.

Tuesday, June 11, 2019

Gem Infosys Incident-Response Policy Coursework Example | Topics and Well Written Essays - 250 words

treasure Infosys Incident-Response Policy - Coursework ExampleThe first is the initial evaluation/assesm1ent.This entails determine whether an incident exists or not so that appropriate response established. The second policies involve defining the communication channel that will be followed to inform the leaders that an incident has identified. The third form _or_ system of government is put on the line/damage minimization. This is where the risk of self-replicating warms may be minimized by making sure that the workstation is disconnected from the hub to prevent further replication of warms. The fourth policy involves determining the severity of the warms attack as nearly as exact point of origin where those warms are coming from so that they can be contained. The fifth policy entails protecting the other systems against the identified security threats to avoid further losses. System security against warms may be enhanced by installing firewalls as well as transmitting organiza tion data via secured networks. The sixth policy involves system recovery. This is where the data and information that was damage through network breakdowns may be recover using special software such as Acronis. The seventh policy involves assessing the cost and damages caused by the incident for proper responses. Lastly but is update the policies on a regular basis so that they remain relevant to organization needs (Shimonski, 2003).In order to prevent future network breakdowns, Gem Infosys should carry out the following activities namely reduce the number of systems severity, integrate the activities of Computer Security Incident Response Team (CSIRT), damage control, and having a open incident response plan. The Computer Security Incident Response Team (CSIRT) should formulate and monitor the incident response plan.

No comments:

Post a Comment