Cybersecurity

Management Actions that Must Happen Prior to a Cyber Attack

Prior to any cyber attack, an organization should already have a solid crisis management plan and set of disaster...

· 1 min read >
cyber attack

Prior to any cyber attack, an organization should already have a solid crisis management plan and set of disaster recovery precautions in place. In addition to this, a risk analysis should be carried out involving a holistic approach and careful investigation of information systems and the overall environment. The purpose of such an analysis is to evaluate all endpoints that could potentially fail in a disaster or cyber-attack. (Pfleeger & Pfleeger, 2007) The analysis should describe the current state of an organization’s security approaches and examine areas of the company’s infrastructure as well as external factors.

In order for an effective crisis management program to work, a solid team must be established with key personnel assigned to various roles supporting it. The crisis management team will lead all activities as well as coordinate with dependent departments such as utilities, infrastructure, and emergency communications management. The crisis management team will ultimately be responsible for coordinating table-top scenarios and tests, coordinate communication with the organization, and plan for disaster recovery circumstances that may require alternative site setup.

(Robinson, Narin, & Elleman, 2014) describe three different scenarios for recovery using virtualized cloud technology, which include pilot light, warm standby, and multi-site. In traditional data centers, cold site, warm site, and hot sites are options for the organizations depending on cost and overall risk determined. All of these considerations should take into account existing business policies and processes as well as the underlying security plan for the organization.

Pfleeger, C., P., & Pfleeger, S., L. (2007). Security in Computing. Prentice Hall.
Robinson, G., Narin, A., & Elleman, C. (2014). Using Amazon Web Services for Disaster Recovery (p. 22). Amazon Web Services. Retrieved from https://www.turningtechnologies.com/pdf/content/AWS-Disaster-Recovery.pdf

Image Credits: Photo by Benjamin Child on Unsplash.

Written by Ian Carnaghan
I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment. In my spare time I teach undergraduate classes in web development. Profile
SSL Labs Rating Woes

SSL Labs Rating Woes

Ian Carnaghan in Coding, Cybersecurity
  ·   1 min read

1
Leave a Reply

avatar
1 Comment threads
0 Thread replies
0 Followers
 
Most reacted comment
Hottest comment thread
1 Comment authors
Navodaya Result 2019 6th Pune Recent comment authors
  Subscribe  
newest oldest most voted
Notify of
Navodaya Result 2019 6th Pune
Guest

Thanks for this info..