The computer emergency response team is a group that comprises of experts who handle computer-related security breach cases. Some of the other names used to refer to such a team include computer security incident response team. The origin of these expert teams can be mapped to incidences of computer viruses such as malware. These were responsible for corrupting great amounts of data and company sabotage.
Most companies that have successfully established themselves and are making huge profits have adopted and implemented the CERT operations. Some companies even establish a department solely dedicated to monitoring the flow of information and rectifying any avenues for likely information breach. In-depth knowledge of CERT processes, therefore, enables an organization to reduce or eliminate security issues related to information stored in the organization (Kang 172).
The CERT professionals are especially useful in organizations that desire to establish and maintain efficient business practices. For instance, in some large organizations where the operations have been curtailed by information technology technicalities, professionals take over and identify the problem, which is then resolved. Some organizations at times experience challenges such as employees having difficulties in accessing important information that is essential for them to perform their duties.
Some of the threats that organizations are able to prevent by the use of CERT technology include prevention of theft or sale of the company’s confidential information, which if released into the public would have intense consequences. According to Cappelli, Moore, and Trzeciak, modification of critical data such as payment details or criminal records held by the company can easily be accomplished resulting in great financial losses and negative impacts in the organization (4). In extreme cases, internet hackers can access the company’s finances and this will lead to the loss of capital.
CERT/CC
The Computer Emergency Response Team Coordination Center (CERT/CC) is at the institute of software engineering in Mellon University. The center was established after a work that was introduced when the internet disabled most of the computers connected. This created the need to establish a reliable means of protecting the vast amounts of data shared through the internet and also protect companies against losing their secrets and useful information to their competitors. According to Kang, some of the essential information security processes include establishing access controls and ensuring information integrity within the organization (194).
The center is useful for several reasons, such as conducting studies on the vulnerabilities facing the internet community. The in-depth studies conducted by the extremely qualified and experienced engineers have to keep up with the advancement in technology, in which the internet hackers are well-versed. The center also provides recovery services to various websites that have been victims of internet incidents. Apart from this, the emergency response team also alerts the internet users of any likely threats. In order to ensure that in the future there is a prompt and efficient response to internet security incidences, the center takes part in the training of professional response teams.
Most organizations that have sought the help of this center have successfully managed their workforce to an extent that the authorized employees are able to access vital information that enables them efficiently perform their jobs and excel. Organizations that have embraced this technological advancement engage in processes such as risk identification and, thereafter, carrying out security updates and implementing change management (Kang 194).
Works Cited
Cappelli, Dawn, Andrew Moore and Randall Trzeciak. The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud). Upper Saddle River, New Jersey: Pearson Education, 2012
Kang, Meng-Chow. Responsive Security: Be Ready to Be Secure. New York: CRC Press, 2013.