Its always good to ensure an organization to secure in all the ways
Peer Comment 1
Avinash Doddapaneni
Week 9 Discussion
Its always good to ensure an organization to secure in all the ways before an attach rather than considering and using different types of approaches to overcome the attack. I would defiantly say an organization must follow different types of ERM strategies to protect the organization from different source to avoid the risks. Enterprise Risk Management (ERM) takes a comprehensive perspective in identifying risks. A company may fail to meet its requirements. Strategies and objectives. In this statement Management accounting (SMA), several methods for identifying risks are discussed (Mackita, 2019).
Illustrated with examples from my company experiences. Once the risks are identified, the next issue is Determining root causes or drives Losses. The suggested procedure is described and after discussion of several qualitative and quantitative approaches to assess Losses. Some practical ERM implementation considerations such as infrastructure and maturity models, adoption, management accountant role, education and training, technology, the corporate alignment will also be explored (Morrow, 2018).
Computer forensics, can also be named as digital forensics, is collecting, analyzing, and reporting digital data. Forensics can be used in any dispute to identify and prevent crime and to store evidence digitally. Over the past few years, many cyber incidents have increased in number and severity. When a cyber incident occurs, the incident response team responds with pre-determined actions. Where the team is responsible for monitoring, managing, and reporting when a security breach is detected or when an attack is detected – and the forensics process begins when the bell rings ( William G., 2018).
Understanding the regulatory and forensic impact of the event and warning data on any organization takes planning and requires a comprehensive understanding of the data’s amount to maintain the system. Better logs can be stored, understood, and correlated with the possibility of identifying an event in time for relief. Responding to events, detecting irregular or unauthorized behavior, and preserving intellectual property is no more important. Without a log management strategy, it would be almost impossible to have a forensic investigation’s data. Without monitoring the tools, it would be tough to detect threats and respond to attacks against privacy, integrity, or availability. For the network to be compliant and for event response or forensics research to be successful.
References
William G., S. (2018). ENTERPRISE RISK MANAGEMENT: Tools and Techniques for effective Implementation.
Mackita, M. (2019, June 22). A Risk Management Framework for IT Systems Which Adopt Cloud Computing.
Morrow, T. (2018, March 5). 12 Risks, Threats, & Vulnerabilities in Moving to the Cloud. Retrieved from https://insights.sei.cmu.edu/
Answer preview Its always good to ensure an organization to secure in all the ways
APA
177 words