The importance of practice for cyber security incident response

被引:0
|
作者
Moore G. [1 ]
机构
[1] Cyberis
关键词
Cyber security - Decision-making process - Incident response - Security incident;
D O I
10.12968/S1353-4858(23)70048-2
中图分类号
学科分类号
摘要
When a cyber security incident is detected, recovery can be a stressful, messy, expensive and time-consuming process. For those who have never been involved in an incident response before, one of the biggest surprises is often how many different stakeholders need to be involved and coordinated, and how many considerations need to be accounted for in the decision-making process. This makes teamwork a critical part of ensuring that recovery from an incident is both effective and complete.
引用
收藏
相关论文
共 50 条
  • [41] ANALYSIS OF CYBER SECURITY INCIDENT IN SOUTH KOREAN NUCLEAR POWER PLANT AND CYBER SECURITY SOLUTIONS FOR NUCLEAR POWER INDUSTRIAL CONTROL SYSTEM
    Bian, Yufang
    Li, Jing
    Yin, Baojuan
    PROCEEDINGS OF THE 25TH INTERNATIONAL CONFERENCE ON NUCLEAR ENGINEERING, 2017, VOL 4, 2017,
  • [42] Practice of Training Security Engineers Desired in Cyber Society
    Kayama, Kosetsu
    Yamashita, Shinichiro
    Okuhara, Masayuki
    FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2016, 52 (03): : 85 - 91
  • [43] Healthcare Security Incident Response Strategy-A Proactive Incident Response (IR) Procedure
    He, Ying
    Maglaras, Leandros
    Aliyu, Aliyu
    Luo, Cunjin
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [44] Incident Response: Practice Makes Perfect
    Beck, Susan
    Uppu, Priyanka
    Kopansky, Rita
    Golembeski, James E.
    Black, Stacey
    Burlingame, Gary A.
    JOURNAL AMERICAN WATER WORKS ASSOCIATION, 2019, 111 (06): : 24 - 31
  • [45] Security incident response: rethinking risk management
    Alberts, C
    Dorofee, A
    CARS 2004: COMPUTER ASSISTED RADIOLOGY AND SURGERY, PROCEEDINGS, 2004, 1268 : 141 - 146
  • [46] Meeting the global challenges of security incident response
    Masurkar, V
    Fischer-Hübner, S
    Swimmer, M
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 101 - 117
  • [47] Security Incident Response Automation for xPON Networks
    Oujezsky, Vaclav
    Horvath, Tomas
    Holik, Martin
    JOURNAL OF COMMUNICATIONS SOFTWARE AND SYSTEMS, 2022, 18 (02) : 144 - 152
  • [48] Aligning disaster recovery and security incident response
    Schultz, E
    COMPUTERS & SECURITY, 2005, 24 (07) : 505 - 506
  • [49] Best Security Measures to Reduce Cyber-Incident and Data Breach Risks
    Kikuchi, Hiroaki
    Yamada, Michihiro
    Ikegami, Kazuki
    Inui, Koji
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2021, 2022, 13140 : 3 - 19
  • [50] Extracting Entities and Events from Cyber-Physical Security Incident Reports
    Ramrakhiyani, Nitin
    Patil, Sangameshwar
    Jella, Manideep
    Kumar, Alok
    Palshikar, Girish K.
    2022 IEEE INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS, ICDMW, 2022, : 602 - 609