Assignment 4 - Shekar
Assignment 4 - Shekar
Rajashekar Neelarapu
556762
BA635 Disaster Recovery
Professor Fred Rose
Module 4 assignment 2
CSIRT:
responds to computer security incidents. The main objective of the CSIRT team is to
Five sources that one should use when training a CSIRT are listed below:
European Union Agency for Network and Information Security (ENISA). The source
specialists/online-training-material
http://www.nca.gr.jp/imgs/CSIRTstarterkit_en.pdf
https://www.csirt.org/ https://www.sei.cmu.edu/reports/03hb002.pdf.
European Computer Security Incident Response Team Network. The source link is:
http://www.ecsirt.net/cec/service/links.html
ENISA is a centre of information security and network. ENISA works with the different
groups like (CSIRT) to develop advice and recommendations on best practice in information
security. The training sets to provide an indication of what an organization should consider
A CSIRT is a team or an entity within an agency that provides services and support to a
These teams are usually consist of different specialists from different categories who act
Module 4 assignment 3
according to predefined procedures and policies in order to respond quickly and effectively to
The MITRE is a nonprofit Organization which is dedicated to tackle problems that challenge
our nation's safety, stability. It operates federally and provide innovative, practical solutions
in the defense and intelligence, aviation, civil systems, homeland security, judiciary,
healthcare, and cyber security .It was founded in 1958.MITRE has grown as a systems
MITRE provides technical solutions for both civil and military agencies, as there have been
challenges evolved with time. It shares knowledge across the corporation, as lessons learned
while solving the issues of one customer are applied to the needs of others. MITRE recruits,
compensates, trains, employs and promotes regardless of age, color, race, disability, marital
status, national and ethnic origin, political affiliation, religion, sexual orientation, gender
One of the most important strengths of MITRE organization is the ability to apply a wide
variety of technical and organizational on how to resolve challenges across the federal
in technical areas, such as systems engineering, signal processing, and acquisition. Whereas
cyber security, mobile technology, and social software, have been growing to meet the
Under vulnerabilities tab different software’s and tools description and how they are
vulnerable to be attacked by a security incident was mentioned and solution to overcome the
Vulnerability: Oracle VM Virtual Box is prone to many local security vulnerabilities in the
A list of all possible vulnerable applications and operating systems ,devices with
version numbers .
programs.
BugTraq was created on Friday the 5th of November, 1993 by Scott Chasin. Over the years
BugTraq has grown into a well respected security mailing list with over twenty seven
thousand subscribers. BugTraq is a full disclosure moderated mailing list for the detailed
discussion and announcement of computer security vulnerabilities: what they are, how to
Module 4 assignment 5
exploit them, and how to fix them. Aleph One took over BugTraq on Tuesday the 14th of
May, 1996.
When we talk about CSIRT, we often hear the terms CERT and SOC. There are similar
computer security incident response team (CSIRT), and security operations center (SOC).
A CERT collects and circulates the security information, for the benefit of a country
or industry.
A SOC is where a country or organization monitors and defends its network, servers
and applications.
Module 4 assignment 6
References:
Booz Allen Hamilton - Info galactic: the planetary knowledge core. (2019).
https://www.sei.cmu.edu/careers/job-openings/index.cfm