Post a total of 3 substantive responses over 2 separate days for full participation. This includes your initial post and 2 replies to classmates or your faculty member.
Due Day Thursday
No matter how an organization breaks up the incident response management process, the incident report team must have clear roles and a clear plan of action.
Respond to the following in a minimum of 175 words:
Discuss a policy and/or procedure regarding incident response priorities that an organization should have in place for its IT team. Share the circumstance, the potential policy, the team member(s) affected, and how it helps protect the organization.
Provide proof of your research to support your position.
Due Monday
Post 2 replies to classmates or your faculty member in a minimum of 100 words each. Be constructive and professional.
Reply 1 Papy Mulongo:
Based on my experience I will relate about the incident happened on my work during the migration to new dispatch work system, how the team member and customer was affected, what should be done to prevent the functional impact.
it is about the phone application called the Techmobile that allows technicians to receive work order from phone, with details and to go to ehe customer site to install or resolve the technical issue.
The application has as roles :
To clock in the technician,
To status the job,
to provide details on clients service requested
to add, remove or swap equipment in the customer account.
The software was shutdown by mistake during upgrade, for couple days, the restoration took weeks to get full recovery back.
the incident causes functional impact due to absence of technician to reach customer location to resolve problem, with miilions customer, the company lost some customer because lake of assistance during weeks.
this incident could be avoid if the IT teams established the appropriate recovery plan to prevent the outage of system, by PRIORITIZATION and prevent alternative application before upgrading the. new one.
following the site https://www.cisa.gov, https://www.cisa.gov/detection-and-prevention the company should work with the
Hunt and Incident Response Team (HIRT). HIRT provides incident response, management and coordination activities for cyber incidents occurring in the critical infrastructure sectors as well as government entities at the Federal, State, Local, Tribal, and Territorial levels. HIRT works with its constituents to identify and contain adversary activity and develop mitigation plans for removal and remediation of root cause. HIRT provides technical expertise and capacity to its constituents in responding to incidents.
Reply 2 William Bracey:
An incident response team should have a group responsible for planning and responding to IT incidents including system failures, cyber attacks, data breaches and any thing else that would interfere with the process of progress in regards to IT. The technical team will consist of. An Executive sponsor, incident responders, communication coordinators, forensic sector, consultants to handle the outside sources and legal representation. All of them team members will be affected when dealing with policy as it also protects the organization. It is important to create a incident response team includes the development a proactive incident response plan testing and resolving vulnerable systems and maintaining strong security practices. https://www.techtarget.com
https://www.cynet.com
Computer security incident response team is an assorted team of IT professionals that is responsible for preventing detecting and responding to all incident security events and or incidents.
Security operations center covers a broader scope of security. They are responsible for directing incident responses along with monitoring, configuring, and defending systems. It is important to build a team that covers all of the bases in security measurements.
Place this order or similar order and get an amazing discount. USE Discount code “GET20” for 20% discount