14 Jul Incident Response Strategies
Order Instructions
Week 2 Assignment – Incident Response Strategies
Review the following resources to complete the assignment:
NIST SP 800-61 Rev. 2: Computer Security Incident Handling Guide [PDF].
Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events [PDF].
Suppose that you are the Incident Response Team Lead for a medium-sized organization. You have been alerted of a potential incident involving a suspected worm spreading via buffer overflow techniques, compromising Microsoft IIS& Web servers. As the IR Team leader, it is your responsibility to determine the next steps.
Write a 2–3 page paper in which you:
Research incidences of a buffer overflow attack on a Microsoft IIS Web server.
Develop a malicious code attack scenario using your research.
Populate the Week 2 Assignment Table Template [DOCX] with developed scenario content.
The table is based on the format found in Table 4-3 of your textbook.
Discuss the incident recovery processes for the resolution of this incident.
Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
The specific course learning outcome associated with this assignment is:
Develop an incident response strategy.