Security Measures
Willie McMillian #D01503368 Week 05
DeVry University
Security Measures
Introduction
System administrators channel most of their time to network environments, and are extremely knowledgeable in the area of network management. They also need to develop background outlines of the environment, so that they can devise effective and efficient backup systems. For these reasons, it is important to undertake an auditing process, which helps monitor the utilization and the performance of the security plan and the standard operating procedure. Further, there should be a high level of awareness already in place, before the implementation and deployment of an incident response squad (Ellis & Speed, 2001). This paper will discuss recommendations on the ways of minimizing or averting security incidences, the assembly of a CSIRT. Further, the paper will define the threat response plan.
Minimizing the Severity and the Number of Security Breaches
Indeed, the prevention of security incidents is a major milestone for the organization. However, it is not possible to eliminate all the security threats facing the organization. Further, after the incidence of a risk event, minimizing its impact should be a major priority. The process entails the following processes: establishing and enforcing all procedures and policies; upholding the support of incident mitigation and security policies from the management; assessing for organizational vulnerabilities continually and checking all computer networks and systems, to ensure that they are updated on threat elimination (Rhee, 2003).
Other processes to be engaged include offering security coaching for end users and IT staffs, placing security tags that remind users of responsibilities and restrictions, and where necessary include a warning about the penal action to be taken