Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Computer Incident Response Teams - Essay Example

Comments (0) Cite this document
Security is a big issue for companies these days. The way technology has evolved over the last few decades many businesses have become completely dependent on the computer systems for conducting even the smallest business activities. With secretive information related to the business stored on the computer, hacking, viruses, malwares etc…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER97.3% of users find it useful
Computer Incident Response Teams
Read TextPreview

Extract of sample "Computer Incident Response Teams"

Download file to see previous pages Not only these companies would suffer from information damage, but also their clientele and reputation will nosedive in the industry.
Computer Incident Response Teams (short-form 'CIRT') are special teams formed for the purpose of minimizing and controlling the impact of a security breach or other computer related emergency in the company (Brussin, Cobb, & Miora, 2003). CIRT is a also known as CERT (Computer Emergency Response Teams) and CSIRT (Computer Security Incident Response Teams) in some companies, however, they all attempt to provide security to the computer systems.
It depends on the company policy as well as the riskiness of information leakage or damage. In companies who don't heavily rely on computer systems, a CIRT would not be of much use. However, now with most organizations keeping important information on computer systems, the need for having a CIRT is increasingly getting popular. With the increasing number of viruses, spywares, backdoors in the systems being detected, a CIRT is a necessity for an organization keeping competitive information on the computers.
Like in all business strategies before implementing them a plan needs to be created that would guide the formation of a CIRT. This plan includes all the details about the CIRT and all the information that the security team would need to know. Furthermore, this plan should be feasible in all ways and must provide a competitive business advantage. The details of the plan are given below. (RHE, 2004)
4.1 Make a Policy
First of all, a policy regarding the CIRT should be created. This would have standards, rules ad regulations and instructions as to what is to be done when the security is breached. This policy document should be given to all members of the company and must be followed exactly as mentioned in the policy. (Lucas & Moeller, 2003)
4.2 Form the Team
Forming the Computer Incident Response Team is the most important part in this plan. Usually the team is formed on a voluntary basis. However there are certain characteristics that need to be there in a CIRT. First of all the members of the team must be extremely responsible. Since action is required to contain the emergency, the team members should also be quick to react. Another quality that the team should have is that its members must be loyal to the company and should be heroes in their own sense as their job is to save the company from a disaster. Only trustworthy people should be made a part of this team. (RHE, 2004)
After these characteristics, the team should have technical expertise to understand and resolve the situation. The team usually comprises of system and network administrators as well as information security experts. The system administrators oversee the correct response to the threat and supply the required knowledge about system resources. The network administrators are responsible for routing the network traffic though other points while closing all activity in those routes where the security has been breached. Information security officers diagnose and analyze the problem and detect the point of intrusion to try to solve it. (RHE, 2004)
The team should be kept in close coordination with each of its members at all times so that in case of an emergency all members would get notified immediately. It is ideal to keep ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Computer Incident Response Teams Essay Example | Topics and Well Written Essays - 1000 words”, n.d.)
Computer Incident Response Teams Essay Example | Topics and Well Written Essays - 1000 words. Retrieved from
(Computer Incident Response Teams Essay Example | Topics and Well Written Essays - 1000 Words)
Computer Incident Response Teams Essay Example | Topics and Well Written Essays - 1000 Words.
“Computer Incident Response Teams Essay Example | Topics and Well Written Essays - 1000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Computer Incident Response Teams

Computer Incident Response Teams Are Needed for Controlling the Impact of a Security Breach

...1. Introduction It is always beneficial for organizations to be predictive rather than reactive in conducting its business. To remain competitive in the industry, an organization must foresee what will come ahead and in turn plan for it. A reactive organization on the other hand responds to the situation as it arises. When we talk about security, a predictive setting and plan must already be in place for a security breach. Even if one is prepared, a quick response is necessary before any damage can be done. "Since more than the money on the line, companies that fail to react quickly to security incidents stand to suffer damage to their reputations and lose customers". (Vijayan, 2002) 2. CIRT CIRT or Computer Incident Response Teams...
6 Pages(1500 words)Research Paper

Critical Incident Logistic Response Structure

...Running Head: Critical Incident Logistic Critical Incident Logistic Response Structure [Institute's Critical Incident Logistic Response Structure An Incident and Command Response Structure can be used in case of any time of emergency from a flood to a terrorists attack. It is designed to synchronize all. The responding agencies so that they can work efficiently. It is supposed to be as flexible and adaptable as possible so that it can be adjusted to suit any situation. Any Incident and Command Response structure is required to have at least four groups of response personnel with pre-elected tasks. The four groups are: Operation Planning Administration Logistics According to Boyd and Caton (1998), "Defining terms is essential...
4 Pages(1000 words)Essay

Incident response policy

Incident response policy for Gem Infosys Incident response policy for Gem Infosys Introduction In the existing IT environment, incidents are common and appropriate measures should be taken to tackle them. When Incidents occur it proves much costly to an organization. Proper incident response should be an integral part of your overall security policy and risk mitigation strategy.
There are clearly direct benefits in responding to security and other incidents. However, there might also be indirect financial benefits.
For a software company like Gem Infosys, a formal incident response plan might help win business, because it shows that you take seriously the process of good information security.
This document will provide yo...
2 Pages(500 words)Essay

Gem Infosys Incident-Response Policy

...Gem Infosys Incident-response policy Introduction Gem Infosys company need to put in place necessary incident-response plan in order to prevent future network breakdowns. The I.T department should have an incident response plan so that they can successfully respond to any future incidents of network breakdown. This may be done via a number of ways such as: reducing the number of systems severity, integrating the activities of Computer Security Incident Response Team (CSIRT), damage control, and having a well-defined incident response plan (Obaidat & Boudriga, 2007). Formulate an incident-response policy to reduce network down in Gem Infosys Company A well-defined incident response plan for Gem Infosys Company should have the following...
1 Pages(250 words)Coursework

Incident Response Policy

The Homeland Defense Policy The Homeland Defense Policy The United s Department of Defense’s main factions include leadingand administering all the American military forces including supporting their operations. This department coordinates all the army, air forces, marines, and navy in fighting wars, disaster management, peacekeeping, homeland security, and humanitarian aid. Therefore, the success for the department of defense policy, all the involved departments and bodies require to work and share crucial information that are of security concerns. Notably, the InfoSec Company has security policies that match with department of defense and the Homeland Defense policies to enable them work with the state security programs coheren...
1 Pages(250 words)Coursework

Digital Forensic Incident Response

...; all the while protecting themselves from further legal entanglement and seeking to provide a high quality output so that the case in question can be determined based upon its own merits and not biased by any degree of overlooked or misinformed information gathering. Essentially, the approach that will be utilized as a means of gaining the affected information will be twofold. The first will be contingent upon engaging with mobile phone providers and email providers as a function of retaining the information in question, within the date range in question, and between the people in question. The second will be contingent upon a more high tech approach in which individual laptops, company computers, and mobile phones will be subpoenaed...
8 Pages(2000 words)Research Paper

Digital forensic incident response

...Topic: Digital Forensic Incident Response for American Marketing Systems Introduction In the current digital world, incidences in computer use continue to bear high probability to affect financial reports. The risks and uncertainties in compromise are increasing in volatility. There are high chances of making away with sensitive company information. Both the private and the public sectors have suffered massive loss in frauds, software compromise, online share frauds and other resources. They have experienced massive loss even after spending so much in putting up expensive system. As these threats increases, there is a need to bridge the gaps in system management as a way of reducing the effects. Digital forensic investigation is important...
10 Pages(2500 words)Research Paper

Construct an incident response plan

The metrics are further discussed in relation to what is to be measured in the policy, how it is to be measured and the kind of action to be performed with the information. This is to ensure that the policy is workable and makes sense in relation to the fact that the impacts can be quantified.
In the Information Technology, being a continuously developing field, there are risks that come with dynamic nature of the field. The exposure to such risks, if not secured, normally leads to loss of income in the sector. These risks involve hacking, using the website for adverts among others (Beale et al., 2003).In addition, the risks deserve some scrutiny so as to understand how to tackle them. The policy is supposed to ensure that the...
8 Pages(2000 words)Research Paper

Toxic Chemical Agent Incident Response

... of incident command system can minimize the number of casualties (Williams, 2013). Common terminologies In case of the of the methyl isocyanate gas leak, the response teams should use similar terminologies to avoid confusion. The response team should use a common language that each person understands and all commonly used areas should have the same names. For instance, the area where casualties are being staged should have a common name such as the staging area. The gas plant facilities and units should be given similar titles that each response team is familiar with for easy access of resources and to avoid confusion (Strong, et al., 2009). A modular organization During the gas leak, the first arriving officer to the gas plant assumes...
5 Pages(1250 words)Assignment

IMF/World Bank Response to Asian Crisis

... IMF/World Bank Response to Asian Crisis Since the first signs of the impending financial crisis appeared in Asian countries financial sectors, one wonders if the International Monetary Funds (IMF) and the World Bank (WB) understood from the outset what was happening, and whether their remedies were timely and appropriate; or, conversely, if prescriptions of IMF and WB made a bad situation worse. One of the underlying causes of earlier financial crises in Central and Latin America and in Africa had been excessive spending by governments. Chronic public sector budget deficits had generated price inflation and trade account imbalances that led to overvalued currencies and the flight of capital. The WB and IMFs conventional prescription...
8 Pages(2000 words)Assignment

The Success of a Conflict Resolution - How Do Teams Differ From Groups at Work

Teams enable the individual members to bring into their team's special skills and knowledge, different experience as well as diverse cultural exposure. Teams also allow for a speedy communication process as feedback can be achieved in short periods of time (Cranny, Smith, & Stone, 1992). Mullins, (2005) identifies some potential problems in teams as conflicts which arise due to differences in individual’s way of doing things, poor leadership of the team if especially the mode of communication the team adopts is very centralised.

Cranny, Smith, and Stone, (1992) identify personality differences as another cause of team failure given the fact that individuals may fail to work together if they have major or irrec...
9 Pages(2250 words)Case Study

Strategy and Transformation in Dell Computer Corporation

The management principles,  strategy, and vision are responsible for all the success of Dell. It was founded in the year 1984 as PC’s limited. In June 1988, when its first stock offering entered the market,  the name officially changed to Dell Computer Corporation. The year 1986 was a memorable year for Michael Dell and his corporation when Dell entered the European market. By the year 1989, Dell acquired sales of $50 million. The last four quarters earned revenue of around $57.9 millions2. Dell always aims to deliver innovative technology and services. This company sells the maximum number of systems than any other computer company.

The main principle of Dell is selling computers directly to the custome...
10 Pages(2500 words)Case Study

Factors that Influence Tissue Response to Radiation and Evidential Explanations for Them

All biological matter contains inorganic and organic compounds dissolved or suspended in water. This is a protoplasm. The smallest structural and functional component of protoplasm that can exist freely in the cell (Suntharalingam et al, 2005, p. 485). It is just necessary to study the effects of radiation at the cellular level to truly understand the factors that affect biological tissues. Cells are of two types – somatic cells and germ cells. Of these somatic cells have three subtypes – stem cells (cells that generate other cells through differentiation), transit cells (cells that are in the state of being transformed from one type of cell to another) and mature cells (cells that are fully differentiated and are rela...
10 Pages(2500 words)Term Paper

Analysis of Physiological Stress Response Case

Hien Ng's personal history was also significant. He was a chronic smoker and had smoked 20 cigarettes per day for many years. On admission, a general examination of the patient revealed that he was anxious and agitated, but orientated to time and place. His skin was pale and cool to touch. Heart rate was 116 beats per minute and irregular, blood pressure was 140/95mmHg, the temperature was 37.8 C (cool peripheries), respiratory rate was 28 per minute, abdominal pain score was 6/10 and approximate weight was 68kg and height 163cm.

From the above history, it is evident that Mr. Ng was admitted to the hospital with acute gastroenteritis with dehydration and exacerbation of chronic gastric ulcers. He was subjected to both a...
15 Pages(3750 words)Case Study

Response of Effective Leaders to Diverse Team Environments

An effective leader is the one who adapts to the changing scenarios in terms of the team he leads and also in terms of the circumstances that the team faces. Herscovitch and Meyer (2002) have confirmed that workplaces are faced with endless change (s), and Paton and McCalman, (2000) have further stated that effective management of that change is an important competency currently required by an organization

Advancement in technology, travel options, communications and liberalization of international business regulations has incorporated numerous possibilities of conditions with diverse natures within the work environment. This trend was found to increase in the early nineties. The transference of a command-driven economy...
7 Pages(1750 words)Case Study

Computer Privacy Issue

The requirement has increased because there are unscrupulous computer attacks and private details are being stolen now more and more. These malicious data attacks have left the computers worldwide at a risk and hence the need to have privacy is of fundamental significance. If these privacy regimes are not taken care of, one could guarantee that problems would come about quickly and the computer networks would crash down instantly, thus providing fatal for the businesses and individuals alike. It goes to show without any doubt that privacy forms up as the most essential ingredient of success within a business entity and any organization would absolutely cherish the idea of having privacy within their networks to keep away the negat...
6 Pages(1500 words)Essay

Critical Incident Response Analysis

l appreciation of the crisis situation that leads to the summoning of the right resources that in turn help in the management and resolution of the crisis. For example, in the case that there is an aircraft crash, the most essential step in the process of disaster management requires that a preliminary assessment of the cause of crash be made so that it could be classified as technical or pilot error or a terrorist act. The correct classification leads to the development of the appropriate plan of action – in case of technical faults, the scene would be treated as an accident scene, while in case of suspected sabotage or bombing, the crash site would have to be managed as a crime scene.
Crisis management and preparing and...
12 Pages(3000 words)Term Paper

Analysis of Seveso Incident

... to different other workstations, and the government put in place elaborate health and safety monitoring programs to avoid the occurrences of a similar disaster. The initial slow pace of carrying out necessary actions made the Seveso incident paradoxical (De Marchi, 1991 b, p. 211). In many ways, the occurrence of the Seveso explosion tempered with the high speed that technology was moving within the society. Responsible agencies took recovery measures to help address traumatic incidences among the victims in addition to normal patterns of life in the economic, social, as well as organizational situations. The causes of trauma included among others evacuation, chloracne, animal deaths, and fears from genetic impairments (Edelstein, 1988, p...
8 Pages(2000 words)Term Paper

Response to Disaster

... warning, offer growth plans for recovery from the disaster, produce medical and communication resources, and help in post-disaster reconstruction and rehabilitation (Statoil 2013, p. 78). The communication of accurate information after the event is vital so as to guarantee the resources essentially to support response and resurgence activities (Balz 2008, p. 15). The 72 hours following a substantial incident is the most difficult period due to a lack of organisation among relief groups (Neumayer et al 2012, p. 5). Problems that disrupt instead of direct the rescue attempts of all groups concerned frequently take place due to hasty decision-making under difficult conditions and the numerous organisations that are hesitant of their positions...
8 Pages(2000 words)Term Paper

Bovine Tuberculosis, Anthelmintic Treatment, Worms and their Effect on the Immune Response to other Pathogens

If a dairy farmer suspects that there are positive TB infection cases in his or her herd, they can conduct a Single intra-dermal Comparative Cervical Tuberculin (SICCT) test to diagnose suspected cases. The SICCT test measures a delayed mode hypersensitivity response to the tuberculin antigen, Purified Protein Derivative (PPD) and is dependent on functional antigen-specific. However, use of SICCT test does not produce confidence levels required to ascertain the success of the tests. The diagnostic sensitivity of the SICCT test is estimated to be between 52-100% with a median value of 80% using the standard interpretation of the test. Factors attributed to the inaccuracy, and the poor sensitivity of the test include among many; the...
6 Pages(1500 words)Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Computer Incident Response Teams for FREE!

Contact Us