Dynamic Cyber-Incident Response

被引:0
|
作者
Mepham, Kevin [1 ]
Louvieris, Panos [1 ]
Ghinea, Gheorghita [1 ]
Clewley, Natalie [1 ]
机构
[1] Brunel Univ, Def & Cyber Secur Res Grp, London, England
关键词
Cyber Incident Response Active Passive Risk;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional cyber-incident response models have not changed significantly since the early days of the Computer Incident Response with even the most recent incident response life cycle model advocated by the US National Institute of Standards and Technology (Cichonski, Millar, Grance, & Scarfone, 2012) bearing a striking resemblance to the models proposed by early leaders in the field e.g. Carnegie-Mellon University (West-Brown, et al., 2003) and the SANS Institute (Northcutt, 2003). Whilst serving the purpose of producing coherent and effective response plans, these models appear to be created from the perspectives of Computer Security professionals with no referenced academic grounding. They attempt to defend against, halt and recover from a cyber-attack as quickly as possible. However, other actors inside an organisation may have priorities which conflict with these traditional approaches and may ultimately better serve the longer-term goals and objectives of an organisation. Shortcomings of traditional approaches in cyber-incident response and ideas for a more dynamic approach are discussed including balancing the requirements to defend against an incident with those of gaining more intelligence about an attack or those behind it. To support this, factors are described which have been identified as being relevant to cyber-incident response. These factors were derived from a literature review comprising material from academic and best-practice sources in the computer security, intelligence and command and control fields. Results of a PhD research survey conducted across military, government and commercial organisations are discussed; this assesses the importance of the aforementioned factors. The surveyed participants include (but were not limited to) respondents from areas such as Intelligence and Operations, as well as the more conventional computer security areas. Situational awareness and decision-making aspects of incident response are examined as well as other factors such as intelligence value, intelligence gathering, asset value, collaboration and Intelligence Cycle factors.
引用
收藏
页码:121 / 136
页数:16
相关论文
共 50 条
  • [1] DDoS Cyber-Incident Detection in Smart Grids
    Merlino, Jorge C.
    Asiri, Mohammed
    Saxena, Neetesh
    SUSTAINABILITY, 2022, 14 (05)
  • [2] Development and evaluation of information elements for simplified cyber-incident reports
    Lif, Patrik
    Sommestad, Teodor
    Granasen, Dennis
    2018 INTERNATIONAL CONFERENCE ON CYBER SITUATIONAL AWARENESS, DATA ANALYTICS AND ASSESSMENT (CYBER SA), 2018,
  • [3] Best Security Measures to Reduce Cyber-Incident and Data Breach Risks
    Kikuchi, Hiroaki
    Yamada, Michihiro
    Ikegami, Kazuki
    Inui, Koji
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2021, 2022, 13140 : 3 - 19
  • [4] Transforming Cyber Incident Response
    Murdoch S.
    ITNOW, 2019, 61 (01) : 34 - 35
  • [5] Cyber security, intrusion detection and incident response
    Nuñez, Eduardo Arriols
    Euroheat and Power (English Edition), 2017, 14 (04): : 34 - 35
  • [6] The importance of practice for cyber security incident response
    Moore G.
    Network Security, 2023, 2023 (10)
  • [7] Cyber incident response and planning: a flexible approach
    Shinde N.
    Kulkarni P.
    Computer Fraud and Security, 2021, 2021 (01): : 14 - 19
  • [8] Economics of incident response panels in cyber insurance
    Arce, Daniel
    Woods, Daniel W.
    Bohme, Rainer
    COMPUTERS & SECURITY, 2024, 140
  • [9] Build a cyber security incident response plan
    Staggs, Kevin
    CONTROL ENGINEERING, 2009, 56 (12) : 56 - 56
  • [10] Actionable Cyber Threat Intelligence for Automated Incident Response
    Leite, Cristoffer
    den Hartog, Jerry
    dos Santos, Daniel Ricardo
    Costante, Elisa
    SECURE IT SYSTEMS, NORDSEC 2022, 2022, 13700 : 368 - 385