This chapter’s opening scenario illustrates a specific type of incident/disaster.
Using a Web browser, search for information related to preparing an organiza-
tion against terrorist attacks. Look up information on (a) anthrax or another
biological attack (like smallpox), (b) sarin or another toxic gas, (c) low-level radiological con-
Using a Web browser, search for available commercial applications that use various forms of
RAID technologies, such as RAID 0 through RAID 5. What is the most common implemen-
tation? What is the most expensive?
Not too long ago, tape backup was the industry standard. Is it still? Using a Web browser or
your local library’s electronic-journal search tool, review the popular trade press journals to
determine whether tape, disk, or drive backups are more prevalent now and which is pre-
dicted to be the new standard in the near future.
4-1. Using a Web browser, identify at least five sources you would want to use
when training a CSIRT.
4-2. Using a Web browser, visit www.mitre.org. What information is provided
there, and how would it be useful?
4-3. Using a Web browser, visit www.securityfocus.com. What is Bugtraq, and how would it
be useful? What additional information is provided under the Vulnerabilities tab?
4-4. Using a Web browser, visit www.cert.org. What information is provided there, and how
would it be useful? What additional information is provided at www.cert.org/csirts/?
4-5. Using a Web browser, search for other methods employed by industry or government to
share information on possible incidents.
Answer each question in atleast one paragraph