Review the following resources to complete the assignment: USE THE TEMPLATE ATTA

Review the following resources to complete the assignment: USE THE TEMPLATE ATTACHED AND NO PLAGIARISM OR BAD GRAMMAR
NIST SP 800-61 Rev. 2: Computer Security Incident Handling Guide [PDF].
Data Integrity: Detecting and Responding to Ransomware and Other Destructive Events [PDF].
Suppose that you are the Incident Response Team Lead for a medium-sized organization. You have been alerted of a potential incident involving a suspected worm spreading via buffer overflow techniques, compromising Microsoft IIS& Web servers. As the IR Team leader, it is your responsibility to determine the next steps.
Write a 2–3 page paper in which you:
Research incidences of a buffer overflow attack on a Microsoft IIS Web server.
Develop a malicious code attack scenario using your research.
Populate the Week 2 Assignment Table Template [DOCX] with developed scenario content.The table is based on the format found in Table 4-3 of your textbook.
Discuss the incident recovery processes for the resolution of this incident.
Use at least three quality resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount