Dynamic Cyber-Incident Response

被引:0
|
作者
Mepham, Kevin [1 ]
Louvieris, Panos [1 ]
Ghinea, Gheorghita [1 ]
Clewley, Natalie [1 ]
机构
[1] Brunel Univ, Def & Cyber Secur Res Grp, London, England
关键词
Cyber Incident Response Active Passive Risk;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Traditional cyber-incident response models have not changed significantly since the early days of the Computer Incident Response with even the most recent incident response life cycle model advocated by the US National Institute of Standards and Technology (Cichonski, Millar, Grance, & Scarfone, 2012) bearing a striking resemblance to the models proposed by early leaders in the field e.g. Carnegie-Mellon University (West-Brown, et al., 2003) and the SANS Institute (Northcutt, 2003). Whilst serving the purpose of producing coherent and effective response plans, these models appear to be created from the perspectives of Computer Security professionals with no referenced academic grounding. They attempt to defend against, halt and recover from a cyber-attack as quickly as possible. However, other actors inside an organisation may have priorities which conflict with these traditional approaches and may ultimately better serve the longer-term goals and objectives of an organisation. Shortcomings of traditional approaches in cyber-incident response and ideas for a more dynamic approach are discussed including balancing the requirements to defend against an incident with those of gaining more intelligence about an attack or those behind it. To support this, factors are described which have been identified as being relevant to cyber-incident response. These factors were derived from a literature review comprising material from academic and best-practice sources in the computer security, intelligence and command and control fields. Results of a PhD research survey conducted across military, government and commercial organisations are discussed; this assesses the importance of the aforementioned factors. The surveyed participants include (but were not limited to) respondents from areas such as Intelligence and Operations, as well as the more conventional computer security areas. Situational awareness and decision-making aspects of incident response are examined as well as other factors such as intelligence value, intelligence gathering, asset value, collaboration and Intelligence Cycle factors.
引用
收藏
页码:121 / 136
页数:16
相关论文
共 50 条
  • [41] Incident-specific cyber insurance
    Chong, Wing Fung
    Linders, Daniel
    Quan, Zhiyu
    Zhang, Linfeng
    ASTIN BULLETIN-THE JOURNAL OF THE INTERNATIONAL ACTUARIAL ASSOCIATION, 2025,
  • [42] Cyber Incident Classification: Issues and Challenges
    Ibrishimova, Marina Danchovsky
    ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 3PGCIC-2018, 2019, 24 : 469 - 477
  • [43] Dynamic risk management response system to handle cyber threats
    Gonzalez-Granadillo, G.
    Dubus, S.
    Motzek, A.
    Garcia-Alfaro, J.
    Alvarez, E.
    Merialdo, M.
    Papillon, S.
    Debar, H.
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 83 : 535 - 552
  • [44] Data Analytics for Cyber Risk Analysis Utilizing Cyber Incident Datasets
    Portalatin, Melissa
    Keskin, Omer
    Malneedi, Sneha
    Raza, Owais
    Tatar, Unal
    2021 SYSTEMS AND INFORMATION ENGINEERING DESIGN SYMPOSIUM (IEEE SIEDS 2021), 2021, : 164 - 169
  • [45] Dynamic response of a group of flexible foundations to incident seismic waves
    Tham, LG
    Qian, J
    Cheung, YK
    SOIL DYNAMICS AND EARTHQUAKE ENGINEERING, 1998, 17 (02) : 127 - 137
  • [46] Dynamic response of rock slopes to oblique incident SV waves
    Fan, G.
    Zhang, L. M.
    Li, X. Y.
    Fan, R. L.
    Zhang, J. J.
    ENGINEERING GEOLOGY, 2018, 247 : 94 - 103
  • [47] Cyber Security Incident Handling, Warning and Response System for the European Critical Information Infrastructures (CyberSANE)
    Papastergiou, Spyridon
    Mouratidis, Haralambos
    Kalogeraki, Eleni-Maria
    ENGINEERING APPLICATIONS OF NEURAL NETWORKSX, 2019, 1000 : 476 - 487
  • [48] From incident response to incident response management
    Johnsen, SO
    Rostad, L
    Haugset, B
    Dahl, MB
    PROBABILISTIC SAFETY ASSESSMENT AND MANAGEMENT, VOL 1- 6, 2004, : 122 - 127
  • [49] Cyber Influence Attack: Changes in Cyber Threats Seen in the Russian Hacking Incident
    Park, Mookyu
    Park, Moosung
    Lee, Kyungho
    INFORMATION SECURITY APPLICATIONS, 2018, 10763 : 224 - 235
  • [50] Rationality constraints in cyber defense: Incident handling, attribution and cyber threat intelligence
    Hettema, Hinne
    COMPUTERS & SECURITY, 2021, 109