StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Gem Infosys Incident-Response Policy - Coursework Example

Cite this document
Summary
The following coursework under the title "Gem Infosys Incident-Response Policy" dwells on the network security. As the author puts it, Gem Infosys company need to put in place necessary incident-response plan in order to prevent future network breakdowns…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
Gem Infosys Incident-Response Policy
Read Text Preview

Extract of sample "Gem Infosys Incident-Response Policy"

Gem Infosys Incident-response policyIntroduction Gem Infosys company need to put in place necessary incident-response plan in order to prevent future network breakdowns. The I.T department should have an incident response plan so that they can successfully respond to any future incidents of network breakdown. This may be done via a number of ways such as: reducing the number of systems severity, integrating the activities of Computer Security Incident Response Team (CSIRT), damage control, and having a well-defined incident response plan (Obaidat & Boudriga, 2007).

Formulate an incident-response policy to reduce network down in Gem Infosys Company A well-defined incident response plan for Gem Infosys Company should have the following policies. The first is the initial evaluation/assesm1ent.This entails determining whether an incident exists or not so that appropriate response established. The second policies involve defining the communication channel that will be followed to inform the leaders that an incident has identified. The third policy is risk/damage minimization.

This is where the risk of self replicating warms may be minimized by making sure that the workstation are disconnected from the hub to prevent further replication of warms. The fourth policy involve determining the severity of the warms attack as well as exact point of origin where those warms are coming from so that they can be contained. The fifth policy entails protecting the other systems against the identified security threats to avoid further losses. System security against warms may be enhanced by installing firewalls as well as transmitting organization data via secured networks.

The sixth policy involves system recovery. This is where; the data and information that was damage through network breakdowns may be recovered using special software’s such as Acronis. The seventh policy involves assessing the cost and damages caused by the incident for proper responses. Lastly but is updating the policies on regular basis so that they remain relevant to organization needs (Shimonski, 2003). Conclusion In order to prevent future net work breakdowns, Gem Infosys should carry out the following activities namely: reduce the number of systems severity, integrate the activities of Computer Security Incident Response Team (CSIRT), damage control, and having a well-defined incident response plan.

The Computer Security Incident Response Team (CSIRT) should formulate and monitor the incident response plan. This plan should contain the policies such as; evaluation, communication, risk minimization, severity of warms attack, protection, recovery, assessment, and regular system updating policies. ReferencesObaidat, M. S., & Boudriga, N. A. (2007). Security of e-systems and computer networks. Cambridge [u.a.: Cambridge Univ. Press.Shimonski.J.R. (2003). Make an Incident Response Plan.Retrieved:on 14.06.2014.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Gem Infosys Incident-Response Policy Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
Gem Infosys Incident-Response Policy Coursework Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1649896-see-requirement-below
(Gem Infosys Incident-Response Policy Coursework Example | Topics and Well Written Essays - 250 Words)
Gem Infosys Incident-Response Policy Coursework Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1649896-see-requirement-below.
“Gem Infosys Incident-Response Policy Coursework Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1649896-see-requirement-below.
  • Cited: 0 times

CHECK THESE SAMPLES OF Gem Infosys Incident-Response Policy

Geographic Information System

These funds must be spent before the formulation of the next year's budget.... Your supervisor tasks you to write a proposal for a single technology… Using the Library and other available resources, research a recent technological advancement that could be used to aid your department in any area, including the following: Geographic Information System technology can be employed in Your supervisor informs you that your department will have a significant amount of extra funds available at the end of the year....
2 Pages (500 words) Essay

Organizational Analysis

Information and communication technologies (ICT) have changed the landscape of business dramatically and created the second category of people according to the Putt's law (Putt 2006, p.... ), “Technology is dominated by two types of people- those who understand what they do not… Though communication and information technologies have facilitated the functioning of businesses and created competitive niches for many of the organizations, yet they fail to prove strategic in absence of proper How ICT has been beneficial and harmful to organizations has been addressed in this essay along with a discussion of how worker community is getting impacted and suggestive measures to improvise upon the use of strategic ICT in organizations....
5 Pages (1250 words) Essay

E-commerce and IT Industry

It also explains the Acceptable use policy and how to avoid problems related to IT projects like e-commerce.... Computers are of great economic benefit to most of their users.... No wonder new generations are growing up with them forming an essential part of their lives.... Most importantly, their… There is also increased movement of monetary transactions through the internet....
11 Pages (2750 words) Essay

Malware Attack Incident Response

To mitigate the severity of the occurrence and the net down time, the following policy is essential.... Among the key actions are the formulation of a security response team and a policy on the recovery process.... In the policy, the recovery team should monitor the disks and the computers for at least twenty-four hours to ensure they are working properly before they are transferred to the end users in the organization.... Prepared policy is more important for it gives clear guidance to the response team on that they should do....
2 Pages (500 words) Case Study

Business Project Management - Boeing

The context of the problem is that America shares a huge border with Mexico (about 2000 miles long) and Canada.... The problem of illegal immigrants, drug trafficking and human trafficking has been haunting the… Concrete solution at this point is mandatory.... One solution is to build a sealed borderline, therefore, any movement across the border can be monitored properly. Department of Homeland Security (DHS), the Government of the United States, the The multibillion-dollar contract for sealing the border is called Secure Border Initiative Net (SBInet)....
11 Pages (2750 words) Essay

The Inhumanity of the Death Penalty in Truman Capotes In Cold Blood

The paper "The Inhumanity of the Death Penalty in Truman Capote's In Cold Blood" highlights that Capote is found opposing the death penalty placed on this case and rather proposes that it would have been more reasonable and satisfying deciding on a life sentence on the two.... hellip; In spite of the tragic accidents that both characters had endured, they deserved the penalty since they were involved in bloody activities....
6 Pages (1500 words) Research Paper

The importance of Ethics to Sustainable Growth in Engineering Enterprise

Individuals and organizations use IT resources for various purposes including communication, exchange of ideas, storage of data and for transactions.... For businesses, IT has become an… However, this has also come with security threats.... Haimes (2003) notes that organizations have been forced to invest heavily in security measures so as to mitigate the impact of such In the instances where security measures are inadequate, the consequences are usually catastrophic....
5 Pages (1250 words) Essay

The Role of Media in Reporting Cases of Police Brutality

The paper "The Role of Media in Reporting Cases of Police Brutality" states that the media has helped to highlight many cases of police brutality.... Despite this fact that it has been accused of neglecting its duty as an agent of communication transparency in politics.... hellip; Police brutality is a very difficult crime to persecute because of the fact that it is the law enforcement officers' duty to enforce the law....
7 Pages (1750 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us