Computer Science Defensive Response Strategy Term Paper

This represents the bulk of the cost effective security capabilities and facilitates better detection. Visibility to key areas and activities is vital. Effective monitoring to identify issues, breaches and attacks is necessary. This drives immediate interdiction by response capabilities. Efficient management of efforts to contain, repair and recover as needed to return the environment to normal operations is vital. This reduces losses by rapidly addressing issues and feeds intelligence into both the prediction and prevention areas (Defense in depth strategy optimizes security, 2008). Personnel Resources

Personnel requirements to implement a defense in depth strategy are many. This process will include experts drawn from several different areas. The teams that are vital include:

emerging threats team- this cross functional team continuously discusses emerging trends and events in order to identify imminent threats that might be out there.

threat horizon team -- this team works to classify different attackers or threat agents in order to understand who likely to attach, with what methods and what their motivations are.

rapid risk assessment team -- this team meets often in order to track the large number of emerging vulnerabilities and determine what risk that they bring.

security center of excellence team -- this team evaluates products for security and privacy in use both internally...

...

Securing organizational information and the systems that are used to manage and transmit data has become a high profile function. Failure to secure information can have a severe impact on business credibility. Threats to an organization come in a variety of forms, for example from hacking, viruses, and simple human error. The types of threats change constantly, so management must sponsor, design, and implement business and technical processes to safeguard critical business assets (Service Management Functions: Security Management (Part 1), 2005).

Sources Used in Documents:

References

Defense in depth strategy optimizes security. (2008). Retrieved from http://www.intel.com/it/pdf/Defense_In_Depth_Strategy_Optimizes_Security.pdf

Hazlewood, V. (2006). Defense-in-Depth. Retrieved from http://www.sdsc.edu/~victor/DefenseInDepthWhitePaper.pdfPerrin, C. (2008). Service Management Functions: Security Management (Part 1). (2005). Retrieved from http://www.windowsecurity.com/whitepapers/Service-Management-Functions-Security-Management-Part1.html

Understanding layered security and defense in depth. Retrieved from http://www.techrepublic.com/blog/security/understanding-layered-security-and-defense-in-depth/703


Cite this Document:

"Computer Science Defensive Response Strategy" (2012, August 03) Retrieved April 18, 2024, from
https://www.paperdue.com/essay/computer-science-defensive-response-strategy-75031

"Computer Science Defensive Response Strategy" 03 August 2012. Web.18 April. 2024. <
https://www.paperdue.com/essay/computer-science-defensive-response-strategy-75031>

"Computer Science Defensive Response Strategy", 03 August 2012, Accessed.18 April. 2024,
https://www.paperdue.com/essay/computer-science-defensive-response-strategy-75031

Related Documents

His study includes the following; The U.S. government through the executive to provide appropriate leadership to steer the country in the domain of cyber security. The state to conduct immediate risk assessment aimed at neutralizing all the vulnerabilities. The creation of an effective national security strategy as well as the creation of an elaborate national military strategy. Molander (1996) uses a qualitative research approach and methodology .The method used is constructive. The constructive

Computers Are an Underutilized Resource for High School Physical Education Teachers Computers have become an integral part of the high school learning environment, beginning in the early 1990s. They provide a vast variety of resources to help enhance student education through presentation of material in a variety of media and act as an enhancement to teacher lessons. They can sometimes free teachers from routine tasks, allowing them to bring greater depth

Open Source Social Science
PAGES 13 WORDS 3536

Open source software has recently emerged as the frontrunner for many industries as the primary method of code production, as it is widely predicted to provide more options for its users in a quicker, quality improved, and cost effective format than the more traditional proprietary software. Linux, the dominant player in the market, is a considerable threat to the Microsoft operating system, which has successfully established itself in the global

Introduction National strategy is the art and science of development and usage of informational, diplomatic and economic powers of a country in union with its armed forces for purposes of securing national objectives during war and peace times. National strategies are a key delivery mechanism for several new and existing nations. It was first introduced in the year 1998 with the aim of assisting in developing educational settings to improve the

The international human relations together with global policy-making processes have led to intensification of wars in various part of the world. The justification of war is something that has taken root in the industrialized globe. Massive undertakings exist in the strategies and plans of many nations like the U.S.A., Afghanistan, Russia, and even in Germany. Moreover, justification of war has led to increase in simple crimes among individual nations. Global

Applied Game Theory
PAGES 9 WORDS 2450

The Versatility of Applied Game Theory Applied game theory is an intricate subject that touches upon the strategic interactions amongst rational decision-makers. It has evolved as a powerful tool not just within economics, but across a diverse range of disciplines including political science, biology, computer science, and psychology. By applying game theory, one can forecast the outcomes of competitive situations and make better strategic choices by considering the potential decisions of