Andy Kolden

Information Security

Chapter 12 (pages 689-691)



1)      Search the Web for the Forum of Incident Response and Security Teams (FIRST).† In my words, what is the forumís mission?

-          Their mission is to solve computer security issues and make sure people have the programs to prevent them from happening in the first place/in the future.


2)      The chapter lists five tools that can be used as security admissions, network administrators, and attackers alike.† Search the Web for 3 to 5 other tools with this description.

-          Metric tools and automated tools are two tools that can measure data an analytics among what is working and what is not for a security type of reason.† Whenever something is working the data will show the success rate of the program thanks to one of these tools.† Another tool that can be used is a wireless vulnerability assessment tool that can be useful in the sense that it alerts where and when an area of a wireless network is most vulnerable.


Case Exercises

1)      What area of the SP 800-100 management maintenance model addresses the actions of the content filter described?

-          I would say that it can fall under couple areas including: info. Security governance and awareness & training.† I think that when she dissects the issue with the customer and realizes that his email is incorrect that is governing the network and knowing how it runs then while she is helping him and knowing how to fix it, that is the awareness and training portion to me.† Also, incident response because she simply helped the man right away with the incident that had occurred.


2)      What recommendations would you give SLS for how it might select a security management maintenance model?

-          It may select one that can always direct errors to the right part of the team and when people have issues they will always have an incident response team that will have the awareness and training to figure out how to solve the issue at hand.† Also, they will have a very secure and well-built network that is compatible with all computers.† They will have to constantly internally and externally monitor the security issues and positives that are going on.† They will have to have multiple plans if they are every hacked and definitely a contingency for right after the attack.† They need to figure out where they are most vulnerable and build those spots up by making them as secure as possible.†


Ethical Decision Making

1)      Do you think this action is unethical because Charlie is leaving soon?

-          Yes that is because she has no idea and while she is waiting those two or three weeks, the issue may just get worse and worse.† Also, she may only be thinking about that meeting which could make her work turn ugly and that can really harm a company when people are not doing their best work.