Managing Incident
Begin by providing a brief critical analysis of this week’s reading, “Managing Incident Response.” Share your thoughts on whether incident response is a science or a methodology and why you feel that way.
An important goal for this course is to allow you to analyze governance principles and their applications to information security management. This article addresses one such governance principle through its examination of the position of the National Institute of Standards and Technology (NIST) Special Publication 800-61 with respect to response methodology. To explore how this applies to information security management, identify literature in the field or a case study describing how this methodology is being applied. Discuss the strategic effect on the organization and potential effect on other organizations.
Information Security Governance
Based on your research of scholarly and relevant practitioner literature for both a theoretical examination of information security management and a practical application of that theory, discuss your assessment of the information presented based on its scholarly contribution to the field and its effect on strategic decision making for IT management professionals. Analyze the risks and opportunities experienced by the application of the theory in the case study example.
Readings
Use your text to complete the following:
• Read Reading 3, David Shackleford’s “Managing Incident Response,” pages 17–32. This article explores the role of security governance during and following an incident. Ask yourself these questions as you read this article:
o How does security governance react or get involved during an incident?
o How do management and technicians respond to an incident?
o How is management apprised of the situation?
Reference:
Whitman, M. E., & Mattord, H. J. (2009). Readings and Cases in the Management of Information Security. Boston, Massachusetts:
…………………………Answer preview………………………………..
IT security governance is the system by which an organization directs and controls Information Technology security. In addition, IT security governance provides guidance on determining information security objectives and ways of archiving the objectives. Today, the challenge of effectively managing security breaches involving regulated data is growing in scale and difficult for large IT organizations such as the Amazon…………………………….
APA
644 words