Group project 2

Incident Reporting and Management Incident Reporting and Management An incident refers to any unplanned event that results in or one that has the potential to cause ill health, injury, loss or damage. Any country that is connected to the Internet must be capable of responding effectively and efficiently to incidents of information security (Reilly, 2003). CERTs act as crucial providers of security services and raise awareness of security issues as well as acting as educators. Computer Emergency Response Teams (CERTs) are a very vital tool for Critical Information Infrastructure.
Protection (CIIP)
Employees are responsible for reporting incidents, which occur or that have the potential to occur. It is the role of the appropriate staff to take steps to correct a problem and to prevent a recurrence through implementation of the recommendations arising from investigation. Once the incident is detected, it should be assessed, categorized, prioritized, and queued for appropriate action. After that, a research should be conducted about the incident; on what had happened and who has been affected, etc. Incidence response requires taking necessary actions, to resolve the issue, by doing all that is necessary (Reilly, 2003).
CERT receives an incident report through the incident handling system via various means of communication such as a phone call, walk-in reports, e-mail, fax and websites among others. The team usually consolidates the reporting channels, especially using the e-mail. The system formally registers the report by linking it to some Alphanumerical reference to enable easy management in the future. The system should be protected against spam and implementing pre-filtering mechanisms.
An incident should then be verified and classified according to the information on the report. The incidents vary in severity (very high include DDoS, high include Trojan distribution and normal include spam). An incident should then be assigned to an incident handler. Incident resolution is administered next, towards realizing the desired result. Data is collected from those affected; through the exchange of ideas, some of those that are concrete and practical enough to be implemented are set for the different parties (Reilly, 2003).
Reilly, E. (2003). Milestones in Computer Science and Information Technology. New York: Greenwood Press Publishing Group Inc.