Incident Response Essay

2016 Words5 Pages

2. Detection of Incidents:

It cannot succeed in responding to incidents if an organization cannot detect incidents effectively. Therefore, one of the most important aspects of incident response is the detection of incidents phase. It is also one of the most fragmented phases, in which incident response expertise has the least control.

Suspected incidents may be detected in innumerable ways. When someone suspects that an unauthorized, unacceptable, or unlawful event has occurred involving an organization’s computer networks or data-processing equipment Computer security incidents are normally identified. Initially, the incident may be reported by an ultimate user, detected by a system administrator, identified by IDS alerts, or discovered …show more content…

To establish accurate metrics is very critical, which is mostly required for an organization’s incident response capability to obtain the proper budget required.

In most of organizations ultimate users may report an incident through one of three avenues. This three avenues may be their immediate supervisor, the corporate help desk (or local Information Technology department if there is no formal help desk), or an incident hotline managed by the Information Security entity. Typically, employee-related issues are reported to a supervisor or directly to the local Human Resources department while end users report technical issues to the help desk.

It is paramount to record all of the known details, no matter how you detect an incident. To make sure you record the relevant facts we suggest using an initial response checklist. After an incident is detected the initial response checklist should account for many details, not all of which will be readily recognizable immediately. Also record the known facts. Some of the details which are critical include the following:

• Prevalent time and date.
• Report of the incident such as …show more content…

Whoever detects the incident or by an individual who has notified that the incident may have occurred, the details surrounded by the incidents are documented. (For example, help desk or security personnel) To take advantage of the team’s expertise the control of the response should be forwarded to the Computer Security Incident Response Team early in the process. The more steps in the initial response phase performed by the Computer Security Incident Response Team is better.
Typically, touching the affected system(s) will not be involved in the initial response. The data collected during this initial response phase includes reviewing of network-based and other evidence. Initial response phase involves the following tasks:

• Interviewing system administrators of an incident who might have understanding into the technical details.
• Interviewing business unit human resource that may provide a context for the incident, which might have understanding into business events.
• To identify data reviewing intrusion detection reports and network-based logs of the incident that would support that an incident has

Open Document