Computer Security Incident Management
Today, an important role is played by a Computer Security Incident Response Team (CSIRT), due to the rise of internet crime, and is a common example of incident faced by companies in developed nations all across the world. For example, if an organisation discovers that an intruder has gained unauthorized access to a computer system, the CSIRT would analyze the situation, determine the breadth of the compromise, and take corrective action. Computer forensics is one task included in this process. Currently, over half of the world’s hacking attempts on Trans National Corporations (TNCs) take place in North America (57%). 23% of attempts take place in Europe. This makes CSIRT a highly prominent player in incident management.
Read more about this topic: Incident Management
Famous quotes containing the words computer, security, incident and/or management:
“Family life is not a computer program that runs on its own; it needs continual input from everyone.”
—Neil Kurshan (20th century)
“When kindness has left people, even for a few moments, we become afraid of them as if their reason had left them. When it has left a place where we have always found it, it is like shipwreck; we drop from security into something malevolent and bottomless.”
—Willa Cather (18761947)
“It is of the highest importance in the art of detection to be able to recognise out of a number of facts which are incidental and which are vital.... I would call your attention to the curious incident of the dog in the night-time.
The dog did nothing in the night-time.
That was the curious incident.”
—Sir Arthur Conan Doyle (18591930)
“The Management Area of Cherokee
National Forest, interested in fish,
Has mapped Tellico and Bald Rivers
And North River, with the tributaries
Brookshire Branch and Sugar Cove Creed:
A fishy map for facile fishery....”
—Allen Tate (18991979)