IT Governance, Risk, and Compliance

Jul 27 2009   8:31PM GMT

Critical Incident Response Elements – Part II

Robert Davis Robert Davis Profile: Robert Davis

By definition, an entity’s management information system (MIS) represents an aggregation of personnel, computer hardware and software, as well as procedures that process data in order to generate utilizable information for decision-making. Data elements, activity, function operation, and system are the pyramided classifications that delineate information requirements. Dialectally, an entity’s security MIS can become the catalyst for providing superior incident resolution through timely and reliable incident response data when the notification process is properly designed.

Gathering evidence that inappropriate or malicious activity has occurred is a control objective for threat management. Information security threat management controls should be configured to identify inappropriate or malicious activity within a computing environment. Since absolute computer security is impossible, management must classify misuse based on organizational impact. Categorically, security misuse can be designated as intentional or unintentional. In this regard, when constructing intentional misuse information asset records, field titling should address incident descriptions such as exploited vulnerability details (including unauthorized reading, modification, or destruction of data); as well as affected information assets and attack sources.

“View Part I of the Critical Incident Response Elements series here

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: