Dynamic Cyber-Incident Response

被引:0
|
作者
Mepham, Kevin [1 ]
Louvieris, Panos [1 ]
Ghinea, Gheorghita [1 ]
Clewley, Natalie [1 ]
机构
[1] Brunel Univ, Def & Cyber Secur Res Grp, London, England
关键词
Cyber Incident Response Active Passive Risk;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional cyber-incident response models have not changed significantly since the early days of the Computer Incident Response with even the most recent incident response life cycle model advocated by the US National Institute of Standards and Technology (Cichonski, Millar, Grance, & Scarfone, 2012) bearing a striking resemblance to the models proposed by early leaders in the field e.g. Carnegie-Mellon University (West-Brown, et al., 2003) and the SANS Institute (Northcutt, 2003). Whilst serving the purpose of producing coherent and effective response plans, these models appear to be created from the perspectives of Computer Security professionals with no referenced academic grounding. They attempt to defend against, halt and recover from a cyber-attack as quickly as possible. However, other actors inside an organisation may have priorities which conflict with these traditional approaches and may ultimately better serve the longer-term goals and objectives of an organisation. Shortcomings of traditional approaches in cyber-incident response and ideas for a more dynamic approach are discussed including balancing the requirements to defend against an incident with those of gaining more intelligence about an attack or those behind it. To support this, factors are described which have been identified as being relevant to cyber-incident response. These factors were derived from a literature review comprising material from academic and best-practice sources in the computer security, intelligence and command and control fields. Results of a PhD research survey conducted across military, government and commercial organisations are discussed; this assesses the importance of the aforementioned factors. The surveyed participants include (but were not limited to) respondents from areas such as Intelligence and Operations, as well as the more conventional computer security areas. Situational awareness and decision-making aspects of incident response are examined as well as other factors such as intelligence value, intelligence gathering, asset value, collaboration and Intelligence Cycle factors.
引用
收藏
页码:121 / 136
页数:16
相关论文
共 50 条
  • [21] Cyber Threats and Incident Response Capability- A Case Study of Pakistan
    Tariq, Muhammad
    Aslam, Baber
    Rashid, Imran
    Waqar, Adeela
    2013 2ND NATIONAL CONFERENCE ON INFORMATION ASSURANCE (NCIA), 2013, : 15 - 20
  • [22] A Comparative Study on Cyber Threat Intelligence: The Security Incident Response Perspective
    Schlette, Daniel
    Caselli, Marco
    Pernul, Gunther
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2021, 23 (04): : 2525 - 2556
  • [23] Malware incident response(IR) informed by cyber threat intelligence(CTI)
    Ying HE
    Ellis INGLUT
    Cunjin LUO
    ScienceChina(InformationSciences), 2022, 65 (07) : 256 - 258
  • [24] Malware incident response (IR) informed by cyber threat intelligence (CTI)
    Ying He
    Ellis Inglut
    Cunjin Luo
    Science China Information Sciences, 2022, 65
  • [25] Digital Forensics as a Service Implementation: A Scalable Solution for Cyber Incident Response
    Munke, Esho
    Musuva, Paula M. W.
    2024 IST-AFRICA CONFERENCE, 2024,
  • [26] Cyber Resilience and Incident Response in Smart Cities: A Systematic Literature Review
    Ahmadi-Assalemi, Gabriela
    Al-Khateeb, Haider
    Epiphaniou, Gregory
    Maple, Carsten
    SMART CITIES, 2020, 3 (03): : 894 - 927
  • [27] Requirements for Playbook-Assisted Cyber Incident Response, Reporting and Automation
    Gurabi, Mehdi Akbari
    Nitz, Lasse
    Bregar, Andrej
    Popanda, Jan
    Siemers, Christian
    Matzutt, Roman
    Mandal, Avikarsha
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2024, 5 (03):
  • [28] Cyber Threat Intelligence Framework for Incident Response in an Energy Cloud Platform
    Gong, Seonghyeon
    Lee, Changhoon
    ELECTRONICS, 2021, 10 (03) : 1 - 19
  • [29] Factors Effecting Cyber Incident Occurrence: Mediating Role of Cyber Incident Reporting Mechanism
    Bhatti, Muhammad Awais
    Jamil, Saima
    INTERNATIONAL JOURNAL OF CYBER CRIMINOLOGY, 2023, 17 (02): : 112 - 133
  • [30] Digital Twin-Enhanced Incident Response for Cyber-Physical Systems
    Allison, David
    Smith, Paul
    McLaughlin, Kieran
    18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,