Submitted by: Submitted by jefsony
Views: 145
Words: 1135
Pages: 5
Category: Science and Technology
Date Submitted: 01/26/2014 06:37 PM
Computer Systems Security: Incident-Response Policy Gem Infosys.
Student: Jefferson Echeverry
Professor: Khader Jabra
Class: SEC-280
DeVry College of New York
December 07, 2013
Actually, well secured computer systems enable organizations to undertake complex functions with much ease and accuracy; thus, increasing business success rates organizations, however, have to secure their computer systems so as to guard against network attacks such as malware and hackers that may compromise business operations. Statistics have proven that a single attack can cripple down a business within a matter of minutes; hence, it is crucial that firms use excellent security approaches Gem Infosys is a case example where a malware attack shut down all network operations for two full days, an incident that can cause serious financial implications on an organization. As a result, top officials at Gem Infosys require that an effective incident-response policy is formulated so as to reduce network downtime in future attacks. In this case study, therefore, seeks to address the network security attack at Gem Infosys by formulating an effective incident-response policy as established underneath.
Incident-Response Policy for Gem Infosys.
Identification of Incidents/Threats
Gem Infosys incident-response policy requires that every personnel including the Information Security Office (ISO), report suspicious activity during system usage, or while conducting a proactive monitoring of the organization’s network and information system activities (Yale University Policy, 2012; SANS Institute, 2001). Reports will be done via incident reporting system tickets which shall be sent to the authorized individuals or departments.
Symptoms of Computer Security Incidents
- System alarm from incorporated intrusion detection tools
- Unsuccessful login attempts
- Unexplained new user accounts
-...