Tuesday, February 4, 2020
Gem Infosys Incident-Response Policy Coursework Example | Topics and Well Written Essays - 250 words
Gem Infosys Incident-Response Policy - Coursework Example The first is the initial evaluation/assesm1ent.This entails determining whether an incident exists or not so that appropriate response established. The second policies involve defining the communication channel that will be followed to inform the leaders that an incident has identified. The third policy is risk/damage minimization. This is where the risk of self-replicating warms may be minimized by making sure that the workstation is disconnected from the hub to prevent further replication of warms. The fourth policy involves determining the severity of the warms attack as well as exact point of origin where those warms are coming from so that they can be contained. The fifth policy entails protecting the other systems against the identified security threats to avoid further losses. System security against warms may be enhanced by installing firewalls as well as transmitting organization data via secured networks. The sixth policy involves system recovery. This is where; the data an d information that was damage through network breakdowns may be recovered using special software such as Acronis. The seventh policy involves assessing the cost and damages caused by the incident for proper responses. Lastly but is updating the policies on a regular basis so that they remain relevant to organization needs (Shimonski, 2003). In order to prevent future network breakdowns, Gem Infosys should carry out the following activities namely: reduce the number of systems severity, integrate the activities of Computer Security Incident Response Team (CSIRT), damage control, and having a well-defined incident response plan. The Computer Security Incident Response Team (CSIRT) should formulate and monitor the incident response plan.Ã
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.