Site icon Eminence Papers

Creech Air Force Base

Creech Air Force Base

For Creech Air Force Base, it makes sense for the establishment to have a forensics and computer security incident response team (CSIRT). This is important because it helps ensure there is business continuity in the short term and resistance in the long run. By having this team and ability, it becomes possible to find out the reasons for an attack and, with due patience, can help ensure that a pattern is realized in the long run and that the right form of security can be found and such attacks can be stopped in the long run. Although a forensics and CSIRT plan strategy is common in business continuity models, they are especially critical when it comes to security agencies such as an air force base.

Computer forensics in an organization such as Creech Airbase is vital because it helps to ensure that it is possible to trace the activities of the threat and be able to ensure that there is a clear knowledge of exactly what is happening there. Unlike incident response, forensics is more comprehensive and seeks to understand more than that incident (Johansen, 2017). To implement forensics analysis, there is a need to use longer log analysis and files that have their log and malware analysis capabilities. Forensics are important because they enable careful analysis and can be able to carry out an entire proper chain of attack.

A CSIRT is a vital organizational entity that ensures consistent support when a computer security event or incident occurs. A proper CSIRT should be able to handle various activities, which include determining the scope, impact, and nature of the particular event (Landoll, 2017). It should also be possible to understand what technically caused the incident or event, identify what might go on to happen, or the potential threats thereof, as well as research the possible solutions and workaround of whatever they were facing at the time.

The right CSIRT should have specialized knowledge about intruder threats, attacks, and possible mitigation and countering strategies that would work. It is only with this knowledge and experience that an attack can be stopped before it has a lot of negative impacts. As such, this team must be extra knowledgeable about the typical models of attack and how they can be stopped. The escalation process must be significantly understood and known by everybody involved. The awareness training involved should be able to handle the activities involved in the organization’s security model.

The team must be developed to minimize and control the damage resulting from incidents. They should also understand that their responsibility involves effective recovery and response as well as ensuring such future incidents do not take part. For them to be effective, the CSIRTs must be able to sustain mission-critical services (Landoll, 2017). The next aspect of the plan, which should also come almost immediately, is the protection of assets that are working at that time. When there is no more destruction, it is possible to look and find out how to use the remaining resources for continuity and the best outcome achieved.

The CSIRT is expected to have an incident tracking and correlation role. Because of its emphasis on security, the airbase’s security system must have a database for incident tracking, which will help in recording the right information about the attacks that have passed and their nature, severity, and solutions. With these, it becomes possible to ensure that the team members can quickly find and put in place the mitigation strategies that can ensure the right corrections were made (Johansen, 2017). With these tracking systems, it becomes possible to ensure that interrelationships and patterns, amongst others, can be found. As such, one will know whether a particular attack was business targeted or just a vulnerability.

The team must also ensure they can carry out a complete and effective incident postmortem. After the incident is handled, there is a sense of ensuring that the incident and the responses thereafter are carefully analyzed and looked upon. The idea of the postmortem is to find out how the incident was responded to and its shortcomings and benefits (Landoll, 2017). There should also be a proper threat analysis of the mitigation strategies that were implemented at the time. If there are better options, these should be properly saved for the long term. Just in case a similar attack happens in the future, a better response will be put in place to mitigate whatever was happening.

One of the most important aspects of the current computer and information system models is that of forensics and a computer security incident response team. With these two aspects, it is possible to follow an incident from when it happens to the point that possible solutions have been found. This way, it will be possible to save the necessary information and, in the long run, find patterns and ways through which the vulnerability got to the point that it did. For the team to work together, they must be knowledgeable and target, knowing the best they possibly can about the system and recovery plan.

References

Johansen, G. (2017). Digital Forensics and Incident Response. United Kingdom: Packt Publishing.

Landoll, D. J. (2017). Information Security Policies, Procedures, and Standards: A Practitioner’s Reference. United States: Taylor & Francis.

ORDER A PLAGIARISM-FREE PAPER HERE

We’ll write everything from scratch

Question 


Forensics and CSIRT Plan Strategy for Creech Air Force Base

Utilizing your comprehensive security plan outline as a guide, develop the forensics and CSIRT plan strategy for the organization (Creech Air Force Base).

Creech Air Force Base

It is ok to create new subjects that are not on the outline, as long as it is related to security Plan on Creech Air Force Base.

Also, new references are ok too.

Follow the initial outline attached for some idea.

Creech Air Force Base, Logistics Office

Thesis – The Importance of understand how essential is to this work environment to keep their sensitive information protected. Completely provide how vulnerable they and its consequences/costs could be not ensuring the right plan is implemented.

First Subtopic – Network Security Analysis

Detail – Emphasizing the importance to protect sensitive information

Detail – Full Network Threat Analysis and Results

Second Subtopic – Network Security Threats

Detail – Go through some of the findings with full explanation on each threat or even possible future threats

Detail – Give examples on how those threat can cause mission stop and how harmful this can be to such a mission essential office operation.

Third Subtopic – Final Protection Plan to be Implemented

Detail – Ensure all government regulation fall under compliance with this plan

Detail – Provide information of all tools and/or process to be used in this implementation

Detail – Provide details on how often this will be re-evaluated and checked to ensure network safety is as planned.

Fourth Subtopic – Yearly Training Implementation          

            Detail – To ensure all users within that office are aware and on best behavior with the use of a computer and a network in the government environment.

Detail – Ensure make somebody responsible to verify all members stay up to date on their yearly training.

References

Kyle (2019). How to Develop and Implement a Network Security Plan. Hummingbird Networks. Retrieved from: https://info.hummingbirdnetworks.com/blog/how-to-develop-and-implement-a-network-security-plan

Tolly, K. (2019). How to Develop and Implement a Network Security Plan. TechTarget. Retrieved from: https://searchnetworking.techtarget.com/tip/How-to-develop-and-implement-a-network-security-plan

Wick, A. (2018). Network Security Analysis: A New Approach. Network Computing. Retrieved from: https://www.networkcomputing.com/networking/network-security-analysis-new-approach

Exit mobile version