preview

Cyber Crime Case

Better Essays

We know incidents may occur at any time every organization should be ready to attack the incident quickly. Cyber crime which are increasing at faster rate should be controlled to protect the organization, CSIRT is the pillar for any organization should act effectively in responding. As many other developing countries, the internet usage in Colombia has also increased rapidly. The Government of Colombia want to develop CSIRT called ColCERT to secure their organizations.
In Colombia use communication technologies has increased significantly, this raised the country's level of exposure to cyber threats. According to sources the number of Internet users doubled between 2008 and 2010. This ColCERT monitors all the activities helps the …show more content…

CIRTISI
Col-CSIRT
El CSIRT Colombiano
CSIRT-CCIT

ANALYSIS
The aim of the document is deal with cyber threats and protect the information of citizens. Despite the existence of governmental, private, and civil-society initiatives to counter the impact of such threats, an appropriate approach needed to be implemented by Colombia.
At present, Colombia is one of a number of countries that do not have a national cybersecurity and cyberdefense strategy that includes an organizational system and a legal and institutional framework. Columbia has not yet implemented a national CSIRT or CERT.
The increasing number of Internet users, as well as the strong dependence of Colombia's critical infrastructure on electronic media and the considerable rise in the number of cybersecurity incidents and crimes have highlighted the country's high vulnerability to cyber threats, such as use of the Internet for terrorist purposes, sabotage of public services, espionage, and theft, among others.
The CSIRT should be efficient, precise, and automated data analysis. In developing CSIRT we need to consider • How to prepare and store your data
• How to give your operation authority and clarity with a solid logging policy
• What metadata is and why you should care about it
• How to develop and structure incident detection logic into your own playbook Properly developing incident response methods and practices requires a solid plan and a

Get Access