Incident Response: the road from a Security Policy to automated trace-back mechanisms
نویسندگان
چکیده
Incident Response has always been perceived as a very important issue in every Corporate Security Policy. Every security incident has to be treated differently according to many different factors that define its significance, magnitude and effects. In this context, many Incident Response best practices were developed and adopted in corporate or legal frameworks and standards. On the other hand, Digital Forensics and trace-back mechanisms are considered to be the ultimate technical solution for holding attackers accountable for their actions. This paper presents a complete management framework and a structured methodology for efficiently respond to security incidents. Furthermore, it proposes an approach to effectively mirror specific management and policy issues to certain technical mechanisms in order to reach to the actual attacker. Finally, new challenges, open issues and the changing focus from corporate environments to ordinary users are presented, hoping to drive heavy research in this very prosperous field in Information Security.
منابع مشابه
Incident response requirements for distributed security information management systems
Purpose – Security information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by corresponding mechanisms within an organization. However, these systems currently lack the capability of producing and enforcing response policies, mainly due to their limited incident response (IR) functionality. This paper...
متن کاملOn Incident Handling and Response: A state-of-the-art approach
Incident Response has always been an important aspect of Information Security but it is often overlooked by security administrators. Responding to an incident is not solely a technical issue but has many management, legal, technical and social aspects that are presented in this paper. We propose a detailed management framework along with a complete structured methodology that contains best prac...
متن کاملIncident response teams - Challenges in supporting the organisational security function
Incident response is a critical security function in organisations that aims to manage incidents in a timely and cost-effective manner. This research was motivated by previous case studies that suggested that the practice of incident response frequently did not result in the improvement of strategic security processes such as policy development and risk assessment. An exploratory in-depth case ...
متن کاملAgent-based modelling and simulation of network cyber-attacks and cooperative defence mechanisms
The important problem in network security which solution is urgently needed is the investigation of counteraction between malefactors and defence systems in computer networks, including the Internet, and the creation of effective cyber-defence systems. It is important to underline that experienced malefactors realize sophisticated strategies of cyber-attacks. These strategies can include: Inf...
متن کاملFormal approach on modeling and predicting of software system security: Stochastic petri net
To evaluate and predict component-based software security, a two-dimensional model of software security is proposed by Stochastic Petri Net in this paper. In this approach, the software security is modeled by graphical presentation ability of Petri nets, and the quantitative prediction is provided by the evaluation capability of Stochastic Petri Net and the computing power of Markov chain. Each...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2005