Preparation, detection, and analysis: The diagnostic work of IT security incident response

被引:50
|
作者
Werlinger R. [1 ]
Muldner K. [2 ]
Hawkey K. [1 ]
Beznosov K. [1 ]
机构
[1] University of British Columbia, Vancouver
[2] School of Computing and Informatics, Arizona State University, Tempe, AZ
来源
关键词
Data analysis; Data security; Diagnostic testing;
D O I
10.1108/09685221011035241
中图分类号
学科分类号
摘要
Purpose - The purpose of this paper is to examine security incident response practices of information technology (IT) security practitioners as a diagnostic work process, including the preparation phase, detection, and analysis of anomalies. Design/methodology/approach - The data set consisted of 16 semi-structured interviews with IT security practitioners from seven organizational types (e.g. academic, government, and private). The interviews were analyzed using qualitative description with constant comparison and inductive analysis of the data to analyze diagnostic work during security incident response. Findings - The analysis shows that security incident response is a highly collaborative activity, which may involve practitioners developing their own tools to perform specific tasks. The results also show that diagnosis during incident response is complicated by practitioners' need to rely on tacit knowledge, as well as usability issues with security tools. Research limitations/implications - Owing to the nature of semi-structured interviews, not all participants discussed security incident response at the same level of detail. More data are required to generalize and refine the findings. Originality/value - The contribution of the work is twofold. First, using empirical data, the paper analyzes and describes the tasks, skills, strategies, and tools that security practitioners use to diagnose security incidents. The findings enhance the research community's understanding of the diagnostic work during security incident response. Second, the paper identifies opportunities for future research directions related to improving security tools. © Emerald Group Publishing Limited.
引用
收藏
页码:26 / 42
页数:16
相关论文
共 50 条
  • [41] A case analysis of information systems and security incident responses
    Ahmad, Atif
    Maynard, Sean B.
    Shanks, Graeme
    INTERNATIONAL JOURNAL OF INFORMATION MANAGEMENT, 2015, 35 (06) : 717 - 723
  • [42] Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system
    Patsos D.
    Mitropoulos S.
    Douligeris C.
    Information Management and Computer Security, 2010, 18 (04): : 291 - 309
  • [43] Enhancing security management in public transport using automatic incident detection
    Khoudour, L
    Hindmarsh, J
    Aubert, D
    Velastin, S
    Heath, C
    URBAN TRANSPORT VII: URBAN TRANSPORT AND THE ENVIRONMENT IN THE 21ST CENTURY, 2001, 8 : 619 - 628
  • [44] Information Seeking Behavior in the Domain of Security Incident Detection: An Experimental Investigation
    Safi, Roozmehr
    Browne, Glenn J.
    AMCIS 2017 PROCEEDINGS, 2017,
  • [45] A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective
    Schlette, Daniel
    Caselli, Marco
    Pernul, Gunther
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04): : 2525 - 2556
  • [46] Security agility in response to intrusion detection
    Petkac, M
    Badger, L
    16TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2000, : 11 - 20
  • [47] Proposal and Evaluation of a Security Incident Response Training Method using Programming
    Nagai, Katsumi
    Koide, Hiroshi
    Sakurai, Kouichi
    PROCEEDINGS OF THE 20TH ANNUAL CONFERENCE ON INFORMATION TECHNOLOGY EDUCATION (SIGITE '19), 2019, : 165 - 165
  • [48] Security Incident Response: Towards a Novel Decision-Making System
    Souissi, Samih
    Serhrouchni, Ahmed
    Sliman, Layth
    Charroux, Benoit
    INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS (ISDA 2016), 2017, 557 : 667 - 676
  • [49] Designing a security incident response process for self-sovereign identities
    Leonhard Ziegler
    Michael Grabatin
    Daniela Pöhn
    Wolfgang Hommel
    EURASIP Journal on Information Security, 2025 (1)
  • [50] An Organizational Psychology Perspective to Examining Computer Security Incident Response Teams
    Chen, Tiffani R.
    Shore, Daniel B.
    Zaccaro, Stephen J.
    Dalal, Reeshad S.
    Tetrick, Lois E.
    Gorab, Aiva K.
    IEEE SECURITY & PRIVACY, 2014, 12 (05) : 61 - 67