Saturday, September 28, 2019
Gem Infosys Case Study Example | Topics and Well Written Essays - 500 words
Gem Infosys - Case Study Example Among the key actions are the formulation of a security response team and a policy on the recovery process. The security response team will be designed to respond to any security breaches. The team members must be responsible and endeavor to work in order to prevent security breaches. They should be available anytime time and even stop any work they are doing that is underway in order to deal with the impending incidence. The response team should be formed by the organizational employees. Each department should be represented in the response team to ensure a holistic approach in deterring the incidences. In order to function optimally, the team should be bestowed with the authority to make the decisions that are needed in order to prevent the threat or resolve the actual malware attack (Runciman, 2011). The team should have a leader that will help in conducting and directing the affairs of the group. The team should be trained on the response activities that are involved in ensuring security of the group. Key among them is staging fire drills. The internal exercises will be essential in determining the holes that can be the entry of the malware into the system. In order to save the cost of operating a team, the organization can hire an outside response team. It is much cheaper for the fact that the team will only have to deal with the actual security threats unlike the internal organization that has to deal with firewall management, changing user accounts and passwords, or reviewing log files. However, outsourcing the response team has its disadvantages for there is no effective and timely incidence response like in the case of the internal response team. The disaster recovery process involves getting the files and programs that have been compromised back into use. The files and disks are loaded back into the servers for use again. In the policy, the recovery team
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.