Back to School Offer

Get 20% of Your First Order amount back in Reward Credits!

Get 20% of Your First Orderback in Rewards

All papers examples
Get a Free E-Book! ($50 Value)
HIRE A WRITER!
Paper Types
Disciplines
Get a Free E-Book! ($50 Value)

Incident Handling Procedures, Essay Example

Pages: 2

Words: 612

Essay

Incident Response

Incident handling procedures are not similar as they vary on different business processes of the organization. Network dictionary defines incident handling as “Incident Handling is an action plan for dealing with intrusions, cyber-theft, denial of service, fire, floods, and other security related events. It is comprised of a six-step process: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned”. Depending on the nature of business, processes can be associated with law enforcement agencies, government institutions, public information providers, information technology etc. in order to handle security incident within the organizations, teams are created that are called as incident response teams. As per network dictionary, “Incident response team refers to a group of people who are responsible for handling information security incidents when they occur”. Incident handling is an essential process as security incidents that are initiated in organizations, breach data servers containing confidential and mission critical data and disrupt business processes. The impact of these incidents provides severe losses in terms of organization reputation in the market, trust in customers and credibility.

Advantages

Intrusion detection system aligns with the business objectives by an efficient alert mechanism that indicates probable threats. An ID also enables the incident management team to monitoring the network on a 24 by 7 basis. However, in order to be updated, there is a requirement of updating the IDS with new threat profiles or signatures for detecting new threats. Whenever, an alert is generated by IDS, it is examined by IDS expert, who is the part of incident management team. Furthermore, there is no requirement for maintaining IDS from the client side, as deployment is conducted by IDS expert with minimum contribution from organization employees. Incident management team performs action on each incident as per the severity level and business impact. In addition, one more powerful feature of IDS is the detection of violation of policies. This feature reports or alerts the incident management team for any breach in policy that can be detected and rectified at the earlier stage (Above security – information risk management – managed security services – PCI DSS – intrusion test – 24/7 – security architecture – IDS/HIDS – ).

Auditing

The first step for auditing a computer network is to define the scope or boundaries of Audit i.e. constructing asset lists and a security boundary. The second step is to develop a threat list i.e. to indicate ‘what are the threats that will exploit vulnerabilities to attack critical business assets?’ The third step is associated with predictable threats. Auditors must not only indicate current threats but threats that may occur in future also. After defining the scope, identifying current and probable threats, fourth step is associated with prioritizing vulnerabilities and threats, as per business impact and value (10 steps to creating your own IT security audit – IT security, n.d ). After prioritizing, the next step includes the implementation of IDS and network access controls i.e. access control list, digital signatures, encryption, hashing etc. After implementing IDS and network access controls, access management is essential for granting role bases access to users on network services and applications (10 steps to creating your own IT security audit – IT security, n.d ). Furthermore, creating backups, email filtering and protecting information assets from physical assets are considered (10 steps to creating your own IT security audit – IT security, n.d ).

References

Incident handling. (2007). Network Dictionary, , 342-342.

Incident response team. (2007). Network Dictionary, , 242-242.

Above security – information risk management – managed security services – PCI DSS – intrusion test – 24/7 – security architecture – IDS/HIDS – Retrieved 10/24/2011, 2011, from http://www.abovesecurity.com/?lang=En

10 steps to creating your own IT security audit – IT security n.d Retrieved 10/24/2011, 2011, from http://www.itsecurity.com/features/it-security-audit-010407/

Time is precious

Time is precious

don’t waste it!

Get instant essay
writing help!
Get instant essay writing help!
Plagiarism-free guarantee

Plagiarism-free
guarantee

Privacy guarantee

Privacy
guarantee

Secure checkout

Secure
checkout

Money back guarantee

Money back
guarantee

Related Essay Samples & Examples

Emerging Concepts in Therapies for Autism Spectrum Disorder, Essay Example

Autism spectrum disorder, abbreviated as ASD, is a neuro-developmental disorder caused by brain differences. ASD is characterized by chronic difficulties in social communication that causes [...]

Pages: 3

Words: 949

Essay

Alice’s Adventures in Wonderland, Essay Example

As an episodic novel, Carroll’s book offers more insight into the characters and situations they encounter than it does into the story. The events of [...]

Pages: 5

Words: 1412

Essay

Building Leaders Up, Essay Example

Leadership Definition Leadership refers to the ability of an individual to influence, motivate, and guide other individuals or groups to achieve common goals. Leaders typically [...]

Pages: 9

Words: 2441

Essay

Relationship Conflict, Essay Example

Conflict is a natural and inevitable part of any relationship. It arises when two or more people have different goals, needs, or perceptions. The most [...]

Pages: 6

Words: 1621

Essay

Aristotle’s Concepts of Catharsis and Tragic Pleasure, Essay Example

Aristotle indicates in the first passage that producing a cathartic effect is a crucial element when it comes to constructing a tragedy. In the second [...]

Pages: 1

Words: 280

Essay

African – American History: Black American Cinema, Essay Example

Black American Cinema is about criticism of films produced by black Americans. This is the first inclusive collection of African American cinema critiques. From the [...]

Pages: 4

Words: 1012

Essay

Emerging Concepts in Therapies for Autism Spectrum Disorder, Essay Example

Autism spectrum disorder, abbreviated as ASD, is a neuro-developmental disorder caused by brain differences. ASD is characterized by chronic difficulties in social communication that causes [...]

Pages: 3

Words: 949

Essay

Alice’s Adventures in Wonderland, Essay Example

As an episodic novel, Carroll’s book offers more insight into the characters and situations they encounter than it does into the story. The events of [...]

Pages: 5

Words: 1412

Essay

Building Leaders Up, Essay Example

Leadership Definition Leadership refers to the ability of an individual to influence, motivate, and guide other individuals or groups to achieve common goals. Leaders typically [...]

Pages: 9

Words: 2441

Essay

Relationship Conflict, Essay Example

Conflict is a natural and inevitable part of any relationship. It arises when two or more people have different goals, needs, or perceptions. The most [...]

Pages: 6

Words: 1621

Essay

Aristotle’s Concepts of Catharsis and Tragic Pleasure, Essay Example

Aristotle indicates in the first passage that producing a cathartic effect is a crucial element when it comes to constructing a tragedy. In the second [...]

Pages: 1

Words: 280

Essay

African – American History: Black American Cinema, Essay Example

Black American Cinema is about criticism of films produced by black Americans. This is the first inclusive collection of African American cinema critiques. From the [...]

Pages: 4

Words: 1012

Essay

Get a Free E-Book ($50 in value)

Get a Free E-Book

How To Write The Best Essay Ever!

How To Write The Best Essay Ever!