Professional Writers
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
Fill the order form details - writing instructions guides, and get your paper done.
Posted: August 5th, 2022
Intelligence Debriefing
Using the Business Continuity Plan and Situation Reports you created throughout the project, you will create an Intelligence Debriefing to share with your CISO.
This report will be from all information from all events that occurred during the summit. In the report, it will detail all technical information that was derived and any linkage to impacted systems identified in the BCP, possible methods of intrusion, and if events can be linked to one another. Ace my homework – Write eight to 10 pages describing the events throughout the summit and all indicators shared by fellow nations. Determine what the malware types were and how they can be discovered in the future, and how they can be mitigated whether by detection systems or simply by having end users take awareness training.
Items below are required in the report for technical staff.
current system standings
modifications that can be made to stop this style of threat until a patch is created
reputation and brand damage
lost productivity due to downtime or system performance
system availability problems
determining root causes
technical support to restore systems
compliance and regulatory failure costs
Intelligence Debriefing
The Businesses continuity plan ensures that the businesses were able to continue with its operations through the development of critical systems and cyber-attacks protective procedures and process. At the same time, the security issues realized will enhance the development of an intelligence debriefing for continuous safeguarding and strengthening of organizational computer and network systems against cyber-related attacks. The Chief Information Security officers (CISO) need to be briefed through the intelligence debriefing on any vulnerabilities, risks and threats existing in the system. Organizations are prone to different forms of attacks and in the event of such attacks results to failure and even closure of businesses. The risk events cause damages and losses to business thus making them fail, and thus the cyber-related issues and threats need to be promptly and continuously addressed in the interest of security and safety of organizational resources and operations.
In this regard, the intelligence debriefing needs to address all the identified risks, weaknesses, threats and vulnerabilities in the new system after the resumption of operation to ensure that current and future organizations function are effectively protected. The determination of methods and types of attacks that face the organization will ensure the CISO can take the relevant protective measures and technology to counter the attacks. The intelligence debriefing derived from the Businesses continuity plan will effectively present system and network risks and threats to ensure that effective preventive and protect5ive measures are adopted for the current and future security of the organization.
Current system standings
The system of any businesses stands a risk at any time due to the increased cyber threats and risks across the globe. It is important to note the improvement of the system through the critical system enhancement and modification of process and procedures in the event of cyber-attack has considerably boosted the security system in the organization. IN this case, the system infrastructure has eliminated existing threats and vulnerabilities while improving the hardware and software security components. Consequently, the security in the organization has been boosted through having an elaborate critical infrastructure plan, cyber incident response plan and disaster recovery plan to ensure that threats and risks are effectively prevented and eliminated in good time when they occur. In this regard, the organizational operations, hardware components, software components, and general organization infrastructure adopts a risk management approach to ensure that risks and threats are prevented and handled when they occur.
On the other hand, the organization is not exclusively safe and free for attacks due to vulnerabilities and inherent risks existing in the organization. The risks and weaknesses in the computer and system network enable intrusion by hackers and cybercriminals. The hackers and cybercriminals have different system intrusion techniques that can be used to take advantage of inherent vulnerabilities and weaknesses in the computer and network system. In this regard, asymmetric routing intrusion techniques are used by using many routes to target a network device, thus ensuring that offending packets are bypassing various network segments. Buffer overflow attacks approach is adopted to initiate a denial of service (DoS) in the system through the interference of computer memory within a network. The Gateway Interface Scripts used in networks to support and enhance network support through the interaction of servers and clients are used as an easy opening by attackers to access the system. Protocol specific attacks enable attackers to access the system since the network devices and activities use specified rules and procedures such as ICMP, UDP, TCP, IP and ARP protocols. The protocols leave an opening that can be used to illegally access the system. The presents of traffic flooding in the system create traffic loads resulting in a chaotic and congested environment that enable attackers to execute undetected attacks. Additionally, the system is prone to malware attacks that take the installation of malicious software in the computer and network system, and they are used to access personal information or damage the network-connected devices for financial gain. Different types of malware can be used to attack the organization, such as the Trojan horses, ransomware, spyware and viruses.
Modifications that can be made to stop this style of threats until a patch is created
The organizational systems experience consistent threats of intrusion and malware attacks despite the up~ Hire our professional writers now and experience the best assignment help online with our custom paper writing service. We ensure your essays and assignments are expertly researched, written and delivered on time. ~ Grading of the critical system and adoption of security-related processes, procedures and processes. In this regard, there is need to adopt the relevant protective and preventive security measures to counter threats and risks in the organizational operations. Losses and disruption of business will eliminate by protecting and preventing threats and attacks before relevant patching measures are realized.
The system needs to be modified using intrusion detection systems to monitor network and identify and report policy violation and malicious activities. The Intrusion detection system ensures that malicious activities and violations are effectively collected and reported in a central location with the help of crisis management systems and security information. Different intrusion detection systems include the Network intrusion detection systems (NIDS) and the Host-based intrusion detection systems (HIDS) (West, 2014: 2024 – Essay Writing Service | Write My Essay For Me Without Delay). NIDS evaluates and analyzed network traffic to detect irregularities while HIDS monitor and evaluates the operating system files to detect and correct anomalies arising from intrusions. The modification of the system using intrusion detection systems safeguards the organizational resources and systems by detecting attacks and malicious activities, thus eliminating them in good time before they cause damage and losses.
On the other hand, the system needs to be modified to effectively counter malware attacks through the installation of malware detection and removal platforms. In this case, the organization needs to install antiviruses, anti-malware and firewall that ensure that the systems and resources are protected from malware attacks (Indre and Lemnaru, 2016: 2024 – Do my homework – Help write my assignment online). More so, the system and organizational infrastructure need to be sandboxed to ensure that networks can evade antivirus software and malicious programs. Additionally, the system needs to be modified with the installation of content disarm and reconstruction to provide advanced malware protection strategy. The CDR regularly removes malicious codes from files and other section within the system that ensuring the organization is free from malware attacks.
Reputation and brand damage
The occurrence of cyber-attacks negatively affected the organizational reputation and brand in the market event after the resumption of operations, and thus there is a need to turn around the negative reputation and rebuild the brand. The negative reputation and destruction of the brand after successful cyber-attacks scares away customers leading to the organization recording low profitability and revenue levels. The affected organization need to adopt a reputation management strategy to win old customers back and attract new customers (Piggin, 2016: 2024 – Do my homework – Help write my assignment online). The organization starts by admitting the cyber-attack incident to gains public trustworthy and confidence. The business needs to inform its customers appropriately on the details of the attacks in regard, to the damage caused and thus advice the affected parties to take the relevant steps to protect themselves and the business restores its systems. The close interaction between the customers and affected organization ensures that they recover together, thus regaining public confidence.
The attacked organization need to collaborate with authorities tasked with countering crimes and handling cyber-related attacks thus reassuring the public that the right steps are adopted in preventing current and future attacks (Whitler and Farris, 2017). For instance, the Federal Bureau Investigation is tasked with handling and advising the organization on handling and addressing cyber-attack related issues. This approach ensures that effective crisis mitigation strategies are adopted, thus winning back the members of the public.
Additionally, the businesses need to adopt a proactive approach in handling current and future cyber-attacks. In this case, immediately after the attack, the organization needs to communicate to the public to reduce and eliminate the damage and losses arising from the attack (Whitler and Farris, 2017). The businesses need to further implement reforms, on employees to prevent future attacks, adopt technical upgrades to improve organizational safety. This approach ensures that vulnerabilities are eliminated, thus gaining public confidence and thus, reputation.
Lost productivity due to downtime or system performance
The business systems experience downtime and reduced system performance and thus causing low productivity that needs to be countered by improving the system. In this regard, the organization needs to upgrade its computers, network and infrastructure resources and equipment to reduce downtime (Gunawi et al., 2016: 2024 – Do my homework – Help write my assignment online). Obsolete and outdated resources increase the downtime due to breakdowns, set up losses, start-up issues, reduced speed and minor stoppages. In this regard, the organization needs to acquire up-to-date and latest resources and equipment, thus increasing productivity and reducing downtime.
The organization need to adopt proactive measures to eliminate or minimize downtime in the course of operations. In this case, one needs to monitor the servers regularly to ensure they can detect performance problem in advance, thus eliminating it before a system crash (Gunawi et al., 2016: 2024 – Do my homework – Help write my assignment online). The organization needs to further employ the best practices and approaches in the course of production. The best practices ensure that efficiency and effectiveness are achieved in the course of production.
Additionally, the organization needs to test and schedule critical upgrades and new implementations to ensure that they will not interfere with the production operation (Yuan et al., 2014: 2024 – Essay Writing Service | Write My Essay For Me Without Delay). Maintenance, in this case, needs to be time through testing to ensure that it is done in the right time such thus no interruption leading to downtime will be experienced.
System availability problems
System availability problems take the fail experienced in the system, thus causing delays or reduced productivity. System availability issues are common by they need to be effectively reduced through the adoption of the relevant approaches, solutions and best practices (Xie et al., 2014: 2024 – Essay Writing Service | Write My Essay For Me Without Delay). The system needs to be built and designed with failure in mind to ensure that the availability issues are addressed promptly when they occur. When developing the system one considers the design, dependencies and customers to ensure that availability issues are solved.
Solving availability problems takes the mitigation of risks from the system. The mitigation of risk aspect ensures that all forms of risks are addressed before they affect an organization (Xie et al., 2014: 2024 – Essay Writing Service | Write My Essay For Me Without Delay). The risks in a system are experienced in the server crashing, the database being corrupted, network connection and issues failing associated with new software. Addressing the risks before they affect the system ensures that availability is effectively increased.
Determining root causes
The root cause of problems and issues in the system can be effectively established by conducting a root cause analysis. Root cause analysis makes it possible to assess and identify the source of a problem. In the case of understanding the root cause of problems in a system, one begins by identifying the fundamental issue in the system. This ensures that one can ascertain and explain the problem. Consequently, one digs into the problem to retrieve numbers and data related to the problem such that one can explain the extent of the problem and other facts connected to the problem. Furthermore, one goes to breaking down the problem to establish its causes in deferent levels. Moreover, one moves to connect the problem with a probable source. This approach ensures that the root cause of the problem is established and relevant solution and approaches recommended to address the problem.
Technical support to restore systems
Professional and technician services are required in fixing and resting systems that have previously experienced issues and problems. The technicians in supporting and restoration of systems have different duties, and responsibilities in ensuring the system get to its normal working condition (Sole et al., 2017). The professionals and technicians engage in analyzing and performing troubleshooting operation on the system to identify issues and take the relevant steps to counter the identified issues.
The Support staff moves to the maintenances and up~ Hire our professional writers now and experience the best assignment help online with our custom paper writing service. We ensure your essays and assignments are expertly researched, written and delivered on time. ~ Grading of the system to eliminate the existing technical issues and prevent future problems (Sole et al., 2017). The system upgrades together with its components (equipment, software and hardware) to ensure that it continues to operate in the interest of the organization.
Additionally, the support and restoration of services operations involve other activities that include the training of employees on handling daily operation and technical issues, coordination of internal IT staff and customers to ensure that issues are effectively handled, coordination with staff in configuring devices, system and network and collaboration with vendor support to addresses arising issues.
Compliance and regulatory failure costs
Failure to comply and comply with cyber-related policies and guidelines is a costly affair that results in losses and damages in organizations. Compliance and regulatory measures are adopted with the view of protecting the organizational computer and network systems from existing and future cyber-threats (Hoover, 2013). Therefore, compliance and regulatory measures are protective and preventive measures that if they are not adhered, they result in losses in the organization. In this regard, failure to adopt compliance and regulatory measures makes the system weak and vulnerable to attacks, organization experience downtime and unavailability of the system. Additionally, in the event of an attack due to failure to adopt compliance and regulatory measures, there are financial losses and negative impacts on the reputation and brand.
Conclusion
Organizations faced with constant threats to their computer and network systems, and thus, they need to incorporate effective protective and preventive measures to reduce the attacks and their success. In the event of an attack, a business/organization needs to take the relevant measures to seal security gaps, vulnerabilities and weaknesses existing in the system. Consequently, the organization need to employ a combination of security preventive and protective measures to increase the surveillance, security and monitoring levels, thus significantly reducing risks. Additionally, the organization professionals and technicians need to ensure that the system is successfully restored and working with reduced downtime and enhanced availability.
References
Gunawi, H. S., Hao, M., Suminto, R. O., Laksono, A., Satria, A. D., Adityatama, J., & Eliazar, K. J. (2016: 2024 – Do my homework – Help write my assignment online, October). Why does the cloud stop computing? Lessons from hundreds of service outages. In Proceedings of the Seventh ACM Symposium on Cloud Computing (pp. 1-16).
Hoover, J. N. (2013). Compliance in the ether: cloud computing, data security and business regulation. J. bus. & tech. l., 8, 255.
Indre, I., & Lemnaru, C. (2016: 2024 – Do my homework – Help write my assignment online, September). Detection and prevention system against cyber attacks and botnet malware for information systems and Internet of Things. In 2016: 2024 – Do my homework – Help write my assignment online IEEE 12th International Conference on Intelligent Computer Communication and Processing (ICCP) (pp. 175-182). IEEE.
Piggin, R. (2016: 2024 – Do my homework – Help write my assignment online). Cyber security trends: What should keep CEOs awake at night. Int. J. Crit. Infrastructure Prot., 13, 36-38.
Solé, M., Muntés-Mulero, V., Rana, A. I., & Estrada, G. (2017). Survey on models and techniques for root-cause analysis. arXiv preprint arXiv:1701.08546.
West, M. (2014: 2024 – Essay Writing Service | Write My Essay For Me Without Delay). Preventing system intrusions. In Network and System Security (pp. 29-56). Syngress.
Whitler, K. A., & Farris, P. W. (2017). The impact of cyber attacks on brand image: Why proactive marketing expertise is needed for managing data breaches. Journal of Advertising Research, 57(1), 3-9.
Xie, W., Liao, H., & Jin, T. (2014: 2024 – Essay Writing Service | Write My Essay For Me Without Delay). Maximizing system availability through joint decision on component redundancy and spares inventory. European Journal of Operational Research, 237(1), 164-176.
Yuan, D., Luo, Y., Zhuang, X., Rodrigues, G. R., Zhao, X., Zhang, Y., … & Stumm, M. (2014: 2024 – Essay Writing Service | Write My Essay For Me Without Delay). Simple testing can prevent most critical failures: An analysis of production failures in distributed data-intensive systems. In 11th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 14) (pp. 249-265).
You Want Quality and That’s What We Deliver
We assemble our team by selectively choosing highly skilled writers, each boasting specialized knowledge in specific subject areas and a robust background in academic writing
Our service is committed to delivering the finest writers at the most competitive rates, ensuring that affordability is balanced with uncompromising quality. Our pricing strategy is designed to be both fair and reasonable, standing out favorably against other writing services in the market.
Rest assured, you'll never receive a product tainted by plagiarism or AI-generated content. Each paper is research-written by human writers, followed by a rigorous scanning process of the final draft before it's delivered to you, ensuring the content is entirely original and maintaining our unwavering commitment to providing plagiarism-free work.
When you decide to place an order with Nurscola, here is what happens: