Dynamic Cyber-Incident Response

被引:0
|
作者
Mepham, Kevin [1 ]
Louvieris, Panos [1 ]
Ghinea, Gheorghita [1 ]
Clewley, Natalie [1 ]
机构
[1] Brunel Univ, Def & Cyber Secur Res Grp, London, England
关键词
Cyber Incident Response Active Passive Risk;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional cyber-incident response models have not changed significantly since the early days of the Computer Incident Response with even the most recent incident response life cycle model advocated by the US National Institute of Standards and Technology (Cichonski, Millar, Grance, & Scarfone, 2012) bearing a striking resemblance to the models proposed by early leaders in the field e.g. Carnegie-Mellon University (West-Brown, et al., 2003) and the SANS Institute (Northcutt, 2003). Whilst serving the purpose of producing coherent and effective response plans, these models appear to be created from the perspectives of Computer Security professionals with no referenced academic grounding. They attempt to defend against, halt and recover from a cyber-attack as quickly as possible. However, other actors inside an organisation may have priorities which conflict with these traditional approaches and may ultimately better serve the longer-term goals and objectives of an organisation. Shortcomings of traditional approaches in cyber-incident response and ideas for a more dynamic approach are discussed including balancing the requirements to defend against an incident with those of gaining more intelligence about an attack or those behind it. To support this, factors are described which have been identified as being relevant to cyber-incident response. These factors were derived from a literature review comprising material from academic and best-practice sources in the computer security, intelligence and command and control fields. Results of a PhD research survey conducted across military, government and commercial organisations are discussed; this assesses the importance of the aforementioned factors. The surveyed participants include (but were not limited to) respondents from areas such as Intelligence and Operations, as well as the more conventional computer security areas. Situational awareness and decision-making aspects of incident response are examined as well as other factors such as intelligence value, intelligence gathering, asset value, collaboration and Intelligence Cycle factors.
引用
收藏
页码:121 / 136
页数:16
相关论文
共 50 条
  • [21] Malware incident response (IR) informed by cyber threat intelligence (CTI)
    Ying He
    Ellis Inglut
    Cunjin Luo
    Science China Information Sciences, 2022, 65
  • [22] Digital Forensics as a Service Implementation: A Scalable Solution for Cyber Incident Response
    Munke, Esho
    Musuva, Paula M. W.
    2024 IST-AFRICA CONFERENCE, 2024,
  • [23] Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review
    Ahmadi-Assalemi, Gabriela
    Al-Khateeb, Haider
    Epiphaniou, Gregory
    Maple, Carsten
    SMART CITIES, 2020, 3 (03): : 894 - 927
  • [24] Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation
    Akbari Gurabi, Mehdi
    Nitz, Lasse
    Bregar, Andrej
    Popanda, Jan
    Siemers, Christian
    Matzutt, Roman
    Mandal, Avikarsha
    Digital Threats: Research and Practice, 2024, 5 (03):
  • [25] Cyber Threat Intelligence Framework for Incident Response in an Energy Cloud Platform
    Gong, Seonghyeon
    Lee, Changhoon
    ELECTRONICS, 2021, 10 (03) : 1 - 19
  • [26] Factors Effecting Cyber Incident Occurrence: Mediating Role of Cyber Incident Reporting Mechanism
    Bhatti, Muhammad Awais
    Jamil, Saima
    INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2023, 17 (02): : 112 - 133
  • [27] Digital Twin-Enhanced Incident Response for Cyber-Physical Systems
    Allison, David
    Smith, Paul
    McLaughlin, Kieran
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [28] Information Sharing Requirements and Framework Needed for Community Cyber Incident Detection and Response
    Harrison, Keith
    White, Gregory
    2012 IEEE INTERNATIONAL CONFERENCE ON TECHNOLOGIES FOR HOMELAND SECURITY, 2012, : 463 - 469
  • [29] A Cyber Incident Response and Recovery Framework to Support Operators of Industrial Control Systems
    Staves, Alexander
    Anderson, Tom
    Balderstone, Harry
    Green, Benjamin
    Gouglidis, Antonios
    Hutchison, David
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2022, 37
  • [30] Development of Incident Response Tool for Cyber Security Training Based on Virtualization and Cloud
    Park, Y. S.
    Choi, C. S.
    Jang, C.
    Shin, D. G.
    Cho, G. C.
    Kim, Hwa Soo
    2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 115 - 118