Preview

Computer Security Breach

Good Essays
Open Document
Open Document
870 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Computer Security Breach
Bad things can happen at any place and any time when talking about computer security incidents. Not everything goes perfectly fine when a computer system is involved. It could be something as simple as a bad cable or it could be as horrible as a hacker trying to steal all of your information. Either way, it probably isn’t going to end well.
Additionally, the FBI and the Computer Security Institute, in their annual survey on computer crime and information security, gathered the following disturbing facts in 1998: 1) 64 percent of respondents reported a security breach in 1998 — up 16 percent from the previous year; 2) security breaches cost the respondents who could quantify losses a total of $136,822,000 — up 35 percent over the previous year; 3) 18 percent of respondents had no idea whether or not they had been hacked; 4) only 38 percent of respondents had a written intrusion policy, and only 22 percent had an evidence handling policy; 5) 74 percent of respondents reported attacks from inside their networks, and 70 percent reported attacks
…show more content…
During this stage, an initial investigation is begun. Basic details of the incident are logged and recorded. The CSIRT is brought in and the information and reports are relayed to them. The CSIRT notifies management or the supervisors of what occurred and what their next step will be.
The next step is Formulating a Response Strategy. Based on the results of all the known facts of the investigation, the CSIRT will determine the best response to the incident and will receive approval from the management of the supervisors to pursue any type of legal or administrative action.
The next step is Reporting. It is exactly what it sounds like. During this stage, reports are put together that explain in great detail every piece of information that was gathered about the incident, how it occurred, and what the response was. These reports are given to the management or supervision

You May Also Find These Documents Helpful

  • Powerful Essays

    mdaniels IS3110 week5quiz

    • 1535 Words
    • 6 Pages

    Develop incident response procedures – Procedures of how they will respond to any types of incidents.…

    • 1535 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Unit 11 P4 Answers

    • 1172 Words
    • 5 Pages

    The officer/ supervisor, takes control, investigates, decides on action to take. If necessary, the officer/ supervisor will instruct other staff to evacuate the area or building and then contact the emergency services, meet emergency services give relevant…

    • 1172 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 009, Outcome 9.3

    • 293 Words
    • 2 Pages

    3.2.B. Outline the actions to take in response to in the following situations; security incident…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A number of procedures may follow as a result of an incident e.g. measures put in place on other sites or an independent investigation launched for the incident.…

    • 9650 Words
    • 39 Pages
    Good Essays
  • Satisfactory Essays

    The next step after presentence investigation would be the intake procedure which is a settlement process in which a probation officer works with the defendant. All the information gathered during the presentence investigation will be revealed to the…

    • 647 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    p1 unit 14

    • 782 Words
    • 4 Pages

    As a new recruit working in a public service you have been asked to investigate the response to emergency service incidents.…

    • 782 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Crime scene investigators oversee a myriad of complex crime scenes such as armed robberies, home invasions, homicides, sexual assaults, and other property crimes. The CSI created a crime scene perimeter before investigating. CSI is responsible for collecting, documenting, securing, and properly storing all of the evidence found at a crime scene. Processing a crime scene can be a tedious process that takes several hours, and CSIs must pay careful attention to every detail to avoid overlooking critical evidence. The entire scene can and will be photographed, either by the CSI, as the evidence is collected. CSIs must follow strict protocols for collecting trace evidence such as hair, fibers, glass, paint, or dirt in order to maintain integrity of the chain of evidence. They record each item that found, including its location and any other pertinent information, and catalog and seal the item for transportation to the lab.…

    • 822 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Addressing the immediate families of those involved would be first. Realizing and establishing how delicate the situation is, is an essential factor of this equation. The ideal thing would be to gather a team who has been trained in this area and Addressing the immediate families of those involved would be first. Realizing and establishing how delicate the situation is, is an essential factor of this equation. The ideal thing would be to gather a team who has been trained in this area and Addressing the immediate families of those involved would be first. Realizing and establishing how delicate the situation is, is an essential factor of this equation. The ideal thing would be to gather a team who has been trained in this area and contact each family member via phone due to the large number of employees…

    • 1004 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 5 Assignment

    • 349 Words
    • 1 Page

    A computer forensic investigation has three phases. List what they are and describe the activities that happen in each phase. The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    chic paints limited

    • 10813 Words
    • 38 Pages

    6) Instances of misconduct will be investigated by AAT and appropriate action will be taken.…

    • 10813 Words
    • 38 Pages
    Powerful Essays
  • Satisfactory Essays

    Ct236 Answers

    • 412 Words
    • 2 Pages

    Investigation; for issues that have not been resolved at the frontline or that are complex, serious or ‘high risk’. A definitive response provided within 20 working days following a thorough investigation of the points raised. Sensitive complaints that meet set criteria may have the opportunity for additional internal…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Reporting, recording are the steps needed to ensure that any form of safeguarding or protection issues are dealt with immediately and correctly.…

    • 968 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Incident Command System

    • 1697 Words
    • 7 Pages

    As the active situation is secured, resolved, or terminated, the ICS will go from responding to investigating the incident and informing press about the incident as well. The last key concept is span of control.…

    • 1697 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Full written report as soon as possible after the event including everything you observed, everything you have been told, any previous concerns you may have had, what has raised your concerns on this occasion…

    • 752 Words
    • 4 Pages
    Good Essays
  • Good Essays

    As I read an article written by Mr. Mathew J. Schwartz, dated March 12. 2012, for InformationWeek via darkreading.com, and ponder the strength of the subject matter discussed, I asked myself the question when does attack prevention begin? The question does present an abstract yet requires that careful thought be exercised when approaching information security breaches, and how to prevent attacks; a technological melancholy with very expensive associations.…

    • 639 Words
    • 3 Pages
    Good Essays