Week 10 Assignment: Creating a CSIRT Response Plan for an IT Infrastructure [u10a1] Week 10 Assignment: Creating a CSIRT Response Plan for an IT Infrastructure

Overview

A computer security incident response team (CSIRT) determines if a breach has occurred and how it must be handled. The CSIRT team functions according to predefined actions described in a CSIRT plan. When a security breach happens, the CSIRT team will identify, analyze, and contain the security breach, and finally remove the cause of the breach. The CSIRT team aids in all aspects of recovering from the breach. Based on the circumstances surrounding the breach, the CSIRT team will improve its CSIRT plan based on lessons learned. In this assignment, you will research CSIRT response online, describe how a CSIRT plan can mitigate risk, identify where CSIRT monitoring and security operations occur throughout an IT infrastructure, identify countermeasures and security controls that can mitigate risk, and develop a CSIRT response plan.

Instructions

  1. Complete the reading for the week of the NSIT publication NSIT SP 800-61.

Assignment Criteria

Your assignment must meet these criteria. Please refer to the rubric for this assignment.

  • Describe how a CSIRT plan helps mitigate risks across the seven domains of an IT infrastructure.
  • Identify where CSIRT security operations and monitoring occur across an IT infrastructure.
  • Identify security controls and countermeasures that will mitigate risk across the IT infrastructure and which will aid in a security incident response.
  • Create a CSIRT response plan for an IT infrastructure using incident response methodology described in NSIT SP 800-61.
  • Use style and vocabulary generally appropriate to the message and intended audience.

Assignment Requirements

Competencies Measured

By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and rubric criteria:

  • Competency 4: Apply risk mitigation strategies and actions that reduce risk to organization due to identified information technology systems vulnerabilities.
    • Identify security controls and countermeasures that will mitigate risk across the IT infrastructure and which will aid in a security incident response.
    • Create a CSIRT response plan for an IT infrastructure using incident response methodology described in NSIT SP 800-61.
  • Competency 5: Analyze the how administrative, technical and physical controls work together to manage risk in an organization.
    • Describe how a CSIRT plan helps mitigate risks across the seven domains of an IT infrastructure.
    • Identify where CSIRT security operations and monitoring occur across an IT infrastructure
  • Competency 6: Communicate effectively to a range of professional and technical audiences.
    • Use style and vocabulary generally appropriate to the message and intended audience.

View RubricCreating a CSIRT Response Plan for an IT InfrastructureCreating a CSIRT Response Plan for an IT InfrastructureCriteriaRatingsPtsDescribe how a CSIRT plan helps mitigate risks across the seven domains of an IT infrastructure.33 to >28.05 ptsDISTINGUISHEDDescribes how a CIRT plan helps mitigate risks across the seven domains of an IT infrastructure and provides supporting examples.28.05 to >23.1 ptsPROFICIENTDescribes how a CIRT plan helps mitigate risks across the seven domains of an IT infrastructure.23.1 to >0 ptsBASICDescribes how a CIRT plan helps mitigate risks across some of the domains of an IT infrastructure.0 ptsNON_PERFORMANCEDoes not describe how a CIRT plan helps mitigate risks across the seven domains of an IT infrastructure./ 33 ptsIdentify where CSIRT security operations and monitoring occur across an IT infrastructure33 to >28.05 ptsDISTINGUISHEDIdentifies where CIRT security operations and monitoring occur across an IT infrastructure and provides supporting examples.28.05 to >23.1 ptsPROFICIENTIdentifies where CIRT security operations and monitoring occur across an IT infrastructure.23.1 to >0 ptsBASICIdentifies some of the areas where CIRT security operations and monitoring occur across an IT infrastructure.0 ptsNON_PERFORMANCEDoes not identify where CIRT security operations and monitoring occur across an IT infrastructure./ 33 ptsIdentify security controls and countermeasures that will mitigate risk across the IT infrastructure and which will aid in a security incident response.33 to >28.05 ptsDISTINGUISHEDIdentifies security controls and countermeasures that will mitigate risk across the IT infrastructure and which will aid in a security incident response. Provides a rationale for the selection of the security controls and countermeasures.28.05 to >23.1 ptsPROFICIENTIdentifies security controls and countermeasures that will mitigate risk across the IT infrastructure and which will aid in a security incident response.23.1 to >0 ptsBASICIdentifies some of the security controls and countermeasures that will mitigate risk across the IT infrastructure and which will aid in a security incident response.0 ptsNON_PERFORMANCEDoes not identify security controls and countermeasures that will mitigate risk across the IT infrastructure and which will aid in a security incident response./ 33 ptsCreate a CSIRT response plan for an IT infrastructure using incident response methodology described in NSIT SP 800-61.36 to >30.6 ptsDISTINGUISHEDCreates a CIRT response plan for an IT infrastructure using the six-step incident response methodology applied to a given context.30.6 to >25.2 ptsPROFICIENTCreates a CIRT response plan for an IT infrastructure using the six-step incident response methodology.25.2 to >0 ptsBASICCreates a CIRT response plan for an IT infrastructure, but does not use the six-step incident response methodology.0 ptsNON_PERFORMANCEDoes not create a CIRT response plan for an IT infrastructure using the six-step incident response methodology./ 36 ptsUse style and vocabulary generally appropriate to the message and intended audience.15 to >12.75 ptsDISTINGUISHEDUses style and vocabulary fully appropriate to the message and intended audience.12.75 to >10.5 ptsPROFICIENTUses style and vocabulary generally appropriate to the message and intended audience.10.5 to >0 ptsBASICUses style and vocabulary somewhat appropriate to the message and intended audience.0 ptsNON_PERFORMANCEDoes not use style and vocabulary appropriate to the message and intended audience./ 15 ptsTotal Points: 0

Ace Your Assignments! 🏆 - Hire a Professional Essay Writer Now!

Why Choose Our Essay Writing Service?

  • ✅ Original writing: Our expert writers will write each paper from scratch, ensuring complete originality, zero plagiarism and AI free content.
  • ✅ Expert Writers: Our seasoned professionals are ready to deliver top-quality papers tailored to your needs.
  • ✅ Guaranteed Good Grades: Impress your professors with outstanding work.
  • ✅ Fast Turnaround: Need it urgently? We've got you covered!
  • ✅ 100% Confidentiality: Customer privacy is our number one priority. Your identity is anonymous to our writers.
🎓 Why wait? Let us help you succeed! Our Writers are waiting..

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.