.

Wednesday, April 24, 2019

Gem Infosys Incident-Response Policy Coursework Example | Topics and Well Written Essays - 250 words

Gem Infosys Incident-Response form _or_ system of government - Coursework ExampleThe first is the initial evaluation/assesm1ent.This entails determining whether an happening exists or not so that usurp retort established. The second policies involve defining the communication channel that will be followed to inform the leadership that an incident has identified. The third policy is risk/damage minimization. This is where the risk of self-replicating warms may be minimized by making sure that the workstation is disconnected from the hub to prevent push replication of warms. The fourth policy involves determining the asperity of the warms attack as well as exact point of origin where those warms are coming from so that they can be contained. The fifth policy entails protecting the other systems against the identified security threats to avoid further losses. System security against warms may be enhanced by installing firewalls as well as transmitting organization data via secure d networks. The sixth policy involves system recovery. This is where the data and information that was damage with network breakdowns may be recovered using special software such as Acronis. The 7th policy involves assessing the cost and damages caused by the incident for proper responses. Lastly but is updating the policies on a regular basis so that they remain relevant to organization needs (Shimonski, 2003).In station to prevent future network breakdowns, Gem Infosys should carry out the following activities namely reduce the depend of systems severity, integrate the activities of Computer Security Incident Response Team (CSIRT), damage control, and having a well-defined incident response plan. The Computer Security Incident Response Team (CSIRT) should formulate and monitor the incident response plan.

No comments:

Post a Comment