Security and Cyber Crime

295 views 2 pages ~ 371 words
Get a Custom Essay Writer Just For You!

Experts in this subject field are ready to write an original essay following your instructions to the dot!

Hire a Writer

The incident resolution period is a sequence of stages that a real safety situation is passing through from the moment it is recognised as a safety compromise or a case to the time it is handled or recorded. It serves as a systematic approach to resolving and treating the effects of a security violation with a view to handling the condition in a way that restricts and reduces the recovery time and costs (Edelson, 2003). The four main phases of the cycle include planning, resistance, detection and response.

The four phases show certain parallels when applied in an organisation. First, they both seek to make it possible for an enterprise to be competitive in its data security activities. On the same note, they all call for the application of organizational resources during their implementation, and each phase is part of the larger cycle. Equally, the phases have some differences that make them distinct from one another. The "plan phase" involves comprehending the threats an organization is expected to encounter and the degree to which the current organizational condition is susceptible to the threats (Zeltser, 2010). The resist phase encompasses security technologies that aim to sieve undesirable system traffic in both incoming and outgoing directions. On the other hand, the "detect phase" encompasses having discernibility into the state of the situation at all altitudes of IT structure. Equally, the "respond stage" encompasses comprehending the incident’s scope, enclosing the state, exterminating the invader’s presence, and recuperating from the event.

I do not think that any phase of the sequence is more important than others. The phases are all important since each is part of the larger cycle and they play important parts in navigating the security. It should be noted that by concentrating on one of the phases by viewing it to be more important than the others may lead to a security compromise through the other phases that were not taken into consideration.

References

Edelson, E. (2003). Incident Response: Breaking it Gently. Computer Fraud & Security, 2003(9), 6-8. http://dx.doi.org/10.1016/s1361-3723(03)09007-9

Zeltser, L. (2010). SANS Digital Forensics and Incident Response | The Big Picture of the Security Incident Cycle | SANS Institute. Digital-forensics.sans.org. Retrieved 12 March 2017, from https://digital-forensics.sans.org/blog/2010/09/27/digital-forensics-security-incident-cycle

October 12, 2022
Category:

Life Crime Economics

Subcategory:

Hero Workforce

Number of pages

2

Number of words

371

Downloads:

44

Writer #

Rate:

4.1

Expertise Organization
Verified writer

Nixxy is accurate and fun to cooperate with. I have never tried online services before, but Nixxy is worth it alone because she helps you to feel confident as you share your task and ask for help. Amazing service!

Hire Writer

This sample could have been used by your fellow student... Get your own unique essay on any topic and submit it by the deadline.

Eliminate the stress of Research and Writing!

Hire one of our experts to create a completely original paper even in 3 hours!

Hire a Pro

Similar Categories