Digital Forensics and Investigations Consolidated Electronics Group
Digital Forensics and Investigations Consolidated Electronics Group
Consolidated Electronics Group Incident Response Plan
Scenario:
Consolidated Electronics Group, Inc. is a manufacturer and supplier of avionics equipment to
various airlines across the continental United States. Recently, the company laid off several
employees, resulting in many disgruntled workers.
Now, the information technology (IT) staff has reported a spike in network attacks numbering in
the thousands. Reports from the intrusion detection system (IDS) indicate that two of these
potential attacks may have compromised highly classified plans for a new prototype avionics
switchboard, which is expected to revolutionize the market. The IT staff suspects that the attacks
and potential security breach may have something to do with the recently laid-off staff.
Assignment Instructions:
The U.S. National Institute of Standards and Technology (NIST) is a recognized authority for
providing security standards, guidelines, and procedures. NIST provides a large array of other
security-related documents, which are of great value to information security professionals.
To complete this assignment, use NIST’s Computer Security Incident Handling Guide (Links to
an external site.), Section 3, starting on page 21. Once on the site, click the link to download the
PDF.
Using the guidance from the guide, craft an incident response plan that includes:
1. A description of the specific measures that will be taken to investigate a security breach
2. An explanation of steps taken to prevent future attacks and to secure the company’s
information systems
3. A communication plan to disseminate the results and findings of this event to the
organization
Your plan must meet the following requirements:
• The paper should be formatted according to APA guidelines. The paper should include an
introduction, a body with fully developed paragraphs, and a conclusion.
• Be clearly and well written, using excellent grammar and style techniques. Be concise.
Be logical. Review the rubric below.
I have attached the Computer Security Incident Handling Guide pdf.