Incident Response and Invest/ week 3 Module Three Activity Guidelines and Rubric

CYB 320 Module Three Activity Guidelines and Rubric

Incident Report Components

Overview

In the last module, you worked on incident response strategies to implement during an event. Now you will be assessing a realworld breach while working on components of an incident report. While following response plans, you may be required to generate incident reports on the entirety or part of an incident. This is challenging because there are many times when an incident strays off on tangents and moves away from the root cause. Therefore, it is important to be able to identify the components of an incident report before you have to generate the final output.

Proper documentation is a necessity when trying to document incidents as they are happening and after the fact. This documentation may include identification of the issue, assets involved, and effects of the incident. Many organizations have their own templates on how an incident response will be documented. It is important to find a reporting mechanism that works for your organization. It should not impede the process but facilitate it. If, at any point, the documentation becomes confusing and cannot be used to learn from the situation, then the type of documentation should be revisited. Once a root cause is identified, it should be shared with all members of your organization. This will promote a stronger awareness of identifying the same type of issue as soon as possible.

As you read through the articles for this assignment, consider the complexity involved in continuing to provide aid during an active breach with weak data protection processes. Guidelines and protections exist to prevent this type of incident, but how do you best deal with it in the middle of a crisis? As you think about root cause, remember that it often entails many contributing factors and no single easy fix.

Prompt

From the Module Three Reading and Resources, review “A ‘Major Privacy Incident’ at FEMA Exposes Personal Information of 2.5 Million Disaster Survivors,” “FEMA OIG: Agency Mistakenly Shared Data on 2.3M Hurricane, Fire Victims,” and “Management Alert— FEMA Did Not Safeguard Disaster Survivors’ Sensitive Personally Identifiable Information (REDACTED).” You will use the viewpoints presented in both articles, along with the CIS Controls document, to develop components of an incident report that includes contributing factors to the root cause of the incident.

You must address the critical elements listed below.

  1. FEMA Incident
    1. Explain the contributing factors that could inform the root cause analysis of the incident
    2. Identify the data assets affected by the incident
    3. Recommend security improvements based on the recommendations from OIG
    4. Describe how two critical controls can be used during the root cause analysis of the incident

What to Submit

Your submission should be 2 to 3 pages in length. Use double spacing, 12-point Times New Roman font, and one-inch margins. Any references should be cited according to APA style. Use a file name that includes the course code, the assignment title, and your name—for example, CYB_123_Assignment_Firstname_Lastname.docx.

Module Three Activity Rubric

Criteria Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value
FEMA Incident: Contributing Factors Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Explains the contributing factors that could inform the root cause analysis of the incident Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 22.5
FEMA Incident: Data Assets Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Identifies the data assets affected by the incident Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 22.5
FEMA Incident: Security Improvements Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Recommends security improvements based on the recommendations from OIG Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 22.5
FEMA Incident: Critical Controls Meets “Proficient” criteria and addresses critical element in an exceptionally clear, insightful, sophisticated, or creative manner Describes how two critical controls can be used during the root cause analysis of the incident Addresses “Proficient” criteria, but there are gaps in clarity, logic, or detail Does not address critical element, or response is irrelevant 22.5
Articulation of Response Submission is free of errors related to citations, grammar, spelling, and organization and is presented in a professional and easy-to-read format Submission has no major errors related to citations, grammar, spelling, or organization Submission has some errors related to citations, grammar, spelling, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, or organization that prevent understanding of ideas 10
Total: 100%

Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.