Incident Management - Computer Security Incident Management

Computer Security Incident Management

Today, an important role is played by a Computer Security Incident Response Team (CSIRT), due to the rise of internet crime, and is a common example of incident faced by companies in developed nations all across the world. For example, if an organisation discovers that an intruder has gained unauthorized access to a computer system, the CSIRT would analyze the situation, determine the breadth of the compromise, and take corrective action. Computer forensics is one task included in this process. Currently, over half of the world’s hacking attempts on Trans National Corporations (TNCs) take place in North America (57%). 23% of attempts take place in Europe. This makes CSIRT a highly prominent player in incident management.

Read more about this topic:  Incident Management

Famous quotes containing the words computer, security, incident and/or management:

    The Buddha, the Godhead, resides quite as comfortably in the circuits of a digital computer or the gears of a cycle transmission as he does at the top of a mountain or in the petals of a flower.
    Robert M. Pirsig (b. 1928)

    A well-regulated militia being necessary to the security of a free State, the right of the people to keep and bear arms shall not be infringed.
    Second Amendment, U.S. Constitution (1791)

    “It is of the highest importance in the art of detection to be able to recognise out of a number of facts which are incidental and which are vital.... I would call your attention to the curious incident of the dog in the night-time.”
    “The dog did nothing in the night-time.”
    “That was the curious incident.”
    Sir Arthur Conan Doyle (1859–1930)

    People have described me as a “management bishop” but I say to my critics, “Jesus was a management expert too.”
    George Carey (b. 1935)