Discussion 1: Search “scholar.google.com” or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not,
Discussion 1: Search “scholar.google.com” or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. factors typically influence the end-user decision to report (or not report) a potential incident? Discussion 2: Search “scholar.google.com” or your textbook. Include at least 250 words in your reply. Indicate at least one source or reference in your original post. Discuss ways organizations have built a CSIRT. are the components to building an effective and successful CSIRT team? Assignment 1: Using a Web browser, visit the site www.honeynet.org. is this Web site, and what does it offer the information security professional? Visit the “Know your Enemy” whitepaper series and select a paper based on the recommendation of your professor. Read it and prepare a short overview for your class. Assignment 2: Using a web browser, search for “incident response template.” Look through the first five results and choose one for further investigation. Take a look at it and determine if you think it would be useful to an organization creating a CSIRT. Why or why not? Purchase the answer to view it Purchase the answer to view it Purchase the answer to view it