The importance of practice for cyber security incident response

被引:0
|
作者
Moore G. [1 ]
机构
[1] Cyberis
关键词
Cyber security - Decision-making process - Incident response - Security incident;
D O I
10.12968/S1353-4858(23)70048-2
中图分类号
学科分类号
摘要
When a cyber security incident is detected, recovery can be a stressful, messy, expensive and time-consuming process. For those who have never been involved in an incident response before, one of the biggest surprises is often how many different stakeholders need to be involved and coordinated, and how many considerations need to be accounted for in the decision-making process. This makes teamwork a critical part of ensuring that recovery from an incident is both effective and complete.
引用
收藏
相关论文
共 50 条
  • [21] Information security incident response
    BSkyB
    Netw. Secur., 2007, 12 (10-13):
  • [22] The importance of log files in security incident prevention
    Forte, Dario
    Netw. Secur., 2009, 7 (18-20): : 18 - 20
  • [23] Cyber incident response and planning: a flexible approach
    Shinde N.
    Kulkarni P.
    Computer Fraud and Security, 2021, 2021 (01): : 14 - 19
  • [24] Economics of incident response panels in cyber insurance
    Arce, Daniel
    Woods, Daniel W.
    Bohme, Rainer
    COMPUTERS & SECURITY, 2024, 140
  • [25] Modelling language for cyber security incident handling for critical infrastructures
    Mouratidis, Haralambos
    Islam, Shareeful
    Santos-Olmo, Antonio
    Sanchez, Luis E.
    Ismail, Umar Mukhtar
    COMPUTERS & SECURITY, 2023, 128
  • [26] A Readiness Model for Measuring the Maturity of Cyber Security Incident Management
    Rieger, David
    Tjoa, Simon
    ADVANCES IN INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS, 2019, 23 : 283 - 293
  • [27] Analysis and Parsing of Unstructured Cyber-Security Incident Data
    Ochoa, Armando J.
    Finlayson, Mark A.
    PROCEEDINGS OF THE 2019 CONFERENCE ON SECURITY AND PRIVACY IN WIRELESS AND MOBILE NETWORKS (WISEC '19), 2019, : 345 - 346
  • [28] Developing a Cyber Incident Exercises Model to Educate Security Teams
    Alothman, Basil
    Alhajraf, Aldanah
    Alajmi, Reem
    Al Farraj, Rawan
    Alshareef, Nourah
    Khan, Murad
    ELECTRONICS, 2022, 11 (10)
  • [29] Envisioning a Cyber-Security Incident Managed Campus Environment
    Thorpe, Sean
    Jarrett, Julian
    Grandison, Tyrone
    2020 SECOND IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2020), 2020, : 307 - 309
  • [30] Check Your Blind Spot: A New Cyber-Security Metric for Measuring Incident Response Readiness
    Aziz, Benjamin
    Malik, Ali
    Jung, Jeyong
    RISK ASSESSMENT AND RISK-DRIVEN QUALITY ASSURANCE, RISK 2016, 2017, 10224 : 19 - 33