In the event of a cyber-incident that poses threats to the company's infrastructure. My organization has an incident response plan which comprises the roles and responsibility matrix. The various roles of every single individual are defined in the plan with a specific recipe of getting the company out of cyber danger. However, if the roles and responsibility matrix expires, an alternative solution still has to be tabled to get the organization out of such a threat.
To address the cyber incident, it is essential first to identify and establish the source of the possible cyber-attack. Containing a cyber-incident is very much dependent on identifying where it comes from, this would help in ensuring that we are laying down a specific fight for containing the incident. A thorough audit should be done to the entire management system of the company, and it should be done by holders of user accounts, network administrators, and administrators of the system among other staff of the organisation's IT department (Buchler et al. 2018) . A check should be done to the system security, the status of the system support software to see if they are up to date, checking through files with the aid of hashing algorithms which help detect any possible threats to the data, a check on the system anti-virus software, the databases among other areas. Upon detection of the risk, it would be easy to contain the incident. This may probably include cutting network access for infected computers. Installing unavailable software and improving the security system by changing of user passwords (Steinke et al. 2015)
Delegate your assignment to our experts and they will do the rest.
Upon a successful process of containing the cyber threat incident, it is advisable to prepare for the future and by so doing, reviewing the company’s Incidence Response plan. Most importantly would be to update the roles and responsibilities matrix of the plan and ensure that every member of the security team is aware of their respective roles in any impending cyber threat. It is suitable for keeping the company safe ( Hirai, Aoyama & Koshijima, 2017).
References
Buchler, N., La Fleur, C. G., Hoffman, B., Rajivan, P., Marusich, L., & Lightner, L. (2018). Cyber Teaming and Role Specialization in a Cyber Security Defense Competition. Frontiers in psychology , 9 .
Hirai, H., Aoyama, T., Davaadorj, N., & Koshijima, I. (2017). Framework for cyber incident response training. Safety and Security Engineering VII, Rome, Italy , 273-283.
Steinke, J., Bolunmez, B., Fletcher, L., Wang, V., Tomassetti, A. J., Repchick, K. M., ... & Tetrick, L. E. (2015). Improving cybersecurity incident response team effectiveness using team-based research. IEEE Security & Privacy , 13 (4), 20-29.