Incident response is needed so there will be an organized approach to address and manage a cyber attack or security breach. The business is trying to handle the situation in the least damaging way and be back to normal as quick as possible. The incident response process has five stages: preparation, identification, containment, eradication, and recovery. …show more content…
In determining a recovery strategy, organizations should consider such issues as: budget, resources, management’s position on risks, technology, data, and suppliers.
For a business to build a complete and usable disaster recovery plan they should follow the following steps: establish the scope of the activity, gather relevant network infrastructure documents, identify the most serious threats and vulnerabilities, and the most critical assets, review the history of unplanned incidents and outages, and how they were handled, identify the current DR strategies, identify the emergency response team, have management review and approve the disaster recovery plan, test the plan, update the plan, and implement a DR plan audit.
An example of how the DR would work is if there was a fire in a telecom building. The company would respond with a disaster recovery plan, creating emergency holding pages for key website areas to inform customers about issue and that normal service would resume as quickly as possible. Staff would work throughout the day and into the night to enable the client to keep customers up to