For each of the following, describe in your own words what each area seeks to offer (over 300 words)
Answer to this question is :-
1. Containment
When a breach is first discovered, your initial instinct may be
to securely delete everything so you can just get rid of it.
However, that will likely hurt you in the long run since you’ll be
destroying valuable evidence that you need to determine where the
breach started and devise a plan to prevent it from happening
again.
Instead, contain the breach so it doesn’t spread and cause further
damage to your business. If you can, disconnect affected devices
from the Internet. Have short-term and long-term containment
strategies ready. It’s also good to have a redundant system back-up
to help restore business operations. That way, any compromised data
isn’t lost forever.
This is also a good time to update and patch your systems, review
your remote access protocols (requiring mandatory multi-factor
authentication), change all user and administrative access
credentials and harden all passwords.
Questions to address
2. Evidence
Preserving critical electronic evidence during a security incident is a must in order to obtain a full incident overview and to establish a basis for further investigation and threat containment/eradication. This evidence is of crucial importance for successful incident analysis utilizing strict data preservation standards to ensure all potentially relevant data is captured and remains uncompromised during the course of the investigation.
Subsequent to detecting a cyber attack, most incident responders are prepared to contain and remediate the incident as soon as possible. Responders must however be wary not to rush the collection of evidence. This could destroy or potentially compromise items of evidentiary value which could identify attacker methodology or avenues of compromise. These evidence items, appropriately collected in accordance with established regulations and/or best practices could further assist law enforcement in successful prosecution of the crime and this is why the preservation of evidence should be the first priority in any incident.
3. Identifying
This is the process where you determine whether you’ve been breached. A breach, or incident, could originate from many different areas.
Questions to address
4. Eradication
Once you’ve contained the issue, you need to find and eliminate
the root cause of the breach. This means all malware should be
securely removed, systems should again be hardened and patched, and
updates should be applied.
Whether you do this yourself, or hire a third party to do it, you
need to be thorough. If any trace of malware or security issues
remain in your systems, you may still be losing valuable data, and
your liability could increase.
Questions to address
Post-incident activity
Post incident activity, as with preparation, is a phase we can easily overlook, but should ensure that we do not. In the post incident activity phase, often referred to as a postmortem (latin for after death), we attempt to determine specifically what happened, why it happened, and what we can do to keep it from happening again. This is not just a technical review as policies or infrastructure may need to be changed. The purpose of this phase is not to point fingers or place blame (although this does sometimes happen), but to ultimately prevent or lessen the impact of future such incidents.
For each of the following, describe in your own words what each area seeks to offer...
Describe in your own words what continuum of care means to you. Why is it important to consider? What implications does it have for staff, providers, patients, or families? Your post should have a minimum of 150 words.
In your own words, describe what a HMO is.
Answer the following question: In your own words, describe the reasons why hospice is an important component of the long-term care continuum of care and include the perspectives of providers, patients, and families. Your post should have a minimum of 150 words.
(b) Describe in your own words, what each of the terms in the acceleration equation represents (give and example of each): диди - +и + va + (Әt "дходу = pa, (1)
In your own words in 300 words define marketing and describe why it is important for the health care managers to understand the key component of the marketing concept. And define the quality of healthcare. describe the dimensions of healthcare quality.
In your own words describe what is bond valuation.
In your own words, describe how housing factors into the continuum of care for the elderly. Why is it important? What are the various options? Which seems to you to be the most effective and why? Your post should have a minimum of 150 words
Describe what management means to you in your own words.
Describe, in your own words, what the equation for conservation of momentum means. Please use words and equations. Adv. electrodynamics In a general concept, what it means in my own words
In your own words, describe and compare the following( one paragraph each) 1. Preferred provider organization 2 point of service plans 3 HMOS