Answered You can hire a professional tutor to get the answer.

QUESTION

Compose a 500 words assignment on gem infosys. Needs to be plagiarism free! Malware Attack Incidence Response Affiliation Incidence response Introduction The tackles the functions and membership of as

Compose a 500 words assignment on gem infosys. Needs to be plagiarism free! Malware Attack Incidence Response Affiliation Incidence response Introduction The tackles the functions and membership of asecurity response team in case of a malware attack. Moreover, the paper gives highlights on the recovery process and the plan to maintain the malware free environment

Malware attack is major incidence on the information systems in various organizations. Deterring and responding to the attack is important to keep the company from losing a lot more revenues. Two days net down is quite a long time for a company in business. That means the company lost so much revenue due to the inactivity of the systems. To mitigate the severity of the occurrence and the net down time, the following policy is essential. Among the key actions are the formulation of a security response team and a policy on the recovery process.

Response team development

The security response team will be designed to respond to any security breaches. The team members must be responsible and endeavor to work in order to prevent security breaches. They should be available anytime time and even stop any work they are doing that is underway in order to deal with the impending incidence. The response team should be formed by the organizational employees. Each department should be represented in the response team to ensure a holistic approach in deterring the incidences. In order to function optimally, the team should be bestowed with the authority to make the decisions that are needed in order to prevent the threat or resolve the actual malware attack (Runciman, 2011).

The team should have a leader that will help in conducting and directing the affairs of the group. The team should be trained on the response activities that are involved in ensuring security of the group. Key among them is staging fire drills. The internal exercises will be essential in determining the holes that can be the entry of the malware into the system. In order to save the cost of operating a team, the organization can hire an outside response team. It is much cheaper for the fact that the team will only have to deal with the actual security threats unlike the internal organization that has to deal with firewall management, changing user accounts and passwords, or reviewing log files. However, outsourcing the response team has its disadvantages for there is no effective and timely incidence response like in the case of the internal response team.

Recovery process

The disaster recovery process involves getting the files and programs that have been compromised back into use. The files and disks are loaded back into the servers for use again. In the policy, the recovery team should monitor the disks and the computers for at least twenty-four hours to ensure they are working properly before they are transferred to the end users in the organization.

Continuity plan

A business continuity plan is drawn from the follow-up made on the incidence. There should be scrutiny of the instruction and detection of the incidences. There should be recording keeping on the actions put in place and the outcomes. The information and the outcome will be useful in deterring further occurrences similar to the one that occurred in the process. The actions will be useful in preventing a similar incidence and even strategizing (Preda, Christodorescu, Jha, & Debray, 2008).

.

Conclusion

Net down can be compromising to the organization. Therefore, swift action to deterring it is very crucial. Prepared policy is more important for it gives clear guidance to the response team on that they should do. Hence, they will take minimal time in combating the incidence.

Reference

Preda, M. D., Christodorescu, M., Jha, S., & Debray, S. (2008). A semantics-based approach to malware detection. ACM Transactions on Programming Languages and Systems. doi:10.1145/1387673.1387674

Runciman, B. (2011). Malware response. ITNOW. doi:10.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question