Q: 11
Scenario 7: CyTekShield
CyTekShield based in Dublin. Ireland, is a cybersecurity consulting provider specializing in digital risk
management and enterprise security solutions. After facing multiple security incidents.
CyberTekShield formed expanded its information security team by bringing in Sadie and Niamh as
part of the team. This team is structured into three key divisions: incident response, security
architecture and forensics
Sadie will separate the demilitarized zone from CyTekShield's private network and publicly accessible
resources, as part of implementing a screened subnet network architecture. In addition, Sadie will
carry out comprehensive evaluations of any unexpected incidents, analyzing their causes and
assessing their potential impact. She also developed security strategies and policies. Whereas
Niamh. a specialized expert in forensic investigations, will be responsible for creating records of
different data for evidence purposes To do this effectively, she first reviewed the company's
information security incident management policy, which outlines the types of records to be created,
their storage location, and the required format and content for specific record types.
To support the process of handling of evidence related to information security events. CyTekShield
has established internal procedures. These procedures ensure that evidence is properly identified,
collected, and preserved within the company CyTekShield's procedures specify how to handle
records in various storage mediums, ensuring that all evidence is safeguarded in its original state,
whether the devices are powered on or off.
As part of CyTekShield's initiative to strengthen information security measures, Niamh will conduct
information security risk assessments only when significant changes are proposed and will document
the results of these risk assessments Upon completion of the risk assessment process, Niamh is
responsible to develop and implement a plan for treating information security risks and document
the risk treatment results.
Furthermore, while implementing the communication plan for information security, the
CyTekShield's top management was responsible for creating a roadmap for new product
development. This approach helps the company to align its security measures with the product
development efforts, demonstrating a commitment to integrating security into every aspect of its
business operations.CyTekShield uses a cloud service model that includes cloud-based apps accessed
through the web or an application programming interface (API). All cloud services are provided by
the cloud service provider, while data is managed by CyTekShield This introduces unique security
considerations and becomes a primary focus for the information security team to ensure data and
systems are protected in this environment.CyTekShield uses a cloud service model that includes
cloud-based apps accessed through the web or an application programming interface (API). All cloud
services are provided by the cloud service provider, while data is managed by CyTekShield This
introduces unique security considerations and becomes a primary focus for the information security
team to ensure data and systems are protected in this environment.
Has CyTekShield appropriately addressed the handling of evidence related to information security
events?
Options
Discussion
B tbh, the scenario describes defined procedures for identifying, collecting, and preserving evidence so C feels like a distractor. No mention of missing training either so I don’t see how A fits. Pretty sure B is right here.
Its B, they’ve got solid procedures for handling and preserving evidence. I’m not 100% but based on what’s described here, looks like the policy covers all the basics. Someone double check if I missed something?
Be respectful. No spam.