StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Malware Attack Incident Response - Case Study Example

Cite this document
Summary
The paper "Malware Attack Incident Response" discusses that swift action to deter it is very crucial. The prepared policy is more important because it gives clear guidance to the response team on what they should do. Hence, they will take minimal time in combating the incidence…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.7% of users find it useful
Malware Attack Incident Response
Read Text Preview

Extract of sample "Malware Attack Incident Response"

Deterring and responding to the attack is important to keep the company from losing a lot more revenues. Two days net down is quite a long time for a company in business. That means the company lost so much revenue due to the inactivity of the systems. To mitigate the severity of the occurrence and the net downtime, the following policy is essential. Among the key actions are the formulation of a security response team and a policy on the recovery process.

Response team development
The security response team will be designed to respond to any security breaches. The team members must be responsible and endeavor to work to prevent security breaches. They should be available anytime time and even stop any work they are doing that is underway to deal with the impending incident. The response team should be formed by the organizational employees. Each department should be represented in the response team to ensure a holistic approach in deterring the incidences. To function optimally, the team should be bestowed with the authority to make the decisions that are needed to prevent the threat or resolve the actual malware attack (Runciman, 2011).
The team should have a leader that will help in conducting and directing the affairs of the group. The team should be trained on the response activities that are involved in ensuring the security of the group. Key among them is staging fire drills. The internal exercises will be essential in determining the holes that can be the entry of the malware into the system. To save the cost of operating a team, the organization can hire an outside response team. It is much cheaper for the fact that the team will only have to deal with the actual security threats unlike the internal organization that has to deal with firewall management, changing user accounts and passwords, or reviewing log files. However, outsourcing the response team has its disadvantages for there is no effective and timely incidence response like in the case of the internal response team.

Recovery process
The disaster recovery process involves getting the files and programs that have been compromised back into use. The files and disks are loaded back into the servers for use again. In the policy, the recovery team should monitor the disks and the computers for at least twenty-four hours to ensure they are working properly before they are transferred to the end users in the organization.

Continuity plan
A business continuity plan is drawn from the follow-up made on the incident. There should be scrutiny of the instruction and detection of the incidences. There should be a recording keeping on the actions put in place and the outcomes. The information and the outcome will be useful in deterring further occurrences similar to the one that occurred in the process. The actions will be useful in preventing a similar incidence and even strategizing (Preda, Christodorescu, Jha, & Debray, 2008).

Conclusion
Net down can be compromising to the organization.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Gem Infosys Case Study Example | Topics and Well Written Essays - 500 words”, n.d.)
Gem Infosys Case Study Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1660324-gem-infosys
(Gem Infosys Case Study Example | Topics and Well Written Essays - 500 Words)
Gem Infosys Case Study Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1660324-gem-infosys.
“Gem Infosys Case Study Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1660324-gem-infosys.
  • Cited: 0 times

CHECK THESE SAMPLES OF Malware Attack Incident Response

Aviation Security Prerequisites

Moreover, this type of attack saves a considerable amount of scanning time by only attacking a visible target.... In the context of any cyber threat to an airport, the airport cannot be the primary target, as the Spanair flight JK5022 crash was successful by one of the contributions from malware (Markarian, Kolle, & Tarter, n....
12 Pages (3000 words) Essay

Information Security Management

incident response management and disaster recovery Components of an incident: Before the discussion of an incident management system it is vital to understand what an incident is and what the components of an incident are.... An incident comprises of three components event, incident response team and incident investigation (Molino, 2006).... An incident is an event that occurs due to an action that is executed by a person or an individual.... Information security management not only allows an organization to tackle security threats that it faces but also allows it to measure the impact the attack would have on the performance of the business (Alexander, Finch, & Sutton, 2008)....
18 Pages (4500 words) Research Proposal

The Extent of My Organizations Vulnerability to Malware

112) this type of IA embraces all of these as "(a) boundary controllers, such as firewalls and access control, (b) intrusion detection and (c) threat/attack/intrusion response.... Sometimes, however, whether intentional or unintentional, the attack may come from within.... The author of "The Extent of My Organization's Vulnerability to malware" paper states that the implementation of the defense-in-depth system contributed to the increased securitization of the company from malware attacks....
4 Pages (1000 words) Essay

Social Engineering: Examining the Latest Scams

The essay "Social Engineering: Examining the Latest Scams" focuses on tech critical analysis of the idea of social engineering.... In this scenario, this research is aimed to assess some of the main web-based scams that make security much harder to manage proficiently.... ... ... ... In the scenario of computer security, social engineering is a paradigm that illustrates a non-technical type of interruption that depends significantly on human interaction as well as frequently engages scamming other people to break standard security measures....
17 Pages (4250 words) Essay

Incident response policy

Proper incident response should be an integral part of your overall security policy and risk mitigation.... The value of forming a security incident response team with explicit team member incident response policy for Gem Infosys incident response policy for Gem Infosys Introduction In the existing IT environment, incidents are common and appropriate measures should be taken to tackle them.... Proper incident response should be an integral part of your overall security policy and risk mitigation strategy....
2 Pages (500 words) Essay

A Forensic Investigative Response Approach for Suspected Security Breach

The paper "A Forensic Investigative response Approach for Suspected Security Breach" summarizes that the security advisor should monitor all business systems for any security lapses, document the entire episode of hacking and list the security incidents, educate employees about security awareness.... pecific forensic response planBy engaging a well-experienced external forensic investigator, a company can know the nature of the data exposure.... One can witness huge economic losses if there is an attack on ICT systems used by the industries....
6 Pages (1500 words) Case Study

Cyber Security in Business Organizations

The paper "Cyber Security in Business Organizations" highlights that the attack is an example of poor information security management despite having one of the most powerful cyber security software.... Target's investment into the malware detection software by FireEye was legitimate....
5 Pages (1250 words) Case Study

Critical Incident Response Analysis

This paper, Critical incident response Analysis, highlights that critical incidents occur in situations of crisis and disaster and are caused by a naturally occurring phenomenon like cyclones, earthquakes or man-made ones like terrorist activities, transportation disasters etc.... As the discussion stresses, crisis management and preparing and delivering a Critical incident response comprise of some of the most essential tasks that governments, law and order agencies and other crime-fighting agencies have to be well equipped to undertake....
12 Pages (3000 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us