Free

Gem Infosys - Case Study Example

Comments (0) Cite this document
Summary
Moreover, the paper gives highlights on the recovery process and the plan to maintain the malware free environment
Malware attack is major incidence on the information systems in…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful
Gem Infosys
Read TextPreview

Extract of sample "Gem Infosys"

Malware Attack Incidence Response Affiliation Incidence response Introduction The tackles the functions and membership of asecurity response team in case of a malware attack. Moreover, the paper gives highlights on the recovery process and the plan to maintain the malware free environment
Malware attack is major incidence on the information systems in various organizations. Deterring and responding to the attack is important to keep the company from losing a lot more revenues. Two days net down is quite a long time for a company in business. That means the company lost so much revenue due to the inactivity of the systems. To mitigate the severity of the occurrence and the net down time, the following policy is essential. Among the key actions are the formulation of a security response team and a policy on the recovery process.
Response team development
The security response team will be designed to respond to any security breaches. The team members must be responsible and endeavor to work in order to prevent security breaches. They should be available anytime time and even stop any work they are doing that is underway in order to deal with the impending incidence. The response team should be formed by the organizational employees. Each department should be represented in the response team to ensure a holistic approach in deterring the incidences. In order to function optimally, the team should be bestowed with the authority to make the decisions that are needed in order to prevent the threat or resolve the actual malware attack (Runciman, 2011).
The team should have a leader that will help in conducting and directing the affairs of the group. The team should be trained on the response activities that are involved in ensuring security of the group. Key among them is staging fire drills. The internal exercises will be essential in determining the holes that can be the entry of the malware into the system. In order to save the cost of operating a team, the organization can hire an outside response team. It is much cheaper for the fact that the team will only have to deal with the actual security threats unlike the internal organization that has to deal with firewall management, changing user accounts and passwords, or reviewing log files. However, outsourcing the response team has its disadvantages for there is no effective and timely incidence response like in the case of the internal response team.
Recovery process
The disaster recovery process involves getting the files and programs that have been compromised back into use. The files and disks are loaded back into the servers for use again. In the policy, the recovery team should monitor the disks and the computers for at least twenty-four hours to ensure they are working properly before they are transferred to the end users in the organization.
Continuity plan
A business continuity plan is drawn from the follow-up made on the incidence. There should be scrutiny of the instruction and detection of the incidences. There should be recording keeping on the actions put in place and the outcomes. The information and the outcome will be useful in deterring further occurrences similar to the one that occurred in the process. The actions will be useful in preventing a similar incidence and even strategizing (Preda, Christodorescu, Jha, & Debray, 2008).
.
Conclusion
Net down can be compromising to the organization. Therefore, swift action to deterring it is very crucial. Prepared policy is more important for it gives clear guidance to the response team on that they should do. Hence, they will take minimal time in combating the incidence.
Reference
Preda, M. D., Christodorescu, M., Jha, S., & Debray, S. (2008). A semantics-based approach to malware detection. ACM Transactions on Programming Languages and Systems. doi:10.1145/1387673.1387674
Runciman, B. (2011). Malware response. ITNOW. doi:10.1093/itnow/bwr063
 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Gem Infosys Case Study Example | Topics and Well Written Essays - 500 words”, n.d.)
Gem Infosys Case Study Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1660324-gem-infosys
(Gem Infosys Case Study Example | Topics and Well Written Essays - 500 Words)
Gem Infosys Case Study Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1660324-gem-infosys.
“Gem Infosys Case Study Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1660324-gem-infosys.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Gem Infosys

Infosys

...?Table of Contents Executive Summary 2. Global Marketing issues faced by Infosys 3 3. Cost savings not included in Project contracts 6 4. Knowledge transfer time cost savings 8 5. Self-Analysis for Persuasive Selling 8 6. Recommendations for Persuasive selling 14 7. References 16 1. Executive Summary The report discusses the various global marketing issues faced by Infosys firstly from a case specific perspective and then from a general perspective considering the various elements involved in a Business to Business marketing environment. Thereafter, the various cost savings done by Infosys for PFS over the past five years have been quantified. Also the expected cost savings in case...
11 Pages(2750 words)Essay

Infosys in China

...?Infosys in China case study Contents Infosys in China case study Contents 2 3 Background 3 Issue ment 4 Factors that led to enter the Chinese Market 4 Global Delivery Model 5 Analysis of the Problems 6 Alternative analysis and selection criteria 7 Recommendation 8 Action and Implementation Plan 8 Reference 9 Abstract Infosys technology Ltd is the second largest outsourcing company. Infosys being the first company to be listed in Nasdaq Stock market, New York. Infosys planned to invest 65millions by 2010, in Hangzhou and Shanghai. These countries were to employ about 6000 employees. Infosys went with these locations keeping in mind the...
7 Pages(1750 words)Essay

Response Paper on August Wilson's Gem of the Ocean

...Visual Arts and Film Studies 26 Jan. Response paper on August Wilson’s play Gem of the Ocean This paper focuseson August Wilson’s play ‘Gem of the Ocean’. Through the analysis of August Wilson’s ‘Gem of the Ocean’, the focus is also given on the relevant African and American theatres. American theatre is a new tradition as compared to African theatre. The Thesis sentence being argued is, is African American history associated with the Gem of the Ocean? The African American history is said to be associated with the August Wilson’s play Gem of the Ocean. ‘Gem of the ocean’ is a play written by eminent American playwright August Wilson. The...
5 Pages(1250 words)Essay

Infosys HRM Case

...? Infosys HRM Case Overview of the company Infosys is an Indian multinational company that was established in 1981 under strenuous conditions. The company offers information technology, outsourcing, business consulting, and software engineering services across the globe. The company has had a reputation of treating its employees fairly and had over fifteen thousand employees in 2002 a massive increment from the two hundred and fifty employees it had in 1992 (Delong, 2006). The company was founded by seven friends who had the vision of making it a global corporation a task in which they have excelled. The company has had to overcome several difficulties since its inception to stamp its authority in the market. The company has had... their...
4 Pages(1000 words)Case Study

IDS policy

...type of action, a system might clearly redirect an intruder’s action to a trap. A false resource exposed to the attacker with the aim of observing and gaining information about the attack; to the attacker, the resource appears real. These levels of freedom in the design of space for detecting intrusions in systems have brought an extensive variety of solutions acknowledged as intrusions detection systems (IDS) (Silberschatz, Galvin, & Gagne, 2004). Gem Infosys desires to protect the business network and organizational business resources. The main aim and objective of this policy is to offer procedures to set up security monitoring and intrusion detection to defend business resources as well as data on...
2 Pages(500 words)Essay

Infosys in China

...Infosys in China Abstract Infosys technology Ltd is the second largest outsourcing company. Infosys being the first company to be listed in Nasdaq Stock market, New York. Infosys planned to invest 65millions by 2010, in Hangzhou and Shanghai. These countries were to employ about 6000 employees. Infosys went with these locations keeping in mind the infrastructure and the availability of talented manpower. These centers would look after new projects on software, IT and ITES (ICMR, 2006, p.9). The report deals with some of the issues faced by Infosys in China on its way to expansion and also the role of Global Delivery Model. It suggests...
7 Pages(1750 words)Essay

Infosys and levendary cafe case

...Infosys and levendary cafe case Levendary café What is the type of organizational structure atLevendary Cafe? Legendary café has a functional organizational structure with seven different functions being performed by specialized people for each of the function. These functions are: administrative staff group, business development, franchise, food, operations, marketing and concepts (Bartlett and Arar 3). Using the situational factors that determine when a structure is effective, assess whether the structure is effective for the organization, or should they be using a different type of structure? Effectiveness of a structure is determined by situational factors such as coordination, supervision, allocation of tasks and...
2 Pages(500 words)Case Study

Denver Gem and Mineral Guild Show

...Denver Gem and Mineral Guild Show Denver Gem and Mineral Guild Show is a not for profit event that usually takes place in Denver, Colorado every year. It is usually held in mid-September at Denver Mart. The show is among the largest gem and mineral shows sponsored by clubs in the United States and ranks in the second place after the Tucson Gem & Mineral Show. The Greater Denver Area Gem and Mineral Council, which is a non-profit organization, sponsor the Denver Gem and Mineral Guild Show. The Denver Gem and Mineral Guild Show is an exhibition of award winning displays of gems and minerals. The show...
1 Pages(250 words)Essay

Gem Infosys Incident-Response Policy

...Gem Infosys Incident-response policy Introduction Gem Infosys company need to put in place necessary incident-response plan in order to prevent future network breakdowns. The I.T department should have an incident response plan so that they can successfully respond to any future incidents of network breakdown. This may be done via a number of ways such as: reducing the number of systems severity, integrating the activities of Computer Security Incident Response Team (CSIRT), damage control, and having a well-defined incident response plan (Obaidat & Boudriga, 2007). Formulate an incident-response policy to reduce network down in Gem...
1 Pages(250 words)Coursework

INFOSYS: MEETING THE KNOWLEDGE case

...Dainelle Duncan N01128264 305-766-6292 Date of Submission: 05//2015 Title of Assignment: Group 2 Case Study 2 Infosys CERTIFICATION OF AUTHORSHIP: I certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledge and disclosed in the paper. I have also cited any sources from which I used data, ideas of words, whether quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course. Students’ Signature: ******************************************* Instructor’s Grade on Assignment: Instructor’s Comments: 1. Executive Summary 2. Problem Identification Foreign companies encounter certain...
1 Pages(250 words)Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Case Study on topic Gem Infosys for FREE!

Contact Us