Wednesday, November 20, 2019
Successful information security management Research Paper
Successful information security management - Research Paper Example Security incident management facilitates the development of security incident handling and planning including preparation for detection and reply to information security issues. The standard of the incident management primarily relates to ensure the existence of processes rather than the contents of these procedures. The security incident of different computing systems will have dissimilar effects and escort to different consequences, bureau, departments the Internal Revenue Service need to tailor the security incident handling plan according to specific operational requirements. Internal Revenue Service invests enormous money to buy and install computing equipments for securing their networks. Information systems security is a challenge for executives and the information technology professionals. Internal Revenue Service focus on performance and efficiency of the security equipments. This is not enough, as human intervention and a proper plan need to be defined. The information tech nology professionals are not only responsible for securing the information systems, all the employees of the organization are responsible.... The procedure for incident handling incorporated an action plan that counters Distributed Denial of Service Attacks, Cyber-attacks, natural disasters such as fire, earth quakes, flood etc. likewise, the incident management process includes a six step process i.e. Prepare, Identify, Contaminate, Eradicate, Recover and the lessons learned from the past. The information security should be handled internally and externally by the employees of Internal Revenue Service. They will be supported by the security teams with high-powered information security officers. The employees who do not have insufficient skills in dealing with information security, they can perform well in reducing risk factors. In each major business unit, employees with set of expertise to conduct IT audit, project management and risk management are recommended to be an information security officers. However, interpersonal, communication and process improvement skills are essential. Likewise, the most prominent objective for this role is to spread awareness between every employee of the Internal Revenue Service, as the awareness will be related to information security threats and most importantly the associated risks with these threats to the Internal Revenue Service. If Internal Revenue Service is associated with the cloud computing services, non-disclosure agreements should be signed and service level agreements should also be made. 2 Security Incident Handling It is the information depletion that will be undesirable to the welfare of Internal Revenue Service. It is an adverse event in an information system or network that poses a threat to computing equipment
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.