Note: Need to respond the below post whether we are agreeing or not. If so why we are agreeing if not why we are not agreeing. Need it with peer reviewed refernces.
Post:
The creation of a CSIRT is not really that difficult and can be done in just a few weeks or months. CSIRT is an independent unit that can be created and be placed in either the business, internal security, public or IT security divisions. The CSIRT can cover a wide range of customers, from Web, web application and network security to Internet Infrastructure, cybercrime and security technology. CSIRT’s are important to the security of both corporate and internal IT systems.
The CSIRT’s mandate is to provide strategic advice and technical support to both federal and provincial governments and regulated entities in their various interactions with the telecommunications industry, such as, law enforcement agencies and telecommunications carriers. A CSIRT’s best effort response to a security incident focuses on prevention and not response, and will focus on mitigating the extent of harm resulting from the incident.
Any organisations that are being targeted by an organised cyber attack can now use the CSIRT as a security protection for both computer networks and the physical security of data, equipment and personal property. When implementing a new CSIRT program, the key consideration is to create a working environment in which people are free to share information, collaborate, and understand the importance of the security posture. While meeting that goal is not as simple as keeping the CSIRT happy, the CSIRT can play a key role in supporting the security teams and ensuring the protection of critical business assets and information.
Organizations can benefit from a more cohesive system to ensure greater compliance with stringent security standards. In the context of web-based user authentication, a CSIRT can assess the security posture of an authentication server, exploit any potential vulnerabilities and take appropriate corrective actions to block compromised logins or access to vulnerable web sites. CSIRT can even combine the functions of a monitoring and tracking system with a remediation team for a less manual response.
Reference:
Pfleeger, S. L. (2017). Improving Cybersecurity Incident Response Team (CSIRT) Skills, Dynamics and Effectiveness. Trustees of Dartmouth College Hanover United States.
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more