Why choose us?

We understand the dilemma that you are currently in of whether or not to place your trust on us. Allow us to show you how we can offer you the best and cheap essay writing service and essay review service.

Security Policies and Implementation Issues

Security Policies and Implementation Issues

Research and find the details of a computer / IT Incident Response Team. Compare their requirements to
what was outlined in Chapter 12. Write a 300 word (about two paragraphs) commentary on what you


Security Policies and Implementation Issues

An incident response team adequately prepares a response to any emergency, which may
include business interruptions or natural disasters. A computer emergency response team, experts

Running Head: Security Policies and Implementation Issues 2
with vast computer knowledge, handles computer security issues, risks, and incidents. Private
entities, organizations and government operations all depend on computers in their day-to-day
business operations, and they risk substantial losses in the event of occurrence of computer
vulnerabilities and insecurities during their operations. These organizations stand to lose valuable
data and sensitive documents which could be corrupted or even land into unwanted hands. The
organizations and enterprises utilize the services of computer emergency response team
organizations, which come up with standard policies to oversee and implement them by using
adequate steps to resolve cyber security incidents. CERTS and CSIRT are some of the examples
of incident response team (Guttman et al., 1995).  
Thread response is a structured requirement where computer emergency response team
tends to search for the origin of the cyber security incident, they evaluate this using past
occurrence of cyber insecurity threats while according to chapter 12 IRT’s responses team use
various categories that assess threat levels such as Malicious code, Denial of services,
Unauthorized access, and inappropriate usage. Asset response is also a requirement that
primarily focuses on the financial impact of a cyber security threat to an organization it may have
a cascading effect on both the internal and external stakeholders, while in chapter 12 an incident
report support services is a broad category to mean any team that supports organization’s
information technology that helps customers during the incident (West-Brown et al., 1998).
Intelligence support is also a requirement that is required by the CERTS. CERT and
CSIRT also consider affected entities and are fully aware of what the law requires in the process
of working on cyber security threats, and this helps in classification of incidents while in chapter
12 a response team develops a classification system that meets legal and regulatory obligations
(West-Brown et al., 1998).


Running Head: Security Policies and Implementation Issues 3
Guttman, B., Roback, E., (1995).  An Introduction to Computer Security: the NIST Handbook.

All Rights Reserved, scholarpapers.com
Disclaimer: You will use the product (paper) for legal purposes only and you are not authorized to plagiarize. In addition, neither our website nor any of its affiliates and/or partners shall be liable for any unethical, inappropriate, illegal, or otherwise wrongful use of the Products and/or other written material received from the Website. This includes plagiarism, lawsuits, poor grading, expulsion, academic probation, loss of scholarships / awards / grants/ prizes / titles / positions, failure, suspension, or any other disciplinary or legal actions. Purchasers of Products from the Website are solely responsible for any and all disciplinary actions arising from the improper, unethical, and/or illegal use of such Products.