Preparation, detection, and analysis: The diagnostic work of IT security incident response

被引:50
|
作者
Werlinger R. [1 ]
Muldner K. [2 ]
Hawkey K. [1 ]
Beznosov K. [1 ]
机构
[1] University of British Columbia, Vancouver
[2] School of Computing and Informatics, Arizona State University, Tempe, AZ
来源
关键词
Data analysis; Data security; Diagnostic testing;
D O I
10.1108/09685221011035241
中图分类号
学科分类号
摘要
Purpose - The purpose of this paper is to examine security incident response practices of information technology (IT) security practitioners as a diagnostic work process, including the preparation phase, detection, and analysis of anomalies. Design/methodology/approach - The data set consisted of 16 semi-structured interviews with IT security practitioners from seven organizational types (e.g. academic, government, and private). The interviews were analyzed using qualitative description with constant comparison and inductive analysis of the data to analyze diagnostic work during security incident response. Findings - The analysis shows that security incident response is a highly collaborative activity, which may involve practitioners developing their own tools to perform specific tasks. The results also show that diagnosis during incident response is complicated by practitioners' need to rely on tacit knowledge, as well as usability issues with security tools. Research limitations/implications - Owing to the nature of semi-structured interviews, not all participants discussed security incident response at the same level of detail. More data are required to generalize and refine the findings. Originality/value - The contribution of the work is twofold. First, using empirical data, the paper analyzes and describes the tasks, skills, strategies, and tools that security practitioners use to diagnose security incidents. The findings enhance the research community's understanding of the diagnostic work during security incident response. Second, the paper identifies opportunities for future research directions related to improving security tools. © Emerald Group Publishing Limited.
引用
收藏
页码:26 / 42
页数:16
相关论文
共 50 条
  • [1] Cyber security, intrusion detection and incident response
    Nuñez, Eduardo Arriols
    Euroheat and Power (English Edition), 2017, 14 (04): : 34 - 35
  • [2] Information security incident response
    BSkyB
    Netw. Secur., 2007, 12 (10-13):
  • [3] Botnet Detection and Incident Response in Security Operation Center (SOC): A Proposed Framework
    Muhammad, Roslaily
    Ismail, Saiful Adli
    Hassan, Noor Hafizah
    International Journal of Advanced Computer Science and Applications, 2024, 15 (03) : 893 - 901
  • [4] On Computer Security Incident Response Teams
    Horne, Bill
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 13 - 15
  • [5] Healthcare Security Incident Response Strategy-A Proactive Incident Response (IR) Procedure
    He, Ying
    Maglaras, Leandros
    Aliyu, Aliyu
    Luo, Cunjin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [6] Security Incident Detection Using Multidimensional Analysis of the Web Server Log Files
    Kolaczek, Grzegorz
    Kuzemko, Tomasz
    COMPUTATIONAL COLLECTIVE INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS, ICCCI 2014, 2014, 8733 : 663 - 672
  • [7] An Advanced Incident Response Methodology Based on Correlation Analysis of Polymorphic Security Events
    Lee, Haeng-Gon
    Song, Jungsuk
    Choi, Sang-Soo
    Cho, Gi-Hwan
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2013, E96B (07) : 1803 - 1813
  • [8] Directions in Incident Detection and Response
    Bejtlich, Richard
    Steven, John
    Peterson, Gunnar
    IEEE SECURITY & PRIVACY, 2011, 9 (01) : 91 - 92
  • [9] Security incident response: rethinking risk management
    Alberts, C
    Dorofee, A
    CARS 2004: COMPUTER ASSISTED RADIOLOGY AND SURGERY, PROCEEDINGS, 2004, 1268 : 141 - 146
  • [10] Meeting the global challenges of security incident response
    Masurkar, V
    Fischer-Hübner, S
    Swimmer, M
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 101 - 117