IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Incident Preparedness and Response: Developing a Security Policy

Incident Preparedness and Response: Developing a Security Policy
View Sample PDF
Author(s): Warren Wylupski (University of New Mexico, USA), David R. Champion (Slippery Rock University, USA) and Zachary Grant (New Mexico Mounted Patrol, USA)
Copyright: 2008
Pages: 22
Source title: Electronic Government: Concepts, Methodologies, Tools, and Applications
Source Author(s)/Editor(s): Ari-Veikko Anttiroiko (University of Tampere, Finland)
DOI: 10.4018/978-1-59904-947-2.ch077

Purchase

View Incident Preparedness and Response: Developing a Security Policy on the publisher's website for pricing and purchasing information.

Abstract

One of the emerging issues in the field of digital crime and digital forensics is corporate preparedness in dealing with attacks on computer network security. Security attacks and breaches of an organization’s computer network can result in the compromise of confidential data, loss of customer confidence, poor public relations, disruption of business, and severe financial loss. Furthermore, loss of organizational data can present a number of criminal threats, including extortion, blackmail, identity theft, technology theft, and even hazards to national security. This chapter first examines the preparedness and response of three southwestern companies to their own specific threats to corporate cyber-security. Secondly, this chapter suggests that by developing an effective security policy focusing on incident detection and response, a company can minimize the damage caused by these attacks, while simultaneously strengthening the existing system and forensic processes against future attacks. Advances in digital forensics and its supporting technology, including intrusion detection, intrusion prevention, and application control, will be imperative to maintain network security in the future.

Related Content

Özge Önkan, Zeynep Arikan. © 2022. 36 pages.
Arun Kumar G. Hiremath, Roopa G. M., Naveen Kumar K. R.. © 2022. 23 pages.
Mangesh Manikrao Ghonge, Sulakshana Mane, Devasis Pradhan. © 2022. 25 pages.
Alaattin Parlakkılıç. © 2022. 20 pages.
Syed Abbas. © 2022. 22 pages.
Pinki Saini, Unaiza Iqbal, Mazia Ahmed, Devinder Kaur. © 2022. 24 pages.
Subhodeep Mukherjee, Venkataiah Chittipaka, Manish Mohan Baral. © 2022. 29 pages.
Body Bottom