Help with web post and responses 5

Research post topic and submit 260 word post on the given topic, indicate at least one source or reference in your original post. This assignment is to be scholarly; it is not enough for you to simply post your article and add cursory reviews. CITED REFERENCES ARE REQUIRED. Also create replies for given 2 posts, each reply should be seperate and should be 260 words. Include at least 260 words in your posting and at least 260 words in your reply.

Post Topic:
Search “” or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end-user decision to report (or not report) a potential incident?  

Don't use plagiarized sources. Get Your Custom Essay on
Help with web post and responses 5
Just from $13/Page
Order Essay

Reply to following posts with at least 260 words and a 1 citation
Post 1:
End users will be having the asset which was the greatest one to the team of CSIRT. They have to handle incidents in which organization will be preventing the security of an organization. The incident which has been identified will be reported. At this type of point, the action will be taken for the purpose of identifying the cause of the incident and also for the purpose of determining the incident. If this was a problem of an operational or will be validating incident for the purpose of justifying incident this as belonging to an organization. In the phase of identification, the incident of a security will be declared in the way of formal and this has to be identified (Adler, 2011).
The resources of security will be attempted for the purpose of limiting the damage of an incident which has been caused to an organization. These resources also will be limiting the impacts of an incident. End users will be continuing for the purpose of isolating the cause of an incident in an organization. In this type of security will be where the resources of security will be trying for the purpose of arresting the incident which has been caused to the security of an organization. These resources will be stopping this type of propagation and this will be done through the environment (Kloeffer, 2011).
As the business will be growing and devices will be added to the network then the bandwidth will be stretched to capacity. If the worker will be using different types of devices then each will be taking its share about capacity. Computers will be cleaning and malware will be coming to the capacity of the network. In an environment end users will be uneducated about the applications which were safe. Not all traffic which was on the network of business will be related to business. Some of the tools will be slowing the activity of network as the systems will be seeking and they will be also collecting data. This will be including software nothing but like CRM and software will be designed for the purpose of evaluating operations which are automated (Patrick, 2014).

Adler, C., Krüsmann, M., Greiner-Mai, T., Donner, A., Mulero Chaves, J., & Via Estrem, À. (2011). IT-supported management of mass casualty incidents: The e-Triage project.
Kloeffer, M., Krimmel, S., Subat, J., Erdtmann, U., Mueller, M., & Downham, L. (2011). U.S. Patent No. 7,930,681. Washington, DC: U.S. Patent and Trademark Office.
Patrick, R., Key, C., & Holzberger, P. (2014). U.S. Patent No. 8,850,565. Washington, DC: U.S. Patent and Trademark Office.

Post 2:
Role of End-Users in Incident Management
    End users are the people for whom the hardware or software is built. Incidents are raised when there is an unplanned break to the IT service or any issue found in the quality of the end product. The incident will alert the service team to work on the issue and make the necessary restoration to bring the system back on track. Incident management is the process of managing the incident. The scope of the incident starts with end users reporting the issue and the service team resolving the problem statement within agreed service level agreements. 
    End-users are the real stakeholders who face the disrupt services. They file the incidents in the incident management to report a ticket against the issue. This ticket is used for tracking purposes as well as setting the time limit for resolving the matter with time. The end user is the basic source of evidence to report the live happening of any incident. Anybody who is contacted later on will depend on memory or can use their probable guess or prediction to state the issue (Kaiser, 2018). Unless there is a developed software to detect the malware of the end product, the end-users, that is there should be human evidence to prove that there is a break in the service. End users should be motivated to report any suspicious situation.
     The uncovering of events brings clarity both to the business and the technical team. It proves to be as a learning curve for both the team if the issue is unknown (Agrawal,2017). A big part of the job of the end users is to identify the weak areas which are prone to system failure. If they feel that some part is not adhering to normal behavior, they can report an incident. Even if the incident happens to be a blooper, yet the end-users will have insights about the issue a can apply in business in future issues.
Factors to determine a potential incident
    Anybody uses the system daily can understand the daily behavior of the machine. Any doubt that the system is not working to its potential can cause heavy loss to the system. To bypass the prospective dangers, an end user must report immediately. But before classifying the situation as dangerous, the end user must do the necessary investigation. They must comprehend the situation and understand all the business requirements based on which the referred service was built. If the situation calls for change in the requirement, then it should not be raised as an incident but as a service request. If the system is reacting outside of its nature, they must report it with no further delay. 
   Before the report of the incident is made to the system, the end-users actually plays a vital role in limiting the issue from spreading even further (Massey,2016). This can safeguard the company assets if the end-users act wisely before the service management team can jump in. If corrective actions are not taken on the required time, then the system can crash down. End users play a critical role by not letting the issue propagate through the rest of the system. If reported on time, the service management team can isolate the problem area until it is cured.
Agrawal, V. K., Agrawal, V. K., Seshadri, S., & Taylor, A. R. (2017). TRENDS IN IT HUMAN RESOURCES AND END-USERS INVOLVED IN IT APPLICATIONS. Journal of International Technology and Information Management, 26(4), 154-188.
Brown, S. A., Massey, A. P., & Ward, K. W. (2016). Handle mergers and acquisitions with care: the fragility of trust between the IT-service provider and end-users. European Journal of Information Systems, 25(2), 170-186.
Kaiser, A. K. (2018). Incident Management Adaption. In Reinventing ITIL® in the Age of DevOps (pp. 163-199). Apress, Berkeley, CA.

Post 3:
The end user will be one of the observers for the info what the providing in the last statement the particulars will be composed by the operator from the occurrence which is confronted in the association. Events do not occur deprived of any aim so the end user should be cautious while analyzing the exact reason behind that incident more ever they if they deliver an exact goal then the organization effort must be a slight bit informal that they cannot over not recurrence in next steps (Peter, 2017). If the end operator story that then only they can decrease the injury then those type of errors will be complete recurrently if the end operator doesn’t do that they can be prepared to bear more occurrence that will be minor or enormous founded on the event. If the end operator account that then that will be very obliging to decrease the occurrences seriously if those events are correct then that will be upright to know info that information will be used may be in any another fight to assistance them out (Husmann,2008).
Based on the account which was acquiesced by the journalism team will be in the good way once if there is any info which was comprised to the concluding account to the finish user the reportage side can have admittance to talk by the end user. They can enhance that the end operator types sure that the unwelcome info will be summary or detached from the intelligences since to decrease the space of the text (Fetherston, 2015). The end operator will produce the story founded on their empathetic if there is a battle among the end operator empathetic and the occurrence it is our accountability to clarify the careful state by if the appropriate info only formerly only. We can evade the battle among the reportage squad and condition worker opinion if they become the clear image the concluding account will be providing with careful info (Ruighaver,2013).
Husmann,(2008). End Users: Assets or Liabilities When Handling a Cyber Incident? Retrieved from
Ruighaver, (2013). Incident response teams–Challenges in supporting the organizational security function. Computers & Security

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more
Live Chat 1 763 309 4299EmailWhatsApp

Order your essay today and save 15% with the discount code GINGER