Preview

Incident Response Plan

Better Essays
Open Document
Open Document
930 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Incident Response Plan
In the age of rapidly evolving technology, it is important for all businesses, large or small, to have an incident response plan (IRP) set in place in the event of a cyber-attack. The idea of an IRP is based on preparing for and responding to unforeseen, negative events that may affect a business or organization. Today, it is more of a question of when these cyber-attacks will occur rather than if they will occur. The IRP incorporates many fundamentals to help in these instances, such as, prevention, preparation, planning, incident management, recovery, mitigation, remediation, post incident analysis, and lessons learned. It is recommended that XYZ Retail Company implement the following guidelines to best prepare for a cyber-attack. The …show more content…
The Executive and Board of Directors may receive some form of notification whether through an alert or directly from an employee whose computer is not acting correctly. Once an event is deemed and incident, it is crucial to identify the source and type of incident so that proper response actions may begin. The IRT should be notified and informed of the findings thus far so that the team may begin their response process. Also, if the source or type of incident seeks legal attention, it is best to contact law-enforcement early in the process to begin investigations. Correspondingly, it is recommended to begin documentation as early as the first notification and document each step of the process to follow because it will help significantly …show more content…
With that being said, the plan needs to be practiced and tested regularly in order to detect flaws or just simply to improve timeliness. Technology evolves so quickly that these plans must stay up to date as well. References
N., & C. (2010, October 9). Recommended Practice: Developing an Industrial Control Systems
[PDF]. US Department of Homeland Security.
ODell, P. L. (2014). Cyber 24-7: Risks, Leadership, Sharing. Place of publication not identified:
Createspace Independent.
Spidalieri, F. (2015) Fundamentals of Cybersecurity for Managers, Management of Cyber
Opportunities and Threats. Burlington: Jones & Bartlett

You May Also Find These Documents Helpful

  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    This disaster plan was put together to try and protect valuable information should it be attacked by hackers or threatened by a natural disaster. As this company grows, so will the value of the network and the information it retains. We want to ensure to the customer and the employee that this information is safe and not vulnerable to an attack. This plan was devised to help protect against failures such as the complexity of the system, accidental failure or a breech by hostile intent.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    References: Chandler, R.C., Wallace, J.D., & Feinberg, S. (2007). Six points for improving crisis communication plans. Retrieved December 11, 2014 at http://its-networks. com/pdfs/White_Papers/tandberg/tandberg-whitepaper-crisis-business-communications.pdf.…

    • 937 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Printing and Photocopier

    • 2280 Words
    • 6 Pages

    When it is a computer fault the IT department are responsible if it is a hardware failure, they will be able to pinpoint the problem and fix it more easily as they are experts in this field. I am not qualified in this area and could make things worse if I tried to fix it myself therefore it is my responsibility to report it to the IT department. However if it is a software failure it is the responsibility of e-know as they are our network providers and all our documents and software such as outlook are provided through e-know. They are specially trained to help talk us through how to fix the fault if it is just for an individual computer they can also take control of the computer session and fix the problem that way. However if there is a fault with everyone’s computer this could be a fault with e-know and that is their responsibility to fix and to let us know if the system isn’t working, they liaise with our IT department to ensure they are able to contact and inform us of these faults.…

    • 2280 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    The key elements of a disaster recovery plan are to keep computers running, meeting all agreements between customers and suppliers, and being proactive rather than reactive. Keeping the computers and systems running is an essential element to the disaster recovery plan. The systems and computers are the link to the services they provide. The business relies on the internet for their marketing or sales needs, especially in today’s world of business. Meeting the agreements between customers and suppliers is essential because they trust your business will deliver these services. Being proactive rather than reactive is always a good thing for a business to have. The employees or personnel should already know what to do when…

    • 665 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    You have been hired as a consultant by your town’s emergency management coordinator to help develop emergency action plans. One of the reasons you were selected is your expertise in using the General Behavior Model (GEBMO) to assess risks. Your first task is to assess the hazardous material risks at a local gas station. The station has one 30,000-gallon underground storage tank compartmentalized to hold 10,000 gallons each of the three gasoline grades, and there is one additional 10,000-gallon tank for diesel fuel. The station has four pumps, and each one can deliver all four products. Also on site is a 2,500 sq. ft. concrete block building used for the cashier and retail sales of service station and…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Gregg Shafel Case Summary

    • 422 Words
    • 2 Pages

    Technology innovation and global competition are two essential aspects of modern business, as a result companies invest a great deal in these areas (LeClair, 2000). It is imperative for senior management, like Steinhafel and his senior managers, to identify the information important to their business and which information is most valuable so that they can develop an IT infrastructure to protect those assets and then educate, inform, and train employees in a way that fosters a culture in which security is a priority (Dutta, 2002). With planning, innovation, and training a company can face the ever changing threats of the cyber world with increased confidence and thereby gain the confidence and business of their customers (Dutta,…

    • 422 Words
    • 2 Pages
    Good Essays
  • Good Essays

    At approximately 4:30 a.m. on January 12, 2009, iPremier’s website suffered a Distributed Denial of Service (DDoS) attack. A DDoS attack is a method used by mischievous hackers to force a computer resource to stop responding to legitimate users. The hacker achieves this by taking control of a fleet of remote computers, often referred to as “zombies”, in order to send a flood of network traffic to a specific target, in this case, iPremier’s website. The website quickly becomes so overwhelmed dealing with the attacker’s traffic that it essentially locks up, preventing users from accessing the site. (1) After discussing the attack with Bob Turley, CIO, and the IT department, it’s apparent that the website was not prepared for such an attack, as users couldn’t enter the website for approximately one hour and sixteen minutes. Management of iPremier must adjust the company’s IT protocol if the company is to prevent further cyber attacks. In order to accomplish a more secure data system, we suggest management hire a well-known IT specialist to evaluate the situation and give professional advice on how to implement a strong defense. We also advise management to dissolve iPremier’s relationship with Qdata and establish a search team to find a new top notch IT service provider.…

    • 821 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The essence of global supply chains require that businesses large and small, exchange information of a precarious nature with numerous suppliers, several of which are vastly removed from the manufacturer. A company’s ability to protect sensitive information fluctuates based on the needs of the organization. Businesses and government have all adapted to the world of cyber connectivity, and are all garnering the benefits from social networking and ecommerce. The risks involved with maintaining good cyber-security continue to grow as senior managers and world leaders try to find better sources of dealing with internet predators. Large corporations have intricate supply chains with numerous external suppliers, which make it hard to address all of the risks associated with dealing with each one. With the continued growth of the internet and new information technology, internet scammers have made a concentrated effort to take advantage of any possible weaknesses within a company’s computer infrastructure. Maintaining and enforcing excellent cyber-security measures is at the top of the list for most businesses around the world.…

    • 928 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    Whitman, M., & Mattord, H. (2010). Management of Information Security (third ed.). Pittsburgh, PA: Cengage Learning.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    These incidents must be reported immediately to the person in charge followed by communication to…

    • 342 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    In the past few years there have been many instances of restaurants serving vegan food that was not entirely vegan. Whether it was beans cooked with bacon or salad dressing with traces of fish oil, these crises have become more prevalent.…

    • 880 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Penetration Plan

    • 2140 Words
    • 9 Pages

    This Vulnerability and Penetration Test Plan is designed specifically for E-commerce Sales and is designed to determine what steps need to be taken to secure and protect the network against malicious attacks. This Vulnerability and Penetration Test will cover numerous aspects of the E-commerce Sales information technology infrastructure including the production e-commerce web application server and the Cisco network. The e-commerce web application server will act as the external point of entry into the WAN and LAN where the following occurs:…

    • 2140 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    iPremier a web based company founded in 1996, and located in Seattle, Washington, experienced a outage or denial of service attack in the early monring on January 12th. The disturbance in the iPremier web site occurred as an individual was able to get past the iPremier’s firewall. When instances like this occur in organizationss the disruption greatly impacts operations an can potentially expose an organization to legal issues as data can be compromised. When an event like this occurs in an organization, the first question asked post mortum is how can we prevent his from happening again. From iPremier’s perspective there are a few steps that can be taken.…

    • 504 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Dos Attack Case Study

    • 749 Words
    • 3 Pages

    Develop a response team—for a B2C internet retailer, it is important to have a response team set up and onboard with attack issues. This will minimize the “runaround” that is received as the team will be able to initiate responses quickly and…

    • 749 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Mintzberg’s Model

    • 2732 Words
    • 11 Pages

    It becomes obvious that one cannot persist exactly on what was planned. There are to many internal and external influences in the process that render it necessary to adjust the intended strategy. On the other hand this does not necessarily mean that planning is useless at all. Planning is not necessarily about formalized analysis, but about “thinking before doing.” Thus, we can state as follows:…

    • 2732 Words
    • 11 Pages
    Powerful Essays

Related Topics