Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Information Security Incident Management and Policies

Category: Computer Sciences Paper Type: Report Writing Reference: IEEE Words: 1300

        The information security incident management policies are very significance as far as the computers networks or IT security is concern. Learning the incident response procedure in the organization is normally happen formally in management and meetings presentations and through the reports reviewing and sharing. The security framework inspires association to administer the tension to explore new ideas and what is learnt by people from the previous incidents.

Keywords: information security, incident management policies, Information Security Incident

Introduction of Information Security Incident Management and Policies

            The management policy of security incident is the procedure of managing, identifying, analyzing and recording security incidents or threats immediately. It requires giving a comprehensive and robust vision of any issues related to security in an IT infrastructure. In the information technology and computer security fields, incident management for computer security involves the detection and monitoring of security incidents on a computer network or computer, and the proper responses execution to those incidents. In this research there would be discussing about the information security incident management and policies and how it help the organization to avoid any sort of security violation [1].

Incident Response Practice  of Information Security Incident Management and Policies

            The incident in organization is a violation (or approaching violation risk) of PC security strategies, reliable policies of use, or standard security measures. In this way, service denial, unapproved sharing of delicate data, a malevolent assault on a processing framework or network and the coincidental denial of an imperative report all qualify as incidents [2]. The literature generally have the same opinion that while tackling an incident, IRTs normally connect in 6 stages sequential that are known as preparation, identification, containment, eradication, recovery and follow-up . The follow up purpose is to imitate on the incident controlling experience and recognize ‘learned lessons’ that can be included into procedures of standard operations [2].

How Lessons Are Learned of Information Security Incident Management and Policies

 The Incident Response Process

            The response of the professional incident literature places huge significance on learning post-incident. On the other hand, the focal point tends to be on improving counteractive actions to improving efficiency and lowering cost [3]. Learning the Incident Response Process in the organization is typically happen officially in management and meetings presentations and via the reviewing and sharing of reports. Recognized a lot of challenges that related to practices of learning that includes: a willingness lack to share information related to incident- outside the association (e.g. with industry); poor collaboration and communication between the teams and IRT from other areas of organizational lack of motivation for activities of learning; and  insufficient lessons sharing learnt inside the organizations [3].

The incident management process of Information Security Incident Management and Policies

             An event of information security can be definite as recognized system occurrence, network or service state representative a possible information security breach, failure or policy of controls, or a beforehand unfamiliar state of affairs that might be security appropriate. An incident related to information security is a “series or single of unexpected or unwanted events of information security that have an important compromising probability for business operations and intimidating information security”. The incident management Information security and NIST Special Publication for Incident Handling in Computer Security show up as two of the major guidelines and standards concerning incident in the information security management [4].

             Both of them offers a prepared approach for management of incident, including preparing and planning for response on incident [5]. There is question that what to do when incidents occur, and how to take out learnt lessons afterwards. The SANS guide is quite diminutive and have only an overview of activities depends on every phase [6]. ENISA has disqualified the phase of preparations and only paying attention on the response activities by a team when any incident of violation occurs in the organization [3].

Organizational Learning of Information Security Incident Management and Policies

            The learning in the organizational, as a field of research, inspects how organizations build up information and 'routines' to direct their behaviors. Organizations learning take place at the team, organizational and individual level. Understanding the interaction and interplay among these levels of learning is a main theme in learning of organizational. To meet objectives of the research there are three needs for the framework learning [4]. The framework have to take on a multi-level approach openly linking event responder to stakeholders ( for example senior management security and management team); not be completely cognitive, but connection of the cognition to achievement so unusual patterns in individual recognition security leads to transform in process of security, and  employ double-loop principles of learning [4].

            Only the 4I (interpreting and experimenting, institutionalizing, intuiting and attending, integrating) organizational framework of learning met all 3 requirements. The 4I structure explicitly aim learning at team, organizational and individual levels at the same time as incorporate double loop principles of learning. This framework encourages association to supervise the tension among explore new ideas and exploiting what is learnt by the people. This ‘strategic renewal’ norm of challenge institutional - a mainly useful typical as it is expected that learned lessons from incidents security will challenge culture compliance - a key obstruction to the effective security strategy development [2]

Conclusion of Information Security Incident Management and Policies

            Summing up the discussion it can be said that the In the information technology and computer security fields, incident management for computer security involves the detection and monitoring of security incidents on a computer network The literature generally have the same opinion that while tackling an incident. Learning the Incident Response Process in the organization is typically happen officially in management and meetings presentations and via the reviewing and sharing of reports. Understanding the interaction and interplay among these levels of learning is a main theme in learning of organizational [3].

            The 4I structure explicitly aim learning at team, organizational and individual levels at the same time as incorporate double loop principles of learning. An incident related to information security is a “series or single of unexpected or unwanted events of information security that have a important compromising probability for business operations and intimidating information security. The follow up purpose is to imitate on the incident controlling experience and recognize ‘learned lessons’ that can be included into procedures of standard operations. So it may be said that the computer security management can be improved by employing the policies that are discussed in this research paper.

References of Information Security Incident Management and Policies

[1]

A. Ahmad and S. B. Maynard, "A Case Analysis of Information Systems and Security Incident Responses," International Journal of Information Management · , 2015.

[2]

I. Luke, "What is a cyber security incident?," 23 November 2018. [Online]. Available: https://www.itgovernance.co.uk/blog/what-is-a-cyber-security-incident.

[3]

A. Atif, H. Justin and R. A.B, "Incident Response Teams – Challenges in Supporting the Organisational Security Function," University of Melbourne, Australia, 2011.

[4]

M. Bartnes and M. G. Jaatun, "Information security incident management: Current practice as reported in the literature," Computers & Security , pp. 42 -5 7, 2014.

[5]

H. Susanto, M. N. Almunawar and Y. C. Tuan, "Information Security Management System Standards: A Comparative Study of the Big Five," International Journal of Electrical & Computer Sciences, vol. 11, no. 5, pp. 23- 29, 2011.

[6]

N. Lord, "What is Security Incident Management? The Cybersecurity Incident Management Process, Examples, Best Practices, and More," 12 September 2018. [Online]. Available: https://digitalguardian.com/blog/what-security-incident-management-cybersecurity-incident-management-process.

[7]

I. A. Tøndel, M. Bartnes and M. G. Jaatun, "Information security incident management: Current practice as reported in the literature," Computers & Security, vol. 45, pp. 42-57, 2014.

 

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Top Class Engineers

ONLINE

Top Class Engineers

1218 Orders Completed

Quality Assignments

ONLINE

Quality Assignments

0 Orders Completed

Coursework Assignment Help

ONLINE

Coursework Assignment Help

63 Orders Completed