Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

Computer Security IR

Introduction to the Article

This article proposed and evaluated a model for building a computer security incident response capability. The authors used a case study research method to examine the use of the model in a large manufacturing organization. The model proposed in this article would be helpful for organizations who are interested in developing a computer security incident response capability. The model is based on the Incident Command System and includes five elements: organizational structure, task forces, information sharing, training, and exercises.

Models

The authors evaluate existing computer security incident response capability (CSIRC) models. The CSIRC models are evaluated to determine how they can contribute to developing a comprehensive management model for CSIRCs (Kassim et al., 2022). The authors find that the CSIRC models can contribute to developing a comprehensive management model for CSIRCs. The authors also find that the CSIRC models can be used to guide the development of a CSIRC (Mooi et al., 2016). The authors conclude that the CSIRC models can be used to develop a comprehensive management model for CSIRCs. The evaluated models can guide the design, implementation, and assessment of CSIRCs.

Recommendations for Wilmington University Library

Wilmington University Library should consider implementing an incident response plan tailored to meet the specific needs of its students and faculty. Wilmington University Library should also consider implementing additional measures to improve communication and stakeholder engagement. Finally, Wilmington University Library should consider implementing a more flexible model that allows for different levels of incident response capability and scalability. These modifications would make the plan more effective in addressing the unique needs of Wilmington University Library.

Risks and Recommendations

According to Mooi et al. (2016), the risks that would need to be considered when developing an IR plan for the Wilmington University Library include potential Cyber-attacks that could disable the Library’s systems or steal sensitive data, natural disasters that could damage or destroy the Library’s physical infrastructure, loss of power or other utilities that could disrupt operations, staff or patron injury or illness, data loss, information theft, and system crashes.

To mitigate these risks, the Library’s Incident Response Plan should address these potential scenarios and outline the steps to be taken in response. The Library should implement measures such as password protection and firewalls. The Library should develop an incident response plan tailored to meet its specific needs, including procedures for responding to data loss, information theft, and system crashes (Mohd et al., 2022). Also, the Library should regularly review and update its IR plan to ensure it is current. For example, the plan could recommend that staff disable systems in the event of a cyber-attack, evacuate the building in case of a natural disaster, and provide instructions for reporting injuries or illnesses. Additionally, the plan should identify which outside entities would be responsible for responding to each type of incident and list contact information for those entities.

Conclusion

The incident response plan should address each potential scenario that could affect an organization, service, or Library and outline the response steps. Additionally, the plan should identify which outside entities would be responsible for responding to each type of incident and list contact information for those entities. A well-crafted Incident Response Plan will help protect an institution or a company from potential risks and ensure operations are maintained during difficult times.

References

Kassim, S. R. B. M., Shamsuddin, S. B., Li, S., & Arief, B. (2022, June). How National CSIRTs Operate: Personal Observations and Opinions from MyCERT. In 2022 IEEE Conference on Dependable and Secure Computing (DSC) (pp. 1–2). IEEE.

Mohd Kassim, S. R. B., Shamsuddin, S. B., Li, S., & Arief, B. (2022, September). How National CSIRTs Operate: Personal Observations and Opinions from MyCERT. In the Institute of Electrical and Electronics Engineers. IEEE.

Mooi, R. D., & Botha, R. A. (2016). A management model for building a computer security incident response capability. SAIEE Africa Research Journal107(2), 78–91.

 

Don't have time to write this essay on your own?
Use our essay writing service and save your time. We guarantee high quality, on-time delivery and 100% confidentiality. All our papers are written from scratch according to your instructions and are plagiarism free.
Place an order

Cite This Work

To export a reference to this article please select a referencing style below:

APA
MLA
Harvard
Vancouver
Chicago
ASA
IEEE
AMA
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Need a plagiarism free essay written by an educator?
Order it today

Popular Essay Topics