Business Continuity Planning And Incident Handling Research Paper

PAGES
2
WORDS
671
Cite

¶ … Business Continuity Planning Incident Handling

Incident response refers to an organized approach used to manage and address the security breach aftermath of the attack. The goal of incident response is to limit the damages to the network infrastructures as well as reducing costs and time employed for recovery of critical data. The paper does not suggest that the organization should shut down the network systems because they may lose a substantial market values by implementing this tactic. Moreover, shutting down the network system may hinder a full investigation of the cause of the incidents.

The following steps should be employed for the incident response. First, the organization should coordinate an IT team who will be in charge of updating the security measures to respond to network and computer security incidents correctly and quickly. The next stage is to identify where the incident has occurred. Typically, the IT team should identify whether the attacker uses the virus or worm for the attack and the strategy to eliminate the tool used for the attack from the company information systems. The IT team should identify the affected devices and systems and take steps to prevent further damages. The team should investigate the origin of...

...

The team should also take a step to recover data from the database and ensure that the files are cleaned to ensure that the systems are free of vulnerabilities. Moreover, the IT team should beef up the security of the information systems to prevent future occurrence. The paper also suggests that the company should use the service of digital forensic experts to investigate the origin of the incidents. By identifying the origin of the incidents, the organization will be able to take appropriate step to eliminate the incidents. More importantly, the paper suggests using the Dell SecureWorks software, which is an effective software, to carry out the incident response as well as digital forensic practices. The software is an effective tool to minimize the duration of the threats.
The fig 1 below reveals the summary of the incident response plan.

Fig 1: Incident Response Plan

Topic 2 - Business Continuity Planning

A business continuity plan refers to a plan to continue business operations in case an organization is affected by incidents. In other words, a business continuity plan is an IT document containing the critical information that assists an…

Sources Used in Documents:

Reference

Clark, D. D. & Wilson, D. R. (1987). A Comparison of Commercial and Military Computer Security Policies; in Proceedings of the 1987 IEEE Symposium on Research in Security and Privacy Oakland, CA; IEEE Press, pp. 184-193.


Cite this Document:

"Business Continuity Planning And Incident Handling" (2015, November 14) Retrieved April 25, 2024, from
https://www.paperdue.com/essay/business-continuity-planning-and-incident-2155197

"Business Continuity Planning And Incident Handling" 14 November 2015. Web.25 April. 2024. <
https://www.paperdue.com/essay/business-continuity-planning-and-incident-2155197>

"Business Continuity Planning And Incident Handling", 14 November 2015, Accessed.25 April. 2024,
https://www.paperdue.com/essay/business-continuity-planning-and-incident-2155197

Related Documents

component of effective incident handling is a security management team that is engaged in constant preparation and network scanning for such a breach. "Once your security team declares there has been a breach, it should inform the incident management team, and it should assemble within minutes" (Schilling, 2013, p.3). The team should then conduct "network forensics, systems forensics and malware analysis" to understand the extent of the threat and

Protection for employees If employees adhere to the rules of the acceptable use policy, there are less liable to questionable issues. This also prevents them from engaging in hazardous internet issues, for instance, they are less likely to disclose their contacts to crackers using social engineering approaches. Moreover, ABBA should settle on using universal guidelines and principles with respect to network security, it risk assessment, risk analysis, and risk management. In

Jet Blue Airways Theoretical Framework to Crisis Management Approach in Business Continuity Jet Blue Airways Valentine's Day crisis 2007 Jet Blue Airways BCM Crisis management Stakeholder Analysis Invocation and escalation Management and recovery Closure and review Enterprise Management Jet Blue Airways Business continuity management (BCM) is defined by the Business Continuity Institute as 'holistic management process that identifies potential impacts that threaten an organization and provides a framework for building resilience and capability for an effective response that safeguards the interests

Command System (ICS) Acceptance and Utilization of the Incident Command System in first response and allied disciplines: An Ohio Study United States integrated common and uniform command structures for the application by the nation's first responder organizations and generally accepted disciplines in assisting first responders in the case of major disasters or incident. This was in response to the terrorist attacks of September 11th, 2001. This led to the issuance of

IT Services of BuildingDNA® I am an IT consultant with the objectives of providing recommendations for BuildingDNA Inc. To assist the company increasing its output and the productivity in the competitive business environment. I am also to provide recommendations for the BuildingDNA on the strategy to employ in implementing IT infrastructure design to achieve a leading ERP (Enterprise Resource Planning). The design packages are to assist the company to achieve

Human Services The field of human services is a burgeoning field that is fairly broad in definition. It requires an interdisciplinary approach to knowledge, one that focuses on prevention as well as solving human problems, and a commitment to improving the quality of life of the population. This field is not just one focusing on delivery systems, but individuals who seek to improve accessibility, accountability, and coordination among all the