all papers written from scratch

24/7/365 support

no plagiarism - GUARANTEED

Free Incident Response Strategic Decisions Essay Sample

← Mobile Photo Studio Software Comparison →

Buy Cheap Incident Response Strategic Decisions Essay

It is essential to consider that proper incident response is input as an integral part of the overall security policy and risk mitigation plan. The steps that would be essential to respond to this potential risk would involve:

  • Minimize the severity and number of potential incidents; it is essential to prevent security issues, though sometimes the prevention is not 100%; however, a regular check-up and documentation can assist in narrowing the incident case and minimize the severity in time.
  • Assemble the core computer security incident team to assist in handling the situation as quick as possible (Stewart et al., 2012). They do this by determining the source of incident either by interrogating whoever discovered the worm for more information or carrying out an independent investigation.
  • Define the incident response plan or strategy. IR team members must be aware of the strategy of handling the incident through identification, assessment, communication, evident protection, and compilation of incident documentation.
  • Last step is to prevent damage and minimize the risks. This is achieved through a quick response to the incident situation and managing it properly by the responsible team (Stewart et al., 2012).

In summary, the steps involve discovery, documentation, notification, acknowledgement, containment investigation, resolution, and closure (Vacca, 2013).

A process-flow diagram illustrating the processes for determining if notification of the incident must be related to upper management

The chart describes the process of notification during an incidence response. It is important to note that every level is notified for the proper documentation and implementation process of IR.

The Incident Recovery Processes for the Resolution

This best practice gives the requirements for the formation and containment of the Incident Response Process (IRP) essential to guard the integrity, confidentiality, and availability of the organization’s data and information procedures. The Position of Authority for Information processes or department for each respective organization are accountable for the development of the Standard Operating Procedure (SOP) and the Incident Response Process (IRP) (Prosise & Mandia, 2003).

      An IRP is created to accomplish the following objectives:

  • Substantiate whether an incident has happened
  • Promote the build-up of correct information
  • Institute controls for the appropriate retrieval and management of evidence
  • Minimize disturbance to business operations and network functions
  • Permit for lawful enforcement and actions against culprits
  • Give precise reports and functional recommendations (Prosise & Mandia, 2003).  

The incident recovery process involves identification of the scope of incidence and related risks. Resources together with the personnel responsible for incident response are noted immediately for a proper containment and resolution. Pre-incident preparation is expected to be done before the actual occurrence (Prosise & Mandia, 2003). This is a means of ensuring business continuity after a disaster occurrence. All employees are involved in disaster management in one way or the other. The Incident Response Process in every organization or institute is facilitated by the classification of the data or information as defined in the data categorization strategy, as well as the categorization of the systems used, as classified in the System Taxonomy Policy. Higher stages of classification necessitate higher standards of responsibility.

Conclusion

Preparation is a key step in IR and must be done prior to the incidence so as to ensure the proper incidence response process.

References

  1. Prosise, C., & Mandia, K. (2003). Incident response & computer forensics: [Contains all-new    forensics content and real-world scenarios]. New York, NY [u.a.: McGraw-Hill/Osborne.
  2. Stewart, J. M., Chapple, M., & Gibson, D. (2012). CISSP. Hoboken: John Wiley & Sons.
  3. Vacca, J. R. (2013). Computer and information security handbook. Amsterdam: Morgan Kaufmann Publishers is an imprint of Elsevier.

Related essays

  1. Software Comparison
  2. Mobile Photo Studio
  3. Remote RADIUS Server Groups
15% first order  Order now  close
Close