Discussion And Response: Ways Organizations Have Built A CSIRT Discussion Question
Search “scholar.google.com” or your textbook. Include at least 250
Discussion And Response: Ways Organizations Have Built A CSIRT Discussion Question
Search “scholar.google.com” or your textbook. Include at least 250 words in your reply. Indicate at least one source or reference in your original post. Discuss ways organizations have built a CSIRT. What are the components to building an effective and successful CSIRT team?
– One original post at least 250 words response to the discussion question. Indicate at least one source or reference in APA 6 formatted, which means you MUST INCLUDE in-text citation.
– Two replies to the two attached posts at least 250 words each. by Sravya Sree Kalle
The organizations have to work for the best experience of the employees and provide them with foolproof security, for that a CSIRT plan is needed which make sure that employees are safe and company’s database is secure. The management support is always needed in order to cope with the security issues. The funding, resources and time is provided by the experts to enhance the security. The relevant information is gathered from all the employees and provide them a secure portal to access the company’s database. The virus scanners must be used so that there is no chance of phishing and faulty emails (Matthews, 2018). The awareness programs can also help in creating a stronger ecosystem where employees know what’s right and what’s wrong. The CSIRT system of company also includes the software’s that are reliable to use and which are secured from phishing. The techniques also includes the involvement of updated technology like block chain technology which secures the system like no other system in the world. The system must remain in direct communication with the CSIRT handling team and thus this stronger team can protect the system. There are examples of cyber-attacks in past where whole company’s database is been hijacked, so a secure backup system must be in placed to tackle this issue (Ruefle, 2007).
References
Matthews, T. (2018). The Complete Guide to CSIRT Organization: How to Build an Incident Response Team. The Complete Guide to CSIRT Organization: How to Build an Incident Response Team, 32.
Ruefle, R. (2007). Defining Computer Security Incident Response Teams. Build Security In, 54