We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Nobody downloaded yet

Computer Incident Response Teams - Essay Example

Comments (0)
It is always beneficial for organizations to be predictive rather than reactive in conducting its business. To remain competitive in the industry, an organization must foresee what will come ahead and in turn plan for it. A reactive organization on the other hand responds to the situation as it arises…
Download full paper

Extract of sample
Computer Incident Response Teams

Download file to see previous pages... (Vijayan, 2002)
CIRT or Computer Incident Response Teams are specially those kinds of teams that are formed for the purpose of minimizing and controlling the impact of a security breach or other emergency (Brussin, Cobb, & Miora, 2003). They are also known as CERT (Computer Emergency Response Teams) and CSIRT (Computer Security Incident Response Teams), but they basically attempt to do the same in case of a computer security threat.
This question can only be truly answered by predicting the trends in intrusion and the level of threats expected. Usually, the answer is yes to the above question since an organization rather be safe than sorry! With the increasing number of viruses, spywares, backdoors in the systems being detected, having a CIRT is a must for any organization having informational data on the computers.
Before assigning the team and its task, the management needs to make a proper business plan in case of an incident. The plan includes all the details about the CIRT and all the information that the CIRT need to know. Furthermore, for the plan to be successful, the strategy must be feasible, approved and legally reviewed. "It is critical that practice emergencies are staged and response times measured. This would require financial and executive/upper management support and commitment to the CIRT need". (RHE, 2004)

4.1 Policies
Policies regarding the computer system must be in place before hand. The breach would usually occur when that policy is not obeyed, thus it is imperative to have policies so that the root cause of the problems can be found. These policies need to be documented and provided to every member of the organization so that everyone is aware of security guidelines and the procedures for emergency situations. (Lucas & Moeller, 2003)

4.2 Human Resource
An emergency is never planned so the people in the CIRT must accept the responsibility that is required of them to respond to an emergency at any hour. In selecting the human resources to assign the responsibility of computer security, only trust worth people should be selected. The people on the team must have a desire to rescue their company from the danger. "The technical expertise is of no use if a person who is supposed to do his job, ignores the emergency signal. Also sometimes due to time or financial constraints, the human resource includes logistics such as location and availability of technical workers". (RHE, 2004)
On the CIRT teams, usually system and network administrators are used as well as information security experts. "System administrators provide the knowledge and expertise of system resources, including data backups, backup hardware available for use, and more. Network administrators provide their knowledge of network protocols and the ability to re-route network traffic dynamically. Information security personnel are useful for thoroughly tracking and tracing security issues as well as performing a post-mortem (after the attack) analysis of compromised systems" (RHE, 2004).
To be sure of the human capability, additional personnel should be kept for backup in case some member doesn't show up. Although this option may not always be feasible, an organization should at least try to then cross-train their workers so that they can substitute a place if someone is absent in the need of the hour. (RHE, ...Download file to see next pagesRead More
Comments (0)
Click to create a comment
Individual Essay Virtual Teams
Members of a virtual team are often located in the various different cities and/or countries in which the organization conducts business. Virtual teams enable organizations to achieve their goals by utilizing various technologically advanced types of communication such as web-conferencing to hold meetings/interact even though team members are in different locations (Divine & Schumacher, 2011, p.
5 Pages(1250 words)Essay
Response essay
For some people, the experiences in their environment, the relationships they have and the activities in which they take part, make some to respond in various ways to the benefit or to the detriment of their lives. Life has many occurrences, which an individual is not able to predict and they have different impacts on the life of the involved.
4 Pages(1000 words)Essay
Computer Incident Response Teams
have been created to extract or delete such information. For companies, having a security plan in place is a must today. Being predictive, organizations have taken intense security measures to protect such critical information. Those companies who do not take such precautions are at constant risk and are exposed to all those who want to harm them.
4 Pages(1000 words)Essay
Critical Incident Logistic Response Structure
According to Boyd and Caton (1998), "Defining terms is essential to understanding the nature of critical incidents and organizational responses". There are certain terminologies that will be used for the spilt up of the organizational levels: Unit: At an organizational level having functional responsibility.
4 Pages(1000 words)Essay
Response Essay
Company representatives have confirmed and it is now clear that vitamins will go into the new and improved coke. If you are not a fan of coke, or any kind of soda, this marketing move will hardly change that because if you ask me, nothing can be healthier and more refreshing than a fresh fruit and a glass of cold water.
3 Pages(750 words)Essay
In this respect, as illustrated in Lochgelly Iron and Coal Co v McMullan [1934]1 "strict legal analysis" requires consideration for "the complex concept of duty, breach and damage thereby suffered by the person to whom the duty was owing". Thus, the claimants must illustrate a breach of duty by the defendant to illustrate liability, and consequently justify claims for damages.
5 Pages(1250 words)Essay
Incident response policy
This document will provide you with a recommended process and procedures to use when responding to incidents identified in a small- to medium-based network environment such as Gem Infosys. The value of forming a security incident response team with explicit team member
2 Pages(500 words)Essay
Research Essay is an essay based on the cyber forensic
Presently, modern day cyber precaution ethics habitually require far-reaching aftermarket standardisation to be accurately successful within management systems fields (Saks & Koehler, 2005). In addition, the operating cost
16 Pages(4000 words)Essay
Criticial incident essay in teaching
One of the gander posters was of a homophobic nature, and the groups had to discuss the posters in detail. Group A had a composition of five female students who had different ethnicities and religious backgrounds. As I was going round the
4 Pages(1000 words)Essay
This poem highlights the main cause of racism and talks about racism that has been deeply embedded in the society of United States. The poem focuses on the experience of the poet and starts with his joyous
1 Pages(250 words)Essay
Let us find you another Essay on topic Computer Incident Response Teams Essay for FREE!
Contact us:
Contact Us Now
FREE Mobile Apps:
  • About StudentShare
  • Testimonials
  • FAQ
  • Blog
  • Free Essays
  • New Essays
  • Essays
  • The Newest Essay Topics
  • Index samples by all dates
Join us:
Contact Us