Page 32 - Cyber Warnings
P. 32







So, it’s so important to constantly and continuously invest into your human resources and make
them better and better in responding to the certain events. Also, we would like to mention that
there is the big cyber skills shortage on the marketplace and some experts would estimate that
we would need between 10 and 20 years to overcome that gap. The response to an incident
would so commonly get closely correlated with the digital forensics which would require from the
experts to see the background of such a cyber situation and deeply investigate what occurred
for real and why that happened. Sometimes would collecting the evidence and findings be the
good way to respond to that situation.

In addition, if the attacked computers with their networks got connected to the malware
generator – it would be necessary to switch of your resources from the web.

As we suggested at the beginning – the final step within the good IR strategy would be a
remediation. In other words, after collecting all the necessary clues and information for the
purposes of the digital forensics or simply disconnecting your asset from the web for a reason of
avoiding more complications – it would come time to remediate your computers with the
networks. This step within the IR strategy seeks so skillful incident responders who would be
able to deal with the all three phases in the IR strategy.

Sometimes, it’s possible to repair the flaws using the specialized tools, but so often it would be
so important to re-install the entire system which would affect your business continuity and
demand from you get the majority of your confidential information getting previously backuped.

The backuping is crucially significant step in preventing your asset from the attacks because
only if you have the information being carefully backuped – you would get in position to recover
your system mainly.

At the end, formulating the good IR strategy could be a challenge, but if you invest more time,
money and resources in a careful planning how to resolve some of these scenarios – you would
definitely win over a threat and get ready to handle any situation on.

About The Author

Since Milica Djekic graduated at the Department of Control Engineering at
University of Belgrade, Serbia, she’s been an engineer with a passion for
cryptography, cyber security, and wireless systems. Milica is a researcher
from Subotica, Serbia. She also serves as a Reviewer at the Journal of
Computer Sciences and Applications and.

She writes for American and Asia-Pacific security magazines. She is a volunteer with the
American corner of Subotica as well as a lecturer with the local engineering society.





32 Cyber Warnings E-Magazine February 2017 Edition
Copyright © Cyber Defense Magazine, All rights reserved worldwide

   27   28   29   30   31   32   33   34   35   36   37