Cybersecurity Incident Report (CIR)

Cybersecurity Incident Report (CIR): Your report should be a minimum 12-page double-spaced Word document with citations in APA format. The page count does not include figures, diagrams, tables, or citations.
Executive summary: This is a one-page summary at the beginning of your CIR.
Incident Response

You’ve recently been promoted to the role of a cybersecurity incident manager as part of a new contract with a major media and entertainment company. The company requires its employees, artists, and clients to have wireless and mobile device access to company networks.

Because of the “bring your own device” policy, there has been an increase in the number of cybersecurity incident reports. You realize that you need to increase awareness of security standards. In your security monitoring of the company networks, you use tools that track employee behavior.

You want company leadership to understand the technologies used in wireless networks and mobile device management, and you want those leaders to be educated about the implementation, threats, and safeguards for all devices—including personal units that are used for work-related tasks. You believe that executive leadership needs to incorporate these kinds of safeguards as part of its business strategy. You decide to compile a cybersecurity incident report that you will send to management. You will list the actions, defense, and preventative measures you have taken to address threats and why.

The report will incorporate terminology definitions, information about the cyber kill chain, and impact assessments. Your cyber incident report will need to illustrate the threats you discovered and the resolutions you employed. You want leadership to be confident about the strategy you have used to defend the company’s networks.

find the cost of your paper

Sample Answer

 

Cybersecurity Incident Report

Executive Summary

This cybersecurity incident report is a summary of the actions taken to address threats to the wireless and mobile device networks of a major media and entertainment company. The report includes a definition of key terminology, information about the cyber kill chain, and impact assessments. The report also illustrates the threats discovered and the resolutions employed.

Full Answer Section

 

The company has a “bring your own device” (BYOD) policy that allows employees, artists, and clients to have wireless and mobile device access to company networks. This policy has led to an increase in the number of cybersecurity incidents. In response, the company has implemented a number of security measures, including:

  • Employee education: The company has implemented a comprehensive employee education program to raise awareness of cyber threats and security best practices.
  • Technical controls: The company has implemented a number of technical controls to protect its wireless and mobile device networks, such as firewalls, intrusion detection systems, and data loss prevention (DLP) solutions.
  • Process controls: The company has implemented a number of process controls to manage the risk of cybersecurity incidents, such as incident response procedures and change management processes.

The company has also taken steps to improve its incident response capabilities. These steps include:

  • Establishing an incident response team: The company has established an incident response team (IRT) that is responsible for responding to cybersecurity incidents. The IRT is made up of representatives from the company’s security, IT, and legal departments.
  • Developing incident response procedures: The company has developed incident response procedures that outline the steps that should be taken when a cybersecurity incident occurs. These procedures include steps for identifying the incident, containing the incident, investigating the incident, and recovering from the incident.
  • Testing incident response procedures: The company regularly tests its incident response procedures to ensure that they are effective.

The company’s efforts to improve its cybersecurity posture have been successful in reducing the number of cybersecurity incidents. However, the company continues to monitor its networks for threats and vulnerabilities.

Key Terminology

  • Cybersecurity: The protection of information systems from unauthorized access, use, disclosure, disruption, modification, or destruction.
  • Incident: An event that could potentially cause harm to an organization’s information systems or data.
  • Threat: A potential for harm to an organization’s information systems or data.
  • Vulnerability: A weakness in an information system or data that could be exploited by a threat.
  • Cyber kill chain: A model that describes the steps that an attacker takes to compromise an organization’s information systems or data.
  • Impact assessment: An analysis of the potential impact of a cybersecurity incident on an organization.

Cyber Kill Chain

The cyber kill chain is a model that describes the steps that an attacker takes to compromise an organization’s information systems or data. The cyber kill chain consists of the following steps:

  1. Reconnaissance: The attacker gathers information about the target organization, such as its network infrastructure, employee credentials, and security measures.
  2. Weaponization: The attacker develops a malicious payload, such as a virus, worm, or Trojan horse.
  3. Delivery: The attacker delivers the malicious payload to the target organization, such as through email, social engineering, or a drive-by download.
  4. Exploitation: The attacker exploits a vulnerability in the target organization’s information systems to gain access to the system.
  5. Installation: The attacker installs malware or other malicious software on the target organization’s system.
  6. Command and control: The attacker establishes a command and control (C&C) channel with the malware or other malicious software on the target organization’s system.
  7. Lateral movement: The attacker moves laterally through the target organization’s network to gain access to other systems.
  8. Collection: The attacker collects sensitive data from the target organization’s systems.
  9. Exfiltration: The attacker exfiltrates the sensitive data from the target organization’s systems.
  10. Impact: The attacker impacts the target organization by disrupting operations, stealing data, or extorting money.

Impact Assessment

An impact assessment is an analysis of the potential impact of a cybersecurity incident on an organization. The impact assessment should consider the following factors:

  • The confidentiality of the data that is at risk
  • The integrity of the data that is at risk
  • The availability of the data that is at risk
  • The financial impact of the incident
  • The reputational impact of the incident

 

The legal impact of the incident

This question has been answered.

Get Answer