Appropriate Risk Mitigation Strategies,Incident Response Procedures,Security Related Awareness Training
2.2 Carry out appropriate risk mitigation strategies
-
Change management refers to a methodology for making modifications and keeping track of those changes. In some instances, changes to network or system configurations are made haphazardly to alleviate a pressing problem. Without proper documentation, a future change may negate or diminish a previous change or even unknowingly create a security vulnerability. Change management seeks to approach changes systematically and provide the necessary documentation of the changes.
-
Incident management can be defined as the "framework" and functions required to enable incident response and incident handling within an organization. The objective of incident management is to restore normal operations as quickly as possible with the least possible impact on either the business or the users
-
Routine system audits will check for user rights and permissions as well as analyze log files, for example, the Security log in Windows. The development and implementation of the security policy that enabled the security log should have been done long before actual auditing takes place.
2.3 Execute appropriate incident response procedures
Order Of Volatility : The sequence of volatile data that must be preserved in a computer forensics investigation