Incident Response: Computer Security System And Data

1089 words - 5 pages

3.6 Incident Response

Incident response is the method for dealing with the security of a computer system when there is an attack. Incident response activities include incident verification, analyzing and containing the attack, collecting and preserving data, fixing the problem, and restoring services. Hence it is very essential to revise the organization's incident response plan and ensure that the differences between the computing environment of the organization and the cloud are addressed. This is a prerequisite for transitioning of applications and data but it is overlooked most of the time.
To ensure security and privacy in cloud computing, it is important for the service provider and the subscriber to collaborate and formulate a well-defined incident response plan. The provisions and procedures of the incident response plan must be finalized before entering into a service contract in order to avoid issues later on. In a particular case, it reportedly took a provider almost eight hours to recognize and start taking action on a denial of service attack against its cloud infrastructure, after the issue was reported by the subscriber.
Incidence response has to be handled such that there is limited damage and with reduced recovery time and cost. For effective incidence response, it is essential to quickly convene a team of representatives that includes members from both the cloud provider and the service subscriber. This is important as the remedy for an attack may involve a single party or require the participation of both parties. Another possible issue that may arise during incidence response is that, resolving the current issue may affect other subscribers of the cloud service. To address this issue, it is vital that the cloud providers follow a transparent response process and share information with the subscribers during and after the incident.
3.7 Availability

Availability can be defined as the extent to which the organization’s set of computational resources is accessible and usable. Availability can be affected either temporarily or permanently, and the losses can be partial or complete. Some examples of threats to availability are denial of service attacks, equipment outages, and natural disasters. Most of these downtimes that occur due to loss of availability are unplanned.

• Temporary Outages. Temporary outages as the name suggests are the loss of availability of services for a short period of time. Even though the architectures are designed to have high reliability and availability, cloud computing services experience outages and performance slowdowns. There are a lot of instances where there have been temporary outages due to natural causes and other service issues. The reliability of a cloud service and its recovery capabilities have to be addressed in the organization’s initial recovery planning to ensure that recovery and restoration happens or if that fails then alternate services, equipment, and locations, are...

Find Another Essay On Incident Response: Computer Security System and Data

Incident and asset management system reports - CIS 227 - paper

716 words - 3 pages S. Chambers Incident and Asset Management An Incident Management is a defined process for logging, and resolving incidents. The objective of an Incident Management is to restore normal operations as quickly as possible, at a cost-effective price. An example of Incident Management can be an Application problem like receiver an error message when trying to access an application or a hardware problem like the system being down. (ITIL-A guide to

Data Input/ Output Methods, Storage Devices and Computer Speed

1999 words - 8 pages A current business has the opportunity to obtain innovative technology to generate its own digital data. Even still, there are several concerns, which should be considered when purchasing computer software or hardware. This paper will cover what method of data input would be best in certain situations and why. Next the paper will explain what method of output would be best for certain circumstances and why. This paper will also explain what

Cyber Security and Surveillance: Bulk Data and Metdata

948 words - 4 pages Subject: Cyber Security and Surveillance: Bulk Data/Metadata Summary: The recent leaks, disclosures, and actions of government agencies – namely the National Security Administration (NSA) – have caught the public’s attention and focused it on the protection of privacy and civil liberties. The NSA participates in a bulk data collection program that has accumulated phone data over the past five years in order to track persons suspected of threat

Computer Programmers And System Analysts Personal Traits

1023 words - 4 pages Computer Programmers work in the field of electronic data processing. They write instructions that tell computers what to do in computers language, or code, that the computer understands. Before actually writing the computer program a programmer must analyze the work request understand the current problem and desired resolution, decide on an approach to use in order to attack the problem, and plan what the machine will have to do to produce the

Networking and Security: Protecting Sensitive Data for Organizations

1265 words - 6 pages “normal” examples also called negative examples. Mostly, machine learning algorithms are practiced on datasets containing both “anomalous” (positive) and “normal” (negative) examples. Intrusion prevention is a preemptive approach to system security which is used to identify potential threats and respond to them swiftly. Like an IDS, an intrusion prevention system (IPS) monitors network traffic or audit data. However, an IPS also has the ability to

Steps To Effectively Respond To A Security Incident And Threats On A Wireless Network

1172 words - 5 pages Steps to Effectively Respond to a Security Incident and Threats on a Wireless Network Incident response is usually one of those security areas that tend to be impromptu—companies don't think about it until they have to. But that needs to change. In this paper I will discuss five steps - identification, containment, eradication, and recovery and follow up a business use to effectively response to a security threat and I will suggest four

Analysis and Research for a data warehouse system

992 words - 4 pages Analysis and Research for a data warehouse system Data warehousing is a difficult system and has to have the capability deliver quality data. An operational database is one which is used by organizations to run its day to day database activities. They are designed to handle rapid transaction processes with systematically updates. Velocity is important to operational databases. They are most commonly operated by office staff, and are on

Explaining the Computer System and Comparing the Products

3327 words - 14 pages class. MINICOMPUTERS Minicomputers may be used as servers in a school to hold data, as minicomputers can generally hold a few terabytes of data. Minicomputers can be used by school to hold the user accounts of each student. A minicomputer would hold around 150 accounts and there would need to be several in a school for each student to have their own account. MOBILE Devices that use a mobile computer system may now be used as an alternative to

Computer Viruses: Infection Vectors, and Feasibility of complete system protection

556 words - 2 pages entrusted to the computer systems throughout the world.A virus can gain access to a computer system via any one of four vectors:1. Disk usage: in this case, infected files contained on a diskette (including, on occasion, diskettes supplied by software manufacturers) are loaded, and used in a previously uninfected system thus allowing the virus to spread.2. Local Area Network: a LAN allows multiple computers to share the same data, and programs

The Components of a Computer and Information Processing System

975 words - 4 pages stored. The brain of the computer is the CPU, or central processing unit. It is used to process all the functions the computer performs. RAM is where data is temporarily stored and accessed and is attached to the motherboard. The motherboard is the most important component; it connects all the other hardware in a computer system. A power supply sends the other hardware power so that they can run. Hard drives are used for permanent file storage. A

Food System and Food Security in BC and Globally

1929 words - 8 pages Food System and Food Security in BC and Globally Currently our food system in BC employs a mixture of ways to obtain food. In 2008, about 45% (less than half) of our food was imported into BC (Ostry, 2010). In that sense, BC seems to be more food secure compared to other provinces and countries. Most of our imports were vegetables, fruits and nuts, and fish (Ostry, 2010). We produce much of our dairy, meats and live animals (Ostry, 2010). Our

Similar Essays

Security Breaches In Comunication And Data Systems

4082 words - 17 pages There are many average security measures that have a major effect in counteracting terrorist activity over the computer; these are things such as firewalls and virus checkers. A company needs to be ready and practical, they need to have set controls and trained professionals in order to prevent a cyber-attack. Cyber security is a moving target, because they never keep the information up for long periods of time. Therefore there should be

Privacy And Security Issues In Data Mining

2342 words - 10 pages to do data mining and classifying the user into some group may result in a variety of ethical issues. In this paper, we deal with two kinds of ethical issues caused by data mining techniques: informational privacy issues in web-data mining and database security issues in data mining. We also look at these ethical issues in a societal level and a global level. Informational Privacy Issues in Web-data Mining There is a debate between the benefits

Customer Data And Security Breach Ligitation

1214 words - 5 pages In re Zappos.com, Inc., Customer Data Security Breach Litigation, No. 3:2012cv00325, was a case held in United States District Court for the District of Nevada in which the Court supposed that the customers of Zappos.com were not held to the browse wrap terms of use due to their ambiguous nature and also held that the agreement was not enforceable since Zappos had earmarked the right to make changes in it at any time without notifying the

Security And The International System Essay

790 words - 3 pages development rather than military forces. With nations cooperating with one another for economic progression rather than competing, traditional international instruments became less important. Military force, diplomatic pressure, and alliances are all actions for the security of a nation. With the relatively assertive United States at the head of a uni-polar international system, there was no need for significant military expenditures, and