Computer Science Defensive Response Strategy Term Paper

Total Length: 802 words ( 3 double-spaced pages)

Total Sources: 3

Page 1 of 3

These activities include securing the current computing environment which includes any current tools, patches, updates and best known methods. This represents the bulk of the cost effective security capabilities and facilitates better detection. Visibility to key areas and activities is vital. Effective monitoring to identify issues, breaches and attacks is necessary. This drives immediate interdiction by response capabilities. Efficient management of efforts to contain, repair and recover as needed to return the environment to normal operations is vital. This reduces losses by rapidly addressing issues and feeds intelligence into both the prediction and prevention areas (Defense in depth strategy optimizes security, 2008).

Personnel Resources

Personnel requirements to implement a defense in depth strategy are many. This process will include experts drawn from several different areas. The teams that are vital include:

emerging threats team- this cross functional team continuously discusses emerging trends and events in order to identify imminent threats that might be out there.

threat horizon team -- this team works to classify different attackers or threat agents in order to understand who likely to attach, with what methods and what their motivations are.

rapid risk assessment team -- this team meets often in order to track the large number of emerging vulnerabilities and determine what risk that they bring.

Stuck Writing Your "Computer Science Defensive Response Strategy" Term Paper?



security center of excellence team -- this team evaluates products for security and privacy in use both internally and externally (Defense in depth strategy optimizes security, 2008).

The business world is increasingly reliant on technology to supply information and communications facilities to staff, partners, and customers. Securing organizational information and the systems that are used to manage and transmit data has become a high profile function. Failure to secure information can have a severe impact on business credibility. Threats to an organization come in a variety of forms, for example from hacking, viruses, and simple human error. The types of threats change constantly, so management must sponsor, design, and implement business and technical processes to safeguard critical business assets (Service Management Functions: Security Management (Part 1), 2005)......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Computer Science Defensive Response Strategy" (2012, August 03) Retrieved July 5, 2025, from
https://www.aceyourpaper.com/essays/computer-science-defensive-response-strategy-75031

Latest MLA Format (8th edition)

Copy Reference
"Computer Science Defensive Response Strategy" 03 August 2012. Web.5 July. 2025. <
https://www.aceyourpaper.com/essays/computer-science-defensive-response-strategy-75031>

Latest Chicago Format (16th edition)

Copy Reference
"Computer Science Defensive Response Strategy", 03 August 2012, Accessed.5 July. 2025,
https://www.aceyourpaper.com/essays/computer-science-defensive-response-strategy-75031