preview

Computer Security Incident Response Team

Good Essays

In the last decade, more and more companies have started to look into e-commerce to connect them to the infinite world of global suppliers, partners, consumers and much more. This boom in technology has placed multiple assets are risk from a security stand point allowing hackers/crakers and anyone on the internet to gain access to these network and gain information or try to jeopardize business to a point where it stand stills.
Increase in Denial of service attacks, child pornography, virus/worms and other tools used by individuals to destroy data has lead to law enforcement and media to look into why and how these security breaches are conducted and what new statutory laws are needed to stop this from happening. According to CSI …show more content…

A group of individual’s part of the CISRT team called members will be responsible to handle responsibility of the incident and will monitor different areas of the company. Other members of this team should include Legal help, public relations officers, contractors and other member of management both from business and IT that can help during security breaches.
If an Incident has occurred, it is important to classify this as an incident severity. Most companies use between Severity 1-5. 1 being the highest and 5 being the research phase where no system or user’s are affected. For most system anything under Severity 3 is not a major impact of the system but if there is a system wide issue that requires immediate attention, a severity 1 or 2 would fall under the category of Incident response procedure and set up a high alert.
The cost of an incident can be very high, depending on the loss of data, therefore identifying the risk and all the real threat fall under this category. Once the incident has been identified it should go into the assessment phase, where it should be determined if the system can be bought back up again and how much damage is done. If the business is impacted assessment should be done. The assessment includes forensic investigation usually involving a team of expert that look into the how many computer were affected,

Get Access