StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Computer Incident Response Teams - Essay Example

Cite this document
Summary
Security is a big issue for companies these days. The way technology has evolved over the last few decades many businesses have become completely dependent on the computer systems for conducting even the smallest business activities. With secretive information related to the business stored on the computer, hacking, viruses, malwares etc…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER93.4% of users find it useful
Computer Incident Response Teams
Read Text Preview

Extract of sample "Computer Incident Response Teams"

Download file to see previous pages

Not only these companies would suffer from information damage, but also their clientele and reputation will nosedive in the industry. Computer Incident Response Teams (short-form 'CIRT') are special teams formed for the purpose of minimizing and controlling the impact of a security breach or other computer related emergency in the company (Brussin, Cobb, & Miora, 2003). CIRT is a also known as CERT (Computer Emergency Response Teams) and CSIRT (Computer Security Incident Response Teams) in some companies, however, they all attempt to provide security to the computer systems.

It depends on the company policy as well as the riskiness of information leakage or damage. In companies who don't heavily rely on computer systems, a CIRT would not be of much use. However, now with most organizations keeping important information on computer systems, the need for having a CIRT is increasingly getting popular. With the increasing number of viruses, spywares, backdoors in the systems being detected, a CIRT is a necessity for an organization keeping competitive information on the computers.

Like in all business strategies before implementing them a plan needs to be created that would guide the formation of a CIRT. This plan includes all the details about the CIRT and all the information that the security team would need to know. Furthermore, this plan should be feasible in all ways and must provide a competitive business advantage. The details of the plan are given below. (RHE, 2004)4.1 Make a PolicyFirst of all, a policy regarding the CIRT should be created. This would have standards, rules ad regulations and instructions as to what is to be done when the security is breached.

This policy document should be given to all members of the company and must be followed exactly as mentioned in the policy. (Lucas & Moeller, 2003)4.2 Form the TeamForming the Computer Incident Response Team is the most important part in this plan. Usually the team is formed on a voluntary basis. However there are certain characteristics that need to be there in a CIRT. First of all the members of the team must be extremely responsible. Since action is required to contain the emergency, the team members should also be quick to react.

Another quality that the team should have is that its members must be loyal to the company and should be heroes in their own sense as their job is to save the company from a disaster. Only trustworthy people should be made a part of this team. (RHE, 2004)After these characteristics, the team should have technical expertise to understand and resolve the situation. The team usually comprises of system and network administrators as well as information security experts. The system administrators oversee the correct response to the threat and supply the required knowledge about system resources.

The network administrators are responsible for routing the network traffic though other points while closing all activity in those routes where the security has been breached. Information security officers diagnose and analyze the problem and detect the point of intrusion to try to solve it. (RHE, 2004)The team should be kept in close coordination with each of its members at all times so that in case of an emergency all members would get notified immediately. It is ideal to keep

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Computer Incident Response Teams Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Computer Incident Response Teams Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from https://studentshare.org/miscellaneous/1503199-computer-incident-response-teams
(Computer Incident Response Teams Essay Example | Topics and Well Written Essays - 1000 Words)
Computer Incident Response Teams Essay Example | Topics and Well Written Essays - 1000 Words. https://studentshare.org/miscellaneous/1503199-computer-incident-response-teams.
“Computer Incident Response Teams Essay Example | Topics and Well Written Essays - 1000 Words”, n.d. https://studentshare.org/miscellaneous/1503199-computer-incident-response-teams.
  • Cited: 0 times

CHECK THESE SAMPLES OF Computer Incident Response Teams

Professional Penetration Testing for Better Security

Computer Incident Response Teams.... incident Command System for High Rise Buildings.... Digital investigation & incident post-mortem.... The Harrow Court incident.... The Harrow Court incident refers to the tragic chain of events where two firefighters - Firefighter Wornham and Firefighter Miller - lost their lives on the 2nd of February, 2005....
6 Pages (1500 words) Term Paper

Computer Incident Response Teams Are Needed for Controlling the Impact of a Security Breach

From the paper "Computer Incident Response Teams Are Needed for Controlling the Impact of a Security Breach" it is clear that the CIRT would inspect to check where the intrusion was initiated.... (RHE, 2004) CIRT or Computer Incident Response Teams are especially those kinds of teams that are formed for the purpose of minimizing and controlling the impact of a security breach or other emergency (Brussin, Cobb, & Miora, 2003).... They are also known as CERT (Computer Emergency Response Teams) and CSIRT (Computer Security incident response teams), but they basically attempt to do the same in case of a computer security threat....
6 Pages (1500 words) Research Paper

Aspects of E-Commerce Business Solutions

nbsp; The four basic technological trends that have led to a change in the technological environment within and outside an organization are as follows: - The doubling of computer power every 18 months, which we also refer to as the Moores Law; - Advancement in data storage and research techniques; - Advancement in the field of telecommunication; - The Internet....
11 Pages (2750 words) Coursework

End of Semester wrap up

In today's world of globalisation, knowledge management and information assurance systems that deal with risk assessment and damage control effectively, are the norm of the day.... This paper deals with the design of an information assurance system based on the following elements, for a healthcare organisation: … The paper is based on the study of the strategic elements that will be key in the construction of a relevant knowledge management and risk assessment system....
32 Pages (8000 words) Essay

Information systems security incident

… CONOP outlines the key players, their roles and responsibilities in the event of information security incident.... CONOP outlines the key players, their roles and responsibilities in the event of information security incident.... The CONcept of OPerations on information security incident is based on the severity and impact of the incident...
8 Pages (2000 words) Essay

Risk Management in Organizations - Using CIRT Plans

hellip; Computer Incident Response Teams are some of the most important parts of today's business in handling risks.... In this light, many organizations are quickly adopting a method of developing their own Computer Incident Response Teams (CIRT) or even opting to outsource in this field.... In response to these risks, a large number of organizations today have established various security plans and programs that facilitate the prevention and handling of a myriad of growing threats and intrusion activities....
9 Pages (2250 words) Essay

ABC's Detection, Response, and Control Management

We carry out in-depth current practices in light of “Risk assessment and risk management”, “Backups and Business continuity planning”, “Disaster recovery planning”, “The future of information assurance”, “Computer Incident Response Teams” that makes the systems more robust and less vulnerable to outside attacks.... The study “ABC's Detection, Response, and Control Management" consider that company in order to minimize risks and maximize its efficiency should use a business continuity program, disaster recovery plan, computer incident response team, information assurance, and risk management program in place....
30 Pages (7500 words) Research Proposal

Conducting Incident Post Mortems

It is a process of assessing an occurrence of an incident after it happens.... Well determined information ensures that the public has an account of the happening of an incident.... The researcher of this essay aims to analyze an incidence post-mortem.... The incidence of post-mortem may vary from casual to very formal depending on the type and intensity of the occurred event....
7 Pages (1750 words) Research Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us