Incident Preparedness and Response: Devlopming a Security Policy

Incident Preparedness and Response: Devlopming a Security Policy

Warren Wylupski, David R. Champion, Zachary Grant
Copyright: © 2006 |Pages: 26
ISBN13: 9781591408727|ISBN10: 1591408725|EISBN13: 9781591408741
DOI: 10.4018/978-1-59140-872-7.ch010
Cite Chapter Cite Chapter

MLA

Wylupski, Warren, et al. "Incident Preparedness and Response: Devlopming a Security Policy." Digital Crime and Forensic Science in Cyberspace, edited by Panagiotis Kanellis, et al., IGI Global, 2006, pp. 217-242. https://doi.org/10.4018/978-1-59140-872-7.ch010

APA

Wylupski, W., Champion, D. R., & Grant, Z. (2006). Incident Preparedness and Response: Devlopming a Security Policy. In P. Kanellis, E. Kiountouzis, N. Kolokotronis, & D. Martakos (Eds.), Digital Crime and Forensic Science in Cyberspace (pp. 217-242). IGI Global. https://doi.org/10.4018/978-1-59140-872-7.ch010

Chicago

Wylupski, Warren, David R. Champion, and Zachary Grant. "Incident Preparedness and Response: Devlopming a Security Policy." In Digital Crime and Forensic Science in Cyberspace, edited by Panagiotis Kanellis, et al., 217-242. Hershey, PA: IGI Global, 2006. https://doi.org/10.4018/978-1-59140-872-7.ch010

Export Reference

Mendeley
Favorite

Abstract

One of the emerging issues in the field of digital crime and digital forensics is corporate preparedness in dealing with attacks on computer network security. Security attacks and breaches of an organization’s computer network can result in the compromise of confidential data, loss of customer confidence, poor public relations, disruption of business, and severe financial loss. Furthermore, loss of organizational data can present a number of criminal threats, including extortion, blackmail, identity theft, technology theft, and even hazards to national security. This chapter first examines the preparedness and response of three southwestern companies to their own specific threats to corporate cyber-security. Secondly, this chapter suggests that by developing an effective security policy focusing on incident detection and response, a company can minimize the damage caused by these attacks, while simultaneously strengthening the existing system and forensic processes against future attacks. Advances in digital forensics and its supporting technology, including intrusion detection, intrusion prevention, and application control, will be imperative to maintain network security in the future.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.