Premium Essay

Gcu's Incident Response Policy

Submitted By
Words 770
Pages 4
This Incident Response Policy depicts the general plan for responding to information security incidents at GCU. It also characterizes the roles and responsibilities of members, characterization of incidents, connections of different policies and procedures, reporting requirements. The objective of the Incident Response is to recognize and respond to computer security incidents, identity their risks, respond to the incidents, convey the outcomes and risks to all GCU partners, and prevent the probability of the incident from happen again (Raderman, 2016).
3.2 Scope Incident Response incorporates all activities made to rapidly reestablish basic IT services and to limit effects on daily operations. This policy also provides incident handling guidance …show more content…
The policy also demonstrates the metrics for measuring the program in both short and long terms. In order to establish a formal incident response capability, GCU is prepared to react fast and adequately whenever a security incident occurred. The validity and capability of the incident response team depend on the specialized aptitudes and critical thinking skills from each individuals of the team. Major technical skills to include but not limited to – technical support, system/network administration, programming, and intrusion detection – are highly helpful. Communication and collaboration skills are additionally required for incident handling task. Incident handling training is necessary to all incident response team members.
3.4 Enforcement
All GCU employees must report any suspicious or identified breach with PII data on individuals to GCU IT Department instantly upon discovery. This includes any notice received from a third-party vendors and business partners with whom GCU shares PII information …show more content…
The quantity of incidents that are taken care of should be recorded quarterly and annually to demonstrate the workload of GCU Incident Response team. The time for each incident can be measured by the aggregate time spent on each incident by the team, and how long it took the team to respond to the incident.
Dwell Time – is the idea that a host is compromised sooner or later in time and this compromised is not recognized until some further point in time. It is essential to comprehend that this metric doesn’t mean much, as time advances along with the development of the Incident Response program, the Dwell Time begins to slant downwards. “Ultimately, with a clean environment and proper detection in place, your (GCU) hope is to get that Dwell time down to weeks, days, hours- let alone minutes” (Mason, 2014). Containment Time - is another key metric that ought to be measured. This fundamentally comes down to how rapidly GCU can mitigate the risk postured by compromised assets for other resources on the

Similar Documents

Premium Essay

Stock Investing for Dummies

...Stock Investing FOR DUMmIES 2ND by Paul Mladjenovic ‰ EDITION Stock Investing FOR DUMmIES 2ND ‰ EDITION Stock Investing FOR DUMmIES 2ND by Paul Mladjenovic ‰ EDITION Stock Investing For Dummies® 2nd Edition , Published by Wiley Publishing, Inc. 111 River St. Hoboken, NJ 07030-5774 www.wiley.com Copyright © 2006 by Wiley Publishing, Inc., Indianapolis, Indiana Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600. Requests to the Publisher for permission should be addressed to the Legal Department, Wiley Publishing, Inc., 10475 Crosspoint Blvd., Indianapolis, IN 46256, 317-572-3447, fax 317-572-4355, or online at http://www.wiley.com/go/permissions. Trademarks: Wiley, the Wiley Publishing logo, For Dummies, the Dummies Man logo, A Reference for the Rest of Us!, The Dummies Way, Dummies Daily, The Fun and Easy Way, Dummies.com and related trade dress are trademarks or registered trademarks of John Wiley & Sons, Inc. and/or its affiliates in the...

Words: 125643 - Pages: 503