Nobody downloaded yet

Gem Infosys Incident-Response Policy - Coursework Example

Comments (0) Cite this document
The following coursework under the title "Gem Infosys Incident-Response Policy" dwells on the network security. As the author puts it, Gem Infosys company need to put in place necessary incident-response plan in order to prevent future network breakdowns…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful
Gem Infosys Incident-Response Policy
Read TextPreview

Extract of sample "Gem Infosys Incident-Response Policy"

Download file to see previous pages The first is the initial evaluation/assesm1ent.This entails determining whether an incident exists or not so that appropriate response established. The second policies involve defining the communication channel that will be followed to inform the leaders that an incident has identified. The third policy is risk/damage minimization. This is where the risk of self-replicating warms may be minimized by making sure that the workstation is disconnected from the hub to prevent further replication of warms. The fourth policy involves determining the severity of the warms attack as well as exact point of origin where those warms are coming from so that they can be contained. The fifth policy entails protecting the other systems against the identified security threats to avoid further losses. System security against warms may be enhanced by installing firewalls as well as transmitting organization data via secured networks. The sixth policy involves system recovery. This is where; the data and information that was damage through network breakdowns may be recovered using special software such as Acronis. The seventh policy involves assessing the cost and damages caused by the incident for proper responses. Lastly but is updating the policies on a regular basis so that they remain relevant to organization needs (Shimonski, 2003).
In order to prevent future network breakdowns, Gem Infosys should carry out the following activities namely: reduce the number of systems severity, integrate the activities of Computer Security Incident Response Team (CSIRT), damage control, and having a well-defined incident response plan. The Computer Security Incident Response Team (CSIRT) should formulate and monitor the incident response plan.  ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Gem Infosys Incident-Response Policy Coursework Example | Topics and Well Written Essays - 250 words”, n.d.)
Gem Infosys Incident-Response Policy Coursework Example | Topics and Well Written Essays - 250 words. Retrieved from
(Gem Infosys Incident-Response Policy Coursework Example | Topics and Well Written Essays - 250 Words)
Gem Infosys Incident-Response Policy Coursework Example | Topics and Well Written Essays - 250 Words.
“Gem Infosys Incident-Response Policy Coursework Example | Topics and Well Written Essays - 250 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Gem Infosys Incident-Response Policy


...and corruption of data. This resulted in a large opportunity cost savings. The total cost savings per incident due to no need of programmers and technical support were $ (45 * 3* 4 + 40 *1) i.e. $580. The cost saving per incident due to workers not sitting idle was $ (125 *4 *42) i.e. $ 21000. Also the cost saved per incident in reconstituting corrupted data was $ (.39 * 15) i.e. $5.85. This led to a total opportunity cost saving of $ (21585.85 * 24) i.e. $518060 per year. Similarly, an Infosys professional wrote a record comparison algorithm for PFS. The opportunity cost saving in penalty paid was $(360,000 * .01 *12) i.e. $43200 per year. The other cost savings in this...
11 Pages(2750 words)Essay

Computer Incident Response Teams

...from information damage, but also their clientele and reputation will nosedive in the industry. 2. CIRT Computer Incident Response Teams (short-form 'CIRT') are special teams formed for the purpose of minimizing and controlling the impact of a security breach or other computer related emergency in the company (Brussin, Cobb, & Miora, 2003). CIRT is a also known as CERT (Computer Emergency Response Teams) and CSIRT (Computer Security Incident Response Teams) in some companies, however, they all attempt to provide security to the computer systems. 3. Need for a CIRT It depends on the company policy as well as the riskiness of information...
4 Pages(1000 words)Essay

Critical Incident Logistic Response Structure

...Running Head: Critical Incident Logistic Critical Incident Logistic Response Structure [Institute's Critical Incident Logistic Response Structure An Incident and Command Response Structure can be used in case of any time of emergency from a flood to a terrorists attack. It is designed to synchronize all. The responding agencies so that they can work efficiently. It is supposed to be as flexible and adaptable as possible so that it can be adjusted to suit any situation. Any Incident and Command Response structure is required to have at least four groups of response...
4 Pages(1000 words)Essay

IDS Policy

... stage when Gem Infosys is installing an IDS a policy needs to be designed in order to make sure that responsibilities and processes are well defined. Procedures will be maintained for recognizing the security threats. Incidents will be classified as "non-serious" or "serious". If there is a problem of failing hardware, target network administration should be fully responsive that if network taps are used, even fail safe taps can take up to a second to re-negotiate with the interfaces and could upset the services. (Liepins, Vaccaro, 1992) Non-serious incidents policy When devising the policies Gem Infosys should know that Non Serious incidents include those activities in which the attack or threat is not purposely directed... at the...
2 Pages(500 words)Essay

Incident response policy

...Incident response policy for Gem Infosys Incident response policy for Gem Infosys Introduction In the existing IT environment, incidents are common and appropriate measures should be taken to tackle them. When Incidents occur it proves much costly to an organization. Proper incident response should be an integral part of your overall security policy and risk mitigation strategy. There are clearly direct benefits in responding to security and other incidents. However, there might also be indirect financial benefits. For a software company like Gem Infosys, a formal incident response plan might help win business, because it shows that you take seriously the process of good information security. This document will provide you... with a...
2 Pages(500 words)Essay

Incident Response Policy

...The Homeland Defense Policy The Homeland Defense Policy The United s Department of Defense’s main factions include leadingand administering all the American military forces including supporting their operations. This department coordinates all the army, air forces, marines, and navy in fighting wars, disaster management, peacekeeping, homeland security, and humanitarian aid. Therefore, the success for the department of defense policy, all the involved departments and bodies require to work and share crucial information that are of security concerns. Notably, the InfoSec Company has security policies that match with department of defense and the Homeland Defense...
1 Pages(250 words)Coursework

Digital Forensic Incident Response

...and determinants of the investigation is an essential part of completing the investigation successfully as well as ensuring that any further legal responsibility is shifted away from the IT firm and provided back to the recipient. References Ariffin, A., Slay, J., & Jazri, H. (2012). DIGITAL FORENSICS INSTITUTE IN MALAYSIA: THE WAY FORWARD. Digital Evidence & Electronic Signature Law Review, 951-57. Bulbul, H., Yavuzcan, H., & Ozel, M. (2013). Digital forensics: An Analytical Crime Scene Procedure Model (ACSPM). Forensic Science International, 233(1-3), 244-256. doi:10.1016/j.forsciint.2013.09.007 Garfinkel, S. L. (2013). Digital Forensics. American Scientist, 101(5), 370-377. Karie, N. M., & Venter, H. S. (2014). Toward...
8 Pages(2000 words)Research Paper

Gem Infosys

...Malware Attack Incidence Response Affiliation Incidence response Introduction The tackles the functions and membership of asecurity response team in case of a malware attack. Moreover, the paper gives highlights on the recovery process and the plan to maintain the malware free environment Malware attack is major incidence on the information systems in various organizations. Deterring and responding to the attack is important to keep the company from losing a lot more revenues. Two days net down is quite a long time for a company in business. That means the company lost so much revenue due to the inactivity of the systems. To mitigate the...
2 Pages(500 words)Case Study

Digital forensic incident response

...Topic: Digital Forensic Incident Response for American Marketing Systems Introduction In the current digital world, incidences in computer use continue to bear high probability to affect financial reports. The risks and uncertainties in compromise are increasing in volatility. There are high chances of making away with sensitive company information. Both the private and the public sectors have suffered massive loss in frauds, software compromise, online share frauds and other resources. They have experienced massive loss even after spending so much in putting up expensive system. As these threats increases, there is a need to bridge the gaps in system management as a way of reducing the...
10 Pages(2500 words)Research Paper

Toxic Chemical Agent Incident Response

.... It is a tool that is used for control, command and coordination of the emergency response to protect life, property, and the environment. The tool integrates procedures, policies, facilities, equipment and personnel into a common organizational structure that is specifically designed to improve the emergency response operations. Emergency response to methyl isocyanate gas leak through incident command system principles By applying the principles of the incident command system, management of disaster can occur smoothly without confusion. These principles occur in a systematic manner and functions to allow smooth rescue plan for...
5 Pages(1250 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Coursework on topic Gem Infosys Incident-Response Policy for FREE!

Contact Us