Logbook should be 2-3 pages in length:
Last week, you evaluated IT operations reports and diagnosed a security incident affecting your organization, and began to plan responses. You should have taken steps to “stop the bleeding” by preventing further unauthorized access. These steps are most likely temporary because they may deny needed access to legitimate users and they do not address root causes. You also must plan to close the vulnerability and restore the IT systems to normal operation. Stakeholders expect you to communicate these plans. Public perception and legal and compliance issues also demand your attention. You should be concerned about the costs of lost business and of the crisis response.
WE WRITE PAPERS FOR STUDENTS
Tell us about your assignment and we will find the best writer for your project.
Write My Essay For MeTo prepare for this Assignment, review your work and plan what you intend to accomplish this week.
Include a chart of the steps to resolution including gaps and vunerabilities.
Rubric is attached with what has to be mentioned.
Action Plan is also attached for Documentation.
SAMPLE SOLUTION
Building a Log Book
Gaps and vulnerabilities
From the hypothesis analysis of the information system, some gaps and vulnerabilities were identified. These gaps and vulnerabilities include too much complacence among the IT staff. The staffs are overused to doing things according to a specific way that does not articulate for proactive and security robustness. Also, the employees are not proactive in response to the alarm system. The employees assume that there is no need to follow up, and the IT staff do not respond as required when the system alarm is raised. The business lacks an automatic monitoring system for the backup cloud system.
The company lacks a proper communication system in which the existing gaps and vulnerabilities should be communicated to the managing or responsible departments. This is the main reason why the network bandwidth problem was not…



