10 pages of document in apa format

Using below information and prepare WORD DOCUMENT( 10 Pages) IN APA FORMAT WITH CITATION AND REFERENCES WITHOUT PLAGIARISM.


Summary:

ABC Company is a manufacturing company that produces new technology that sells online directly to customers and retailers. The system they use is a core transactional Enterprise Resource Planning system called NEDS. NEDS is similar to many core systems that provide integrated applications on a common platform for financials, managing materials, sales distribution, and production planning (similar to Oracle or SAP). NEDS is located in the Netherlands, while ABC Company is located in Florence, Kentucky. On June 15, 2018, James Hurd (ABC’s Global Security Director) was notified that NEDS was burglarized during business hours involving individuals stealing equipment including blackberries, iPhones, laptops and hard drives.Local police were notified and the incident was reported on that date. A police report only included identification of specific hardware that was stolen and several bicycles.

The burglary notification that was mailed was sent to a branch office of ABC Company in Mexico. James Hurd was notified by the Mexico office via email which included an attached electronic version of the burglary notification and police report on June 20, 2018. James Hurd recognized that the incident actually occurred 5 days earlier.

The letter contained the following information about the incident:

  • The incident occurred in the application area that provides custom application development and reporting for the ABC Company.
  • The area that was impacted involved “potential data” used for sales analysis. Data from the ABC Company had been placed on laptops while some diagnostics were being carried out.

Compromised data could have included customer or retailer information from 2002-2014 consisting of names, address, bank account data or credit card numbers, SKU product numbers, descriptions, quantities, Purchase Order numbers, and purchase price

You are part of an incident response team. You will be acting with James Hurd and you need to respond to this incident.Please complete the following:

  • Prepare an IRT charter for on-site response. Typically, organizations require a charter before an IRT can be formed.A charter is an organizational document that outlines the mission, goals, and authority of a team or committee.The charter must include the typical elements such as Executive Summary, Mission Statement, Incident Declaration, Organizational Structure, Roles and Responsibilities, Information flow, Methods, Authority and reporting.(50 pts)
  • Using the following template, create a Security Incident Response Policy granting team members full access and authority to perform forensics and to maintain a chain of custody for physical evidence containment.Develop a Security Incident Response Policy for ABC Company that will be used as your reference for your evaluation of this potential data incident.(50 pts)

Security Incident Response Team-Access and Authorization Policy Template:

Policy Statement (insert policy verbiage here)

Purpose/Objectives (Insert the policy’s purpose as well as its objective; use bulleted list of the policy definition.Define the security incident response team members and the authorizations and authority granted to them during a crisis or securing incident situation.)

Scope (Define the policy scope and whom it covers.Which of the seven domains of a typical IT infrastructure are impacted?What elements, IT assets, or organization-owned assets are within the scope of this policy? What access and authority are granted to the incident response team members that may be outside standard protocol?)

Standards (Does this policy point to any hardware, software, or configuration standards? List the hardware, software, or configuration standards here and explain the relationship of these policy to these standards)

Procedures (Explain how you intend to implement this policy across the organization. Also, define and incorporate the six-step incident approach here along with how the chain of custody must be maintained throughout any evidence collection process.)

Guidelines (Explain any roadblocks or implementation issues that you must address in this section and how you will overcome them per defined policy guidelines.)

 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.