Computer Forensics
Computer Forensics 641
11/1/2012
• Abstract
In this document, the importance of security incidents is expressed as a high priority for any business that may possess valuable information. Computer networks are attacked more now than they have before, and in large numbers. There is a high demand for security within Information Technology to ensure that businesses, as well as their clients, do not fall victims to attacks that may compromise their assets. The categories of incidents explain the levels of risk according to the type of incident, as well as what classifies the incident levels. Security incidents are a major part of today’s world, and this document states the issues concerning the rise of e-commerce and products, such as software, that require access to the internet. Concluding the document is a brief example on how to identify and how to prevent a security incident by informing the reader what to look for as a potential threat and how to minimize vulnerabilities within a network.
• Keywords security incidents, categories of incidents, identify incidents, prevent incidents
• Table of Contents
➢ Security Incidents ……………………………………………. 4
➢ Categories of Incidents ……………………………………… 5
➢ Security Issues in Today’s World …………………………… 6
➢ How to Identify a Security Incident ………………………… 7
➢ How to Prevent a Security Incident ………………………… 8
➢ Conclusion …………………………………………………… 9
➢ References …………………………………………………… 10
• Security Incidents
Security incidents are imminent threats of violation of computer security policies, acceptable use policies, or standard security practices such as evidence of data tampering, unauthorized access or attempts at unauthorized access from internal and external sources, threats and attacks by an electronic medium, defaced Web pages, detection of some unusual activity such as malicious code or modified
References: Works Cited Cichonski, P. M. (2012). Computer Security Incident Handling Guide Revision 2. Gaithersburg, MD: NIST (National Institute of Standards and Technology). Diaz-Gomez, P. V. (2010). Internal Vs. External Penetrations: A Computer Security Dilemma. Lawton, OK: Computing & Technology Department, Cameron University. EC-Council Press. (2010). Computer Forensics Investigation Procedure & Response. Clifton Park, NY: Course Technology Cengage Learning. Miles, G. (2001). Incident Response Part #2: Identification. Colorado Springs, CO: Security Horizon.