Open Always
Email: Call Now! +1-315 515-4588
Open Always
Email: Call Now! +1-315 515-4588

Sample Coursework Paper on CCJS 390

This sample paper on (Sample Coursework Paper on CCJS 390)was uploaded by one our contributors and does not necessarily reflect how our professionals write our papers. If you would like this paper removed from our website, please contact us our Contact Us Page.

A Database of over Million Scholarly Resources. Start your Search Now

Sample Coursework Paper on CCJS 390
What is the incident response cycle? Compare and contrast its various phases? Do you think any one of the phases is more important than the others? Why or why not?

            Incident response cycle refers to a series of stages undergone by a security event starting from the point of its identification as a security incident or compromise, up to the point at which it is reported and resolved (Andreasson, 2012).

Incident Response Cycle Phases:

  1. Identification: Here, the information security office identifies potential information security issues from diverse sources such as contact from system owners, impacted or affected parties, or external parties.
  2. Assessment and classification: the situation is assessed by the information security office (ISO) to determine if it should be categorized as an incident or event (Andreasson, 2012).
  3. Determining the severity of incident: ISO assesses the potential and scope from each incident. The severity of an incident depends on the likely threat that it poses to other services and resources (Appel, 2014).
  4. Containment and Eradication: Following the successful identification of an incident, the relevant security personnel endeavors to isolate the equipment affected as a way of overcoming secondary attacks or threats
  5. System Restoration: this entails taking the appropriate steps to ensure that the secured system has been reconnected to the network   

            While all these steps are crucial, I feel that the identification phase carries more weight because failure to make the correct diagnosis may mean that the problem will not be solved.

The second key finding detailed in the 2013 US State of Cybercrime Survey was, “Many leaders underestimate their cyber-adversaries’ capabilities and the strategic financial, reputational, and regulatory risks they pose.” How can this possibly still be the case in this day and age, where the information resources available to leaders are so varied and thorough?

            While leaders have access to thorough and varied information resources, majority of them underestimate the capabilities of cyber-adversaries and the resultant reputational, regulatory, and strategic financial risks that they pose. This is because most of the leaders do not fully understand the ecosystem-wide risks posed by cybercrime (PWC, 2013). In addition, most leaders are not acquainted with how to integrate information-sharing and threat intelligence into elaborate and proactive defense programs against cyber attacks. Also, leaders have limited knowledge to enable them to identify and mitigate cyber attacks effectively, while their effectiveness in understanding and application of cybersecurity technology is also wanting.

What do you think is the cause of this unfortunate underestimation?

            Majority of the leaders have no idea that the environment is getting increasingly hostile. Consequently, they only tend to take action when it is already too late, after counter-attacks have occurred.  This is partly due to the fact that most companies rarely appreciate the importance of assessing risks before a disaster has struck. In addition, we also have a number of leaders who may not be in a position to have access to the company’s cyber-security strategy. In addition, such leaders may also have limited access to the response information to cyber-security that the company has put in place (Appel, 2014). Alternatively, these leaders could lack a direct connection with the law enforcement liaison process that the company has put in place.

 And, more importantly, what types of things would you recommend to a leader in your organization to help correct this deficiency, and why?

            To correct the above deficiency, the following recommendations have been made to organizations when dealing with issues of cyber-security. There is need for leaders of an organization to play a leading role in ensuring that they receive fundamental cyber-security education. They get acquainted with the risks that cyber-security attacks pose for the organization, and this will motivate them to seek remedial actions to deal with such threats, including effective monitoring of potential security threats to the organization. In addition, this will also inculcate the need for such leaders to collaborate with various government agencies in various nation-wide cyber-security strategies, as a way of protecting the organization from potential external threats.








Andreasson, K.J. (2012). Cybersecurity: Public Sector Threats and Responses. Roca Baton, FL.: CRC Press.

Appel, E.J. (2014). Cybervetting: Internet Searches for Vetting Investigations, and Open-Source

            Intelligence, Second Edition.  Roca Baton, FL.: CRC Press.

PWC (2013). Key findings from the 2013 US State of Cybercrime Survey.








Sharing is: CARING

Are you looking for homework writing help? Click on Order Now button below to Submit your assignment details.

Homework Writing Help
We Can Help you with this Assignment right now!
Sample Coursework Paper on CCJS 390

Are you looking for homework writing help on (Sample Coursework Paper on CCJS 390)?Well you can either use the sample paper provided to write your paper or you could contact us today for an original paper. If you are looking for an assignment to submit, then click on ORDER NOW button or contact us today. Our Professional Writers will be glad to write your paper from scratch.


We ensure that assignment instructions are followed, the paper is written from scratch. If you are not satisfied by our service, you can either request for refund or unlimited revisions for your order at absolutely no extra pay. Once the writer has completed your paper, the editors check your paper for any grammar/formatting/plagiarism mistakes, then the final paper is sent to your email.

Privacy| Confidentiality

Sample Coursework Paper on CCJS 390

We do not share your personal information with any company or person. We have also ensured that the ordering process is secure; you can check the security feature in the browser. For confidentiality purposes, all papers are sent to your personal email. If you have any questions, contact us any time via email, live chat or our phone number.

Our Clients Testimonials

  • I appreciate help on the assignment. It was hard for me but am good to go now

    Impact of pollution on Environment
  • Am happy now having completed the very difficult assignment

    Creative Message Strategies
  • Your writer did a fine job on the revisions. The paper is now ok

    Ethics: Theory and Practice
  • The paper was so involving but am happy it is done. Will reach you with more assignments

    Title: Privatization in or of America
  • I expected perfection in terms of grammar and I am happy. Lecturer is always on our head but was pleased with my paper. Once again, thanks a lot

    Title: Bundaberg Inquiry
  • The paper looks perfect now, thank to the writer

    Health Care Systems
  • You helped me complete several other tasks as you handled paper. wonna thank you

    Critique Paper on Political Change

Related Articles

Sample Coursework Paper on CCJS 390

Analyze the Nursing Roles in providing Comprehensive care in a Variety of Community Health Settings

Community Settings This week’s graded topics relate to the following Course Outcomes (COs). CO3: Plan prevention and population-focused interventions for vulnerable populations using professional clinical judgment and evidence-based practice. (POs...
Read More

Case Study Assignment on Ethical Issues in Asia-Pacific business

Case study assignment on Ethical Issues in Asia-Pacific business For this assignment, students will write a case study report in 2,000 words based on a case identified with circumstance or...
Read More

Sample Report Paper on The proposed reward system and strategy for the big city university

A good reward system should motivate workers. It should also attract and retain the same workers. On the contrary, a bad reward system does not do either of these things....
Read More

Management of PCOS through Homoeopathy-A case report

Introduction PCOS is the acronym for Polycystic Ovarian Syndrome. It is the most common endocrine disorder of women in their reproductive period manifested by irregular menstrual cycles and polycystic ovaries,...
Read More

Get more from us…

Would you like this sample paper to be sent to your email or would you like to receive weekly articles on how to write your assignments? You can simply send us your request on how to write your paper and we will email you a free guide within 24-36 hours. Kindly subscribe below!

Email Address: