Learner Name Asadbek Abdusattorov Learner Registration No


Analysation of the actions to take when responding to an incident


Download 172.66 Kb.
bet6/7
Sana15.06.2023
Hajmi172.66 Kb.
#1486626
1   2   3   4   5   6   7
Bog'liq
Asadbek Abdusattorov Cyber Security EI1-01

Analysation of the actions to take when responding to an incident


The following should be done while reacting to an incident:
First, you need to take stock: Find out what happened, how bad it was, what dangers were involved, and how it affected your infrastructure and your staff.
Connect with one another. It is important to inform the right people and to set up effective channels of communication amongst everyone concerned.
Step Three: Implement a Contingency Strategy Put into action the correct reaction strategy, which must be based on established rules and procedures.
The Fourth Step: Keep the Incident Under Control Quick action is needed to stop any more loss, injury, or damage. Some options include shutting down vital systems, evacuating the region, or isolating the problem.
Step 5: Conduct a thorough investigation to learn what happened and how to avoid such incidents in the future.
Sixth, repair and revive: See to it that all broken components are fixed and that services and systems are returned to normal.
7 Reflect and better: After an event, take stock to see where you might have done better, and then change your response strategies and procedures to reflect that.

Explanation of the importance of post cyber-attack reviews


The best way to ensure that something like this never occurs again is to do a post-incident evaluation of all the systems and individuals who were affected by the assault.
An organization's security may be greatly enhanced by conducting post-attack evaluations, also known as post-incident reviews or post-mortem analyses. Some of the many benefits of reviewing attacks after they have occurred include:
The first step in preventing such events is to identify and fix the flaws in the current security systems that enabled the attack to happen. "(NIST SP 800-61)"
Streamlining communication channels and improving the incident response plan are two examples of how a company may enhance its reaction to an issue by conducting an internal evaluation of its current procedures.
Third, a better security posture as a result of enhanced security awareness, since post-attack evaluations teach workers the value of security and the effects of occurrences. Standard Practice for Information Technology Security
Four, improved risk management is possible with the data gleaned from post-attack studies, which can be used to things like estimating the probability of future occurrences and their potential effect on the business. Specifically,
5 Compliance: Post-attack evaluations may show that security requirements and standards have been met, which may be needed by legislation such as those concerning privacy and data protection (NIST SP 800-61)"
In conclusion, incident response processes like post-attack evaluations are vital to enhancing an organization's security. Post-attack evaluations aid businesses in strengthening their security and preparing for future attacks by revealing vulnerabilities, upgrading response procedures, raising security awareness, enhancing risk management, and verifying compliance.

Download 172.66 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©fayllar.org 2024
ma'muriyatiga murojaat qiling