CSIA3107382Week1
.docx
keyboard_arrow_up
School
University of Maryland, University College *
*We aren’t endorsed by this school
Course
310
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
3
Uploaded by gnomechild666
An incident-response (IR) plan is a set of guidelines used to respond to data breaches. An IR plan
mitigates the damage of a cybersecurity event or incident, reduces overall recovery costs, and shows stakeholders that the company is ready when disaster strikes. It is important to keep the IR
plan up to date to ensure a prompt response from the team. Tips for a cybersecurity IR plan
Ensure there is not a single point of failure.
o
If only one or two employees know how to mitigate a security risk, or what procedures to follow, there is bound to be an incident on a day that neither person is available. Creating a step-by-step plan can be the difference between millions of dollars in damages due to compromised data or a few hours of lost revenue. Using this IR plan, any member of the cybersecurity team should be able to isolate a network segment in order to quarantine the problem (Bailey, Brandley, Kaplan, 2013).
Incorporate coordination internally and externally. o
Providing all employees with access to the IR plan can produce a quicker overall response time from all levels of the company. Each department can work separately on the same issue to resolve it in a timely manner. Customer service representatives at a call center could be calling customers to let them know about the incident while the security teams are investigating the data breach.
Establishing responsibilities in the IR plan can reduce delays due to confusion about who can make decisions. External coordination could involve “law-
enforcement agencies or breach-remediation and forensics experts” (Baily, Brandley, Kaplan, 2013). Keeping contracts up to date with these third parties can
save the company time and money and will ensure there is no delay in reaction. These recommendations apply to any organization that relies on networks to run their business. While there are potential cybersecurity risks, there are also physical hazards that must be addressed as well. Everyone and everything on the planet Earth could be affected by a natural disaster. The first step to protecting against a natural disaster, i.e. tornadoes, hurricanes, earthquakes, is to determine what type of event is most likely to disrupt operations or infrastructure. Consider the state of Maryland, for example. Maryland is a coastal state, so it is vulnerable to hurricanes, tropical storms, and floods. But Maryland is also susceptible to tornadoes and the odd earthquake. What are the potential impacts of these disasters on an organization? There could be power outages, which can affect network security, or even physical
damage to infrastructure. As with the cybersecurity IR plan, there needs to be a clear hierarchy involved in decision-making in case of a natural disaster event. This includes having a communication plan in place with established primary and secondary communication channels (Careless, 2023). Continual training for such events is crucial to limit damage.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help