Computer Security Incident Response Team or CSIRT;
How and why the “team” is established
Debi Bradford
American Public University
Professor Johnny Justice
June 20, 2014
.
Computer Security Incident Response Team or CSIRT;
How and why the “team” is established
Before most of you were born, i.e., 1970’s, computers were something that was talked about, but people didn’t have things such as tablets, laptops or desktops. You heard about places such as IBM and their Big computers that were learning to play chess. For the most part, people were still keeping files by making copies of the original. Copies were kept in a “file” in a “file” drawer of a “file cabinet”. The file cabinets were kept in vaults, if they kept any type of personal information, or they could be locked in a safe. They may be guarded by a security company, or even the US Armed Forces.
Fast forward to the digital age---now people hardly know what a piece of “carbon paper” is. They know how to work a tablet, a laptop, a desktop. Along with learning how to use computer, we have found a way to commit crimes, just as before computers, only this time won’t even need to leave home to do most of the work. Isn’t paper and pencil safer??
With the Internet and e-commerce becoming the way of purchasing for many people, security got much more complicated”. “ (Barr, Builiding Cross-Enterprise Security Teams, 2010)
The purpose of this paper is to show how and why a Computer Security Incident Response Team (aka CSIRT) is established. By explaining the “how” and “why,” people will be able to see that going to back to paper and pencil is not a step they want to take. Computer Security Incident Response Teams (CSIRT) are made up of not only individuals that are specially trained in handling an incident, but there are also others that are on the team with them. Before we get to the makeup of the team let’s look at the reasons for forming a Computer Incident Security Response Team.
It
References: Works Cited Barr, J. G. (2010, 02). Builiding Cross-Enterprise Security Teams. New York, NY, USA. Barr, J. G. (2012). Computer Security Incident Handling. Faulkner Information Services. Borodkin, M. (2001). Computer Incident Response Team. Retrieved from SANS Institute InfoSec Reading Room: www.sansinstitute.com/infosecreadingroom Paul Cichonski, T. M. (2012). U.S. Department of Commerce NIST Computer Security Incident Handling Guide. Washington D.C.: U.S. Government. University, C. M. (2014). Create a CSIRT Incident Management Team. Retrieved from www.cert.org: www.cert.org/Create a CSIRT Incident Management Team