective responses to a security breach
APA
414 words