SlideShare a Scribd company logo
Discussion Forum.
300 words
Include at least. words in your posting and at least 250 words in
your reply. Indicate at least one source or reference in your
original post. Please see syllabus for details on submission
requirements.
Discussion Question
Search "scholar.google.com" or your textbook. Discuss what
role end-users typically play in incident reporting? Should end
users be encouraged to report suspicious occurrences? If so,
why; if not, why not. What factors typically influence the end-
user decision to report (or not report) a potential incident?
Reply to classmate1 275 words:
The Role End-Users Typically Play in Incident Reporting
End-users act like witnesses in the reporting of an incident
because they spent a lot f their time within the premises of the
company. It is much important for them to secure the details of
an incident once it has happened such that they will be
transferred to the right authority. There is no need to keep the
memories of what happened by the emotional factors when there
is no evidence of what really transpired (Seidel, 2017). The
information ought to be captured as early as possible which
describes the incident and indicate a witness statement together
with the time off incident. Consequently, other reports which
concerns mishap in the IT systems ought to be reported
immediately by the end-users.
End Users Should be Encouraged to Report Suspicious
Occurrences
The end-users ought to be encouraged o report any suspicious
occurrences in the premises because this helps in solving a
small problem instead waiting until it becomes a disaster. They
are people interacting with most of the machinery hence being
in a position to notice any suspicious occurrence hence they
should be encouraged to report them.
Factors Which Influence the End-User Decision to Report (Or
Not Report) a Potential Incident
If the incident which has been reported is adequately dug into
and the end-users fall victims on the same, they get discouraged
to report any incidents which happens again in the premises.
The end-users can be encouraged to report incidences following
strict policies which should be set to govern cooperation. Thus,
they will be encouraged to report because they understand the
consequences of not reporting the incidence. The end-users can
get encouraged through ensuring that the reported incident has
been attended to effectively.
Reply to class mate2 275 words:
An incident is defined as any situation that will stop the
business process. In an IT perspective, an incident is defined as
Interruption to IT services from tiny part to the whole business.
If we talk about the management of incident and resolution, End
users role will be always crucial in the incident reporting when
there is any security breach until the final resolution. They can
give some vital information which will be used to trace the
incidents as being a witness. In every case, End users will be
accessing some type of data or inputting the data, hence they
will have a good amount of information after an incident. Every
organization will have a dedicated team of professionals who
will handle the suspicious activity and also analyzing any kind
of software attacks. When end users witness any incident the
primary duty should be to gather as much as information and
then reporting the collected information to higher officials for
further investigation to resolve an incident.
In order to bring control of situations, proper incident
management should be in place. Collection of information about
the incident as soon as possible will result in a less confusing
situation in the organization. Once the information is in hand, it
will route to a proper expertise person who will bring the
situation under control. Most of the time, the employees who
witness the incident will ignore the situation thinking that other
people will report it which in turn makes the situation more
complex in identifying the root cause. Also, most end users are
not aware of the risk management plan hence the delay in
reporting the incidents. Responding and reporting the incident is
very important to bring the situation in control. Hence All End
user should be aware of security policies and risk management
process. Because of delays in reporting will cause the CSIR
team to locate the issue and reduce the Organizational loss.
One of the main reason where end users don't report the
incidents is due to lack of awareness where how they can
participate in overall security process and what type of loss it
could cause a single department or an organization. If the end
users are well trained about the severities of security breaches
on the organization, they will be more helpful in reporting the
incidents and coordinating with CSIR teams for the resolution.
Reply to classmate 3 275 words:
End Users and Incident Reporting
End users are sometimes the customers as they are the
individuals who analyses the products completely and they have
full information about every product, every service provided to
them and incident occurring in an organization. The employees
who are the part of the organization, are always with a motive
to hide various incidents that might create problem for the
company but the customers are always enthusiastic in talking
about the scenes that are actually taking place. The company
authority relies on the customers as they will actively perform
to share information and data and the information are mostly
delivered as per the required area or location. Some incidents
are reported to improve the operations of the company and
sometimes the end customers feel fraud practices are taking
place and they present the report directly to the company
authority to look after the matter accordingly (Chappell, 2017.
Customers are the primary individuals who observe the scenes
before reporting so they are mainly encouraged by the other
customers to report an incident related to the organization to
analyse the practices and operations of the company.
End customers should be encouraged to report any important
incident related to the organization and mainly suspicious
occasions should be reported to make the company know about
the actual problems. It is always necessary to report the
incidents because uncovering any incident will reflect various
informations that should be known to the company employees
and other customers in the market. The company’s operation
and performance are mainly examined with the help of the
information that are collected from incident reporting. If the
customers are encouraged to report a particular incident there is
a chance that the existing problems will be solved and similar
incident will not be repeated in future (Kelley, 2018). However
the customers are not always encouraged to report an incident
because it directly affects the reputation of the organization and
sometimes uncovering any incident often leads to more
difficulties for the end customers. It is always necessary to
encourage the customers because reporting an incident is always
important for improving the performance of the company.
Important Decision
The main purpose of incident reporting is to upgrade the
functioning of the organization and control the existing dangers.
End users always want the company to function properly and
report the actual incident to stop its occurrence in future. For
smooth functioning of the company and to avoid existing danger
sometimes the customers take decision to report incidents
(Hewitt, & Chreim, 2015). Such reports are mainly provided for
a better organization in future and while reporting the customers
also come across other hazards that should be reported for early
recovery. It is always better to find the hidden problems on time
and rectify them rather than having more serious problems in
future. However sometimes the end customers fear punishment
or harassment for reporting any incident and such problems stop
the customers from taking any step to report an incident. There
are various laws and policies to provide protection to the
customers but the laws are not always active as per the
situation.

More Related Content

Similar to Discussion Forum.300 wordsInclude at least. words in your po

service metrics at ITSMFUSA 2008
service metrics at ITSMFUSA 2008service metrics at ITSMFUSA 2008
service metrics at ITSMFUSA 2008
guest904c03
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
Stacy Willis
 
Incident Management Powerpoint Presentation Slides
Incident Management Powerpoint Presentation SlidesIncident Management Powerpoint Presentation Slides
Incident Management Powerpoint Presentation Slides
SlideTeam
 
By Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docxBy Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docx
aman341480
 
Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation Slides
SlideTeam
 
3-I to manage issues and risks associated to software and IT services
3-I to manage issues and risks associated to software and IT services3-I to manage issues and risks associated to software and IT services
3-I to manage issues and risks associated to software and IT services
Sundeep Mohanty. MCA, MBA, TOGAF, ITIL
 
Is What You See What You Get
Is What You See What You GetIs What You See What You Get
Is What You See What You Get
malcolmg
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to Waste
Dave Steer
 
Crisis project (1)
Crisis project (1)Crisis project (1)
Crisis project (1)jie he
 
Part A Entity Relationship Diagram This new system would.pdf
Part A Entity Relationship Diagram This new system would.pdfPart A Entity Relationship Diagram This new system would.pdf
Part A Entity Relationship Diagram This new system would.pdf
sdfghj21
 
Corporate goverance awareness
Corporate goverance awarenessCorporate goverance awareness
Corporate goverance awareness
Michael Fanghella
 
DRAFT - FSII appendix z10 draft 2
DRAFT - FSII appendix z10 draft 2DRAFT - FSII appendix z10 draft 2
DRAFT - FSII appendix z10 draft 2
Nicole Rosie
 
Table of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber SecurityTable of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber Security
Aaron Lancaster
 
Essay Topics For Jobs
Essay Topics For JobsEssay Topics For Jobs
Essay Topics For Jobs
Jessica Gefroh
 
Offical Crisis Plan Word Copy
Offical Crisis Plan Word Copy Offical Crisis Plan Word Copy
Offical Crisis Plan Word Copy keisha Louis
 
Ultimate Guide to Choosing an Incident Management System
Ultimate Guide to Choosing an Incident Management SystemUltimate Guide to Choosing an Incident Management System
Ultimate Guide to Choosing an Incident Management System
24/7 Software
 

Similar to Discussion Forum.300 wordsInclude at least. words in your po (16)

service metrics at ITSMFUSA 2008
service metrics at ITSMFUSA 2008service metrics at ITSMFUSA 2008
service metrics at ITSMFUSA 2008
 
Credit Union Cyber Security
Credit Union Cyber SecurityCredit Union Cyber Security
Credit Union Cyber Security
 
Incident Management Powerpoint Presentation Slides
Incident Management Powerpoint Presentation SlidesIncident Management Powerpoint Presentation Slides
Incident Management Powerpoint Presentation Slides
 
By Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docxBy Day 5Respond to two or more of your colleagues in one or .docx
By Day 5Respond to two or more of your colleagues in one or .docx
 
Incident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation SlidesIncident Management PowerPoint Presentation Slides
Incident Management PowerPoint Presentation Slides
 
3-I to manage issues and risks associated to software and IT services
3-I to manage issues and risks associated to software and IT services3-I to manage issues and risks associated to software and IT services
3-I to manage issues and risks associated to software and IT services
 
Is What You See What You Get
Is What You See What You GetIs What You See What You Get
Is What You See What You Get
 
IAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to WasteIAPP - Trust is Terrible Thing to Waste
IAPP - Trust is Terrible Thing to Waste
 
Crisis project (1)
Crisis project (1)Crisis project (1)
Crisis project (1)
 
Part A Entity Relationship Diagram This new system would.pdf
Part A Entity Relationship Diagram This new system would.pdfPart A Entity Relationship Diagram This new system would.pdf
Part A Entity Relationship Diagram This new system would.pdf
 
Corporate goverance awareness
Corporate goverance awarenessCorporate goverance awareness
Corporate goverance awareness
 
DRAFT - FSII appendix z10 draft 2
DRAFT - FSII appendix z10 draft 2DRAFT - FSII appendix z10 draft 2
DRAFT - FSII appendix z10 draft 2
 
Table of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber SecurityTable of Experts: Insights into Cyber Security
Table of Experts: Insights into Cyber Security
 
Essay Topics For Jobs
Essay Topics For JobsEssay Topics For Jobs
Essay Topics For Jobs
 
Offical Crisis Plan Word Copy
Offical Crisis Plan Word Copy Offical Crisis Plan Word Copy
Offical Crisis Plan Word Copy
 
Ultimate Guide to Choosing an Incident Management System
Ultimate Guide to Choosing an Incident Management SystemUltimate Guide to Choosing an Incident Management System
Ultimate Guide to Choosing an Incident Management System
 

More from widdowsonerica

Information Technology, Computer Networks and CyberspaceKizza (201.docx
Information Technology, Computer Networks and CyberspaceKizza (201.docxInformation Technology, Computer Networks and CyberspaceKizza (201.docx
Information Technology, Computer Networks and CyberspaceKizza (201.docx
widdowsonerica
 
Information to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docxInformation to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docx
widdowsonerica
 
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docxInformation and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
widdowsonerica
 
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docxInfectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
widdowsonerica
 
Information Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docxInformation Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docx
widdowsonerica
 
Information Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docxInformation Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docx
widdowsonerica
 
Information PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docxInformation PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docx
widdowsonerica
 
INF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docxINF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docx
widdowsonerica
 
Information Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docxInformation Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docx
widdowsonerica
 
Information System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docxInformation System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docx
widdowsonerica
 
Individuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docxIndividuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docx
widdowsonerica
 
Information Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docxInformation Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docx
widdowsonerica
 
Individuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docxIndividuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docx
widdowsonerica
 
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docxIndustry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
widdowsonerica
 
Information is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docxInformation is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docx
widdowsonerica
 
Individuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docxIndividuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docx
widdowsonerica
 
Infectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docxInfectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docx
widdowsonerica
 
Individual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docxIndividual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docx
widdowsonerica
 
Individual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docxIndividual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docx
widdowsonerica
 
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docxIndividual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
widdowsonerica
 

More from widdowsonerica (20)

Information Technology, Computer Networks and CyberspaceKizza (201.docx
Information Technology, Computer Networks and CyberspaceKizza (201.docxInformation Technology, Computer Networks and CyberspaceKizza (201.docx
Information Technology, Computer Networks and CyberspaceKizza (201.docx
 
Information to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docxInformation to use for paperStep 1 Select your topic and focus.docx
Information to use for paperStep 1 Select your topic and focus.docx
 
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docxInformation and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
Information and Knowledge Needs of Nurses in the 21st CenturyIn th.docx
 
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docxInfectious and Noninfectious Prevention and Control TechniquesIn.docx
Infectious and Noninfectious Prevention and Control TechniquesIn.docx
 
Information Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docxInformation Management and Software Development Please respo.docx
Information Management and Software Development Please respo.docx
 
Information Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docxInformation Security  Please respond to the followingIdentify t.docx
Information Security  Please respond to the followingIdentify t.docx
 
Information PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docxInformation PaperThe Chief of Staff is preparing preliminary studi.docx
Information PaperThe Chief of Staff is preparing preliminary studi.docx
 
INF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docxINF 410 week 4 assign onAssume you are the project manager for a s.docx
INF 410 week 4 assign onAssume you are the project manager for a s.docx
 
Information Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docxInformation Technology in Public HealthPublic health surveillance .docx
Information Technology in Public HealthPublic health surveillance .docx
 
Information System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docxInformation System and Enterprise SystemsIdentify the key factors.docx
Information System and Enterprise SystemsIdentify the key factors.docx
 
Individuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docxIndividuals react to a variety of social cues to construct their per.docx
Individuals react to a variety of social cues to construct their per.docx
 
Information Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docxInformation Technology and Decision MakingPatient safety and care .docx
Information Technology and Decision MakingPatient safety and care .docx
 
Individuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docxIndividuals use social movements when they feel a social institution.docx
Individuals use social movements when they feel a social institution.docx
 
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docxIndustry Averages and Financial Ratios PaperCalculate the 14 rat.docx
Industry Averages and Financial Ratios PaperCalculate the 14 rat.docx
 
Information is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docxInformation is provided for you below that will help you construct a.docx
Information is provided for you below that will help you construct a.docx
 
Individuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docxIndividuals who are frequent voters share common characteristics, re.docx
Individuals who are frequent voters share common characteristics, re.docx
 
Infectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docxInfectious diseases come with extremely tough challenges to mitigate.docx
Infectious diseases come with extremely tough challenges to mitigate.docx
 
Individual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docxIndividual Reflection in which you describe the plan that you would .docx
Individual Reflection in which you describe the plan that you would .docx
 
Individual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docxIndividual ProjectGroups in the WorkplaceSun, 10816.docx
Individual ProjectGroups in the WorkplaceSun, 10816.docx
 
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docxIndividual ProjectRecruitment Strategies and Tools Mon, 83.docx
Individual ProjectRecruitment Strategies and Tools Mon, 83.docx
 

Recently uploaded

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Po-Chuan Chen
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 

Recently uploaded (20)

Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdfAdversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
Adversarial Attention Modeling for Multi-dimensional Emotion Regression.pdf
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 

Discussion Forum.300 wordsInclude at least. words in your po

  • 1. Discussion Forum. 300 words Include at least. words in your posting and at least 250 words in your reply. Indicate at least one source or reference in your original post. Please see syllabus for details on submission requirements. Discussion Question Search "scholar.google.com" or your textbook. Discuss what role end-users typically play in incident reporting? Should end users be encouraged to report suspicious occurrences? If so, why; if not, why not. What factors typically influence the end- user decision to report (or not report) a potential incident? Reply to classmate1 275 words: The Role End-Users Typically Play in Incident Reporting End-users act like witnesses in the reporting of an incident because they spent a lot f their time within the premises of the company. It is much important for them to secure the details of an incident once it has happened such that they will be transferred to the right authority. There is no need to keep the memories of what happened by the emotional factors when there is no evidence of what really transpired (Seidel, 2017). The information ought to be captured as early as possible which describes the incident and indicate a witness statement together with the time off incident. Consequently, other reports which concerns mishap in the IT systems ought to be reported immediately by the end-users. End Users Should be Encouraged to Report Suspicious
  • 2. Occurrences The end-users ought to be encouraged o report any suspicious occurrences in the premises because this helps in solving a small problem instead waiting until it becomes a disaster. They are people interacting with most of the machinery hence being in a position to notice any suspicious occurrence hence they should be encouraged to report them. Factors Which Influence the End-User Decision to Report (Or Not Report) a Potential Incident If the incident which has been reported is adequately dug into and the end-users fall victims on the same, they get discouraged to report any incidents which happens again in the premises. The end-users can be encouraged to report incidences following strict policies which should be set to govern cooperation. Thus, they will be encouraged to report because they understand the consequences of not reporting the incidence. The end-users can get encouraged through ensuring that the reported incident has been attended to effectively. Reply to class mate2 275 words: An incident is defined as any situation that will stop the business process. In an IT perspective, an incident is defined as Interruption to IT services from tiny part to the whole business. If we talk about the management of incident and resolution, End users role will be always crucial in the incident reporting when there is any security breach until the final resolution. They can give some vital information which will be used to trace the incidents as being a witness. In every case, End users will be accessing some type of data or inputting the data, hence they will have a good amount of information after an incident. Every organization will have a dedicated team of professionals who will handle the suspicious activity and also analyzing any kind
  • 3. of software attacks. When end users witness any incident the primary duty should be to gather as much as information and then reporting the collected information to higher officials for further investigation to resolve an incident. In order to bring control of situations, proper incident management should be in place. Collection of information about the incident as soon as possible will result in a less confusing situation in the organization. Once the information is in hand, it will route to a proper expertise person who will bring the situation under control. Most of the time, the employees who witness the incident will ignore the situation thinking that other people will report it which in turn makes the situation more complex in identifying the root cause. Also, most end users are not aware of the risk management plan hence the delay in reporting the incidents. Responding and reporting the incident is very important to bring the situation in control. Hence All End user should be aware of security policies and risk management process. Because of delays in reporting will cause the CSIR team to locate the issue and reduce the Organizational loss. One of the main reason where end users don't report the incidents is due to lack of awareness where how they can participate in overall security process and what type of loss it could cause a single department or an organization. If the end users are well trained about the severities of security breaches on the organization, they will be more helpful in reporting the incidents and coordinating with CSIR teams for the resolution. Reply to classmate 3 275 words: End Users and Incident Reporting End users are sometimes the customers as they are the individuals who analyses the products completely and they have full information about every product, every service provided to
  • 4. them and incident occurring in an organization. The employees who are the part of the organization, are always with a motive to hide various incidents that might create problem for the company but the customers are always enthusiastic in talking about the scenes that are actually taking place. The company authority relies on the customers as they will actively perform to share information and data and the information are mostly delivered as per the required area or location. Some incidents are reported to improve the operations of the company and sometimes the end customers feel fraud practices are taking place and they present the report directly to the company authority to look after the matter accordingly (Chappell, 2017. Customers are the primary individuals who observe the scenes before reporting so they are mainly encouraged by the other customers to report an incident related to the organization to analyse the practices and operations of the company. End customers should be encouraged to report any important incident related to the organization and mainly suspicious occasions should be reported to make the company know about the actual problems. It is always necessary to report the incidents because uncovering any incident will reflect various informations that should be known to the company employees and other customers in the market. The company’s operation and performance are mainly examined with the help of the information that are collected from incident reporting. If the customers are encouraged to report a particular incident there is a chance that the existing problems will be solved and similar incident will not be repeated in future (Kelley, 2018). However the customers are not always encouraged to report an incident because it directly affects the reputation of the organization and sometimes uncovering any incident often leads to more difficulties for the end customers. It is always necessary to encourage the customers because reporting an incident is always important for improving the performance of the company.
  • 5. Important Decision The main purpose of incident reporting is to upgrade the functioning of the organization and control the existing dangers. End users always want the company to function properly and report the actual incident to stop its occurrence in future. For smooth functioning of the company and to avoid existing danger sometimes the customers take decision to report incidents (Hewitt, & Chreim, 2015). Such reports are mainly provided for a better organization in future and while reporting the customers also come across other hazards that should be reported for early recovery. It is always better to find the hidden problems on time and rectify them rather than having more serious problems in future. However sometimes the end customers fear punishment or harassment for reporting any incident and such problems stop the customers from taking any step to report an incident. There are various laws and policies to provide protection to the customers but the laws are not always active as per the situation.