SlideShare a Scribd company logo
Security Program and
Policies
Principles and Practices
by Sari Stern Greene
Chapter 11: Information Security Incident Management
Copyright 2014 Pearson Education, Inc. 2
Objectives
❑ Prepare for an information security incident
❑ Identify an information security incident
❑ Recognize the stages in incident management
❑ Properly document an information security incident
❑ Understand federal and state data breach notification
requirements
❑ Consider an incident from the perspective of the victim
❑ Create policies related to information security incident
management
Organizational Incident Response
■ Incidents drain resources and can be expensive
■ The right time to develop an Incident Response plan
is before an incident occurs
■ Incident preparedness includes having policies,
strategies, plans, and procedures
Copyright 2014 Pearson Education, Inc. 3
What Is an Incident?
■ Information security incident is an adverse
event that threatens business security and/or
disrupts service
■ Every organization should be familiar with
and prepared to respond to the following core
group of attacks
❑ Intentional unauthorized access or use
■ Occurs when an insider or an intruder gains logical or
physical access without permission
Copyright 2014 Pearson Education, Inc. 4
What Is an Incident? Cont.
❑ Denial of service (DoS) attacks
■ Prevents or impairs the normal authorized functionality
of the organization’s networks, systems, or applications
❑ Malware
■ Code that is covertly inserted into another program with
the intent of gaining authorized access or causing harm
❑ Inappropriate usage
■ Occurs when authorized user performs actions that
violate company policy, agreement, law, or regulation
Copyright 2014 Pearson Education, Inc. 5
Incident Severity Levels
■ Three severity levels
❑ Level 1
■ Incidents that could cause significant harm
❑ Level 2
■ Compromise of or unauthorized access to noncritical
systems or information
❑ Level 3
■ Situations that can be contained and resolved by the
information system custodian, data/process owner, or
HR personnel
Copyright 2014 Pearson Education, Inc. 6
How Are Incidents Reported?
■ Employees should be required to report all
actual and suspected incidents
■ The employee who discovers an incident may
not be trained or an IT technician
■ The culture of the company needs to
incorporate this point so that employees don’t
feel like they may be ridiculed if they are
wrong
Copyright 2014 Pearson Education, Inc. 7
What Is an Incident Response
Program
■ Composed of policies, plans, procedures,
and people
■ An incident response plan (IRP) is a roadmap
of reporting, responding, and recovery
actions
■ Incident response procedures are detailed
steps needed to implement the plan
Copyright 2014 Pearson Education, Inc. 8
What Is an Incident Response
Program Cont.
■ Activities in the IRP
❑ Preparation
❑ Detection and investigation
❑ Initial response
❑ Containment
❑ Eradication and recovery
❑ Notification
❑ Closure and post-incident activity
❑ Documentation and evidence-handling
requirements
Copyright 2014 Pearson Education, Inc. 9
Key Incident Management
Personnel
■ Incident response coordinator (IRC)
❑ Central point of contact for all incidents
❑ Verifies and logs the incident
■ Designated incident handlers (DIHs)
❑ Senior-level personnel who have crisis
management and communication skills,
experience, and knowledge to handle an incident
■ Incident response team (IRT)
❑ Trained team of professionals that provide
services through the incident lifecycle
Copyright 2014 Pearson Education, Inc. 10
Investigation and Evidence
Handling
■ Incidents should be thoroughly documented
■ Depending on the incident it may be
necessary to contact local, state, or federal
law enforcement
❑ The IRT team should be acquainted with
applicable law enforcement representatives
■ Incident handlers that perform forensic
analysis should be familiar with forensic
principles, guidelines, procedures, tools, and
techniques
Copyright 2014 Pearson Education, Inc. 11
Investigation and Evidence
Handling cont.
■ The process of digital forensic includes
❑ Collection
❑ Examination
❑ Analysis
❑ Reporting
■ Chain of custody applies to physical, digital, and
forensic evidence
❑ It is used to prove that evidence has not been altered
■ Evidence should be stored in a secure location
Copyright 2014 Pearson Education, Inc. 12
Data Breach Notification
Requirements
■ Federal requirements that address the
protection of personally identifiable
information (PII)
❑ Gramm-Leach- Bliley Act (GLBA)
❑ Health Information Technology for Economic and
Clinical Data Act (HITECH)
❑ The Federal Information Security Management
Act (FISMA)
❑ Federal Education Rights and Privacy Act
(FERPA)
Copyright 2014 Pearson Education, Inc. 13
State Breach Notification Laws
■ 46 states, the District of Columbia, Puerto
Rico, and the Virgin Islands have enacted
notification laws designed to protect their
residents
■ States with no security breach laws include
❑ Alabama
❑ Kentucky
❑ New Mexico
❑ South Dakota
Copyright 2014 Pearson Education, Inc. 14
Copyright 2014 Pearson Education, Inc. 15
Summary
■ An information security incident threatens business
security and disrupts operations. Examples of incidents
include unauthorized access, DoS attacks, malware, and
inappropriate usage.
■ Companies should have an incident response plan that
details how incidents should be handled and the roles
and responsibilities of key personnel
■ In most situations data breaches of PII should be
reported to the appropriate authority and affected parties
notified

More Related Content

What's hot

PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
RSAArcher
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
Splunk
 
Chapter 6: Human Resources Security
Chapter 6: Human Resources SecurityChapter 6: Human Resources Security
Chapter 6: Human Resources Security
Nada G.Youssef
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
Karthikeyan Dhayalan
 
Security policies
Security policiesSecurity policies
Security policies
Nishant Pahad
 
Domain 2 - Asset Security
Domain 2 - Asset SecurityDomain 2 - Asset Security
Domain 2 - Asset Security
Maganathin Veeraragaloo
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
Amazon Web Services
 
Information security management system
Information security management systemInformation security management system
Information security management systemArani Srinivasan
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
Sam Bowne
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
Jorge Sebastiao
 
information security management
information security managementinformation security management
information security management
Gurpreetkaur838
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
PECB
 
Security policy
Security policySecurity policy
Security policy
Dhani Ahmad
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
Nada G.Youssef
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
Indian Air Force
 
Security risk management
Security risk managementSecurity risk management
Security risk management
G Prachi
 
12 security policies
12 security policies12 security policies
12 security policies
Saqib Raza
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceCharles Lim
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model Roadmap
David Sweigert
 

What's hot (20)

PPT-Security-for-Management.pptx
PPT-Security-for-Management.pptxPPT-Security-for-Management.pptx
PPT-Security-for-Management.pptx
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Chapter 6: Human Resources Security
Chapter 6: Human Resources SecurityChapter 6: Human Resources Security
Chapter 6: Human Resources Security
 
CISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security ConceptsCISSP - Chapter 1 - Security Concepts
CISSP - Chapter 1 - Security Concepts
 
Security policies
Security policiesSecurity policies
Security policies
 
Domain 2 - Asset Security
Domain 2 - Asset SecurityDomain 2 - Asset Security
Domain 2 - Asset Security
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
Information security management system
Information security management systemInformation security management system
Information security management system
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
1. Security and Risk Management
1. Security and Risk Management1. Security and Risk Management
1. Security and Risk Management
 
Integrating Physical And Logical Security
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
 
information security management
information security managementinformation security management
information security management
 
Introduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security FrameworkIntroduction to Risk Management via the NIST Cyber Security Framework
Introduction to Risk Management via the NIST Cyber Security Framework
 
Security policy
Security policySecurity policy
Security policy
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
Security risk management
Security risk managementSecurity risk management
Security risk management
 
12 security policies
12 security policies12 security policies
12 security policies
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Cyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model RoadmapCyber Table Top Exercise -- Model Roadmap
Cyber Table Top Exercise -- Model Roadmap
 

Viewers also liked

Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityChapter 8: Communications and Operations Security
Chapter 8: Communications and Operations Security
Nada G.Youssef
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset Management
Nada G.Youssef
 
Chapter 1: Understanding Policy
Chapter 1: Understanding Policy Chapter 1: Understanding Policy
Chapter 1: Understanding Policy
Nada G.Youssef
 
Chapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementChapter 12: Business Continuity Management
Chapter 12: Business Continuity Management
Nada G.Youssef
 
Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style
Nada G.Youssef
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control Management
Nada G.Youssef
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
Nada G.Youssef
 
Chapter 4: Governance and Risk Management
Chapter 4: Governance and Risk ManagementChapter 4: Governance and Risk Management
Chapter 4: Governance and Risk Management
Nada G.Youssef
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial Institutions
Nada G.Youssef
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security
Nada G.Youssef
 
Ultimate Guide to Choosing an Incident Management System
Ultimate Guide to Choosing an Incident Management SystemUltimate Guide to Choosing an Incident Management System
Ultimate Guide to Choosing an Incident Management System
24/7 Software
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare Sector
Nada G.Youssef
 
Enterprise security incident management
Enterprise security incident managementEnterprise security incident management
Enterprise security incident management
zapp0
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants
Nada G.Youssef
 
IT Security Myths
IT Security MythsIT Security Myths
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
zapp0
 
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
ITCamp
 
Incident Management
Incident ManagementIncident Management
Incident Management
Abhishek Agnihotry
 

Viewers also liked (19)

Chapter 8: Communications and Operations Security
Chapter 8: Communications and Operations SecurityChapter 8: Communications and Operations Security
Chapter 8: Communications and Operations Security
 
Chapter 5: Asset Management
Chapter 5: Asset ManagementChapter 5: Asset Management
Chapter 5: Asset Management
 
Chapter 1: Understanding Policy
Chapter 1: Understanding Policy Chapter 1: Understanding Policy
Chapter 1: Understanding Policy
 
Chapter 12: Business Continuity Management
Chapter 12: Business Continuity ManagementChapter 12: Business Continuity Management
Chapter 12: Business Continuity Management
 
Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style Chapter 2: Policy Elements and style
Chapter 2: Policy Elements and style
 
Chapter 9: Access Control Management
Chapter 9: Access Control ManagementChapter 9: Access Control Management
Chapter 9: Access Control Management
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
 
Chapter 4: Governance and Risk Management
Chapter 4: Governance and Risk ManagementChapter 4: Governance and Risk Management
Chapter 4: Governance and Risk Management
 
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial InstitutionsChapter 13: Regulatory Compliance for Financial Institutions
Chapter 13: Regulatory Compliance for Financial Institutions
 
Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security Chapter 7: Physical & Environmental Security
Chapter 7: Physical & Environmental Security
 
Ultimate Guide to Choosing an Incident Management System
Ultimate Guide to Choosing an Incident Management SystemUltimate Guide to Choosing an Incident Management System
Ultimate Guide to Choosing an Incident Management System
 
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare SectorChapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 14: Regulatory Compliance for the Healthcare Sector
 
Enterprise security incident management
Enterprise security incident managementEnterprise security incident management
Enterprise security incident management
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants Chapter 15: PCI Compliance for Merchants
Chapter 15: PCI Compliance for Merchants
 
IT Security Myths
IT Security MythsIT Security Myths
IT Security Myths
 
Enterprise security management II
Enterprise security management   IIEnterprise security management   II
Enterprise security management II
 
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
 
Incident Management
Incident ManagementIncident Management
Incident Management
 

Similar to Chapter 11: Information Security Incident Management

Lesson 4
Lesson 4Lesson 4
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
Financial Poise
 
1200 clare sanderon hse ireland
1200 clare sanderon hse ireland1200 clare sanderon hse ireland
1200 clare sanderon hse ireland
investnethealthcare
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Asad Zaman
 
Ch4 cism 2014
Ch4 cism 2014Ch4 cism 2014
Ch4 cism 2014
Aladdin Dandis
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
Raymond Cunningham
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
Next Dimension Inc.
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
TechSoup Canada
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
Resilient Systems
 
SEMHIMA Presentation Final 06052012
SEMHIMA Presentation Final 06052012SEMHIMA Presentation Final 06052012
SEMHIMA Presentation Final 06052012
mrpchcchpc
 
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docxABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
SALU18
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and Controls
Rd. R. Agung Trimanda
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
Piyush Jain
 
Operationalizing Management of Data Incidents Post Final Rule
Operationalizing Management of Data Incidents Post Final RuleOperationalizing Management of Data Incidents Post Final Rule
Operationalizing Management of Data Incidents Post Final Rule
ID Experts
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
JoAnna Cheshire
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
TrustArc
 
Microsoft Navigating Incident Response [EN].pdf
Microsoft Navigating Incident Response [EN].pdfMicrosoft Navigating Incident Response [EN].pdf
Microsoft Navigating Incident Response [EN].pdf
Snarky Security
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
Kroll
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
Arianto Muditomo
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
Mark John Lado, MIT
 

Similar to Chapter 11: Information Security Incident Management (20)

Lesson 4
Lesson 4Lesson 4
Lesson 4
 
How to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security ProgramHow to Build and Implement your Company's Information Security Program
How to Build and Implement your Company's Information Security Program
 
1200 clare sanderon hse ireland
1200 clare sanderon hse ireland1200 clare sanderon hse ireland
1200 clare sanderon hse ireland
 
Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1Multi-faceted Cyber Security v1
Multi-faceted Cyber Security v1
 
Ch4 cism 2014
Ch4 cism 2014Ch4 cism 2014
Ch4 cism 2014
 
Implementing an Information Security Program
Implementing an Information Security ProgramImplementing an Information Security Program
Implementing an Information Security Program
 
Siskinds | Incident Response Plan
Siskinds | Incident Response PlanSiskinds | Incident Response Plan
Siskinds | Incident Response Plan
 
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
How Your Nonprofit Can Avoid Data Breaches and Ensure Privacy Part 2
 
5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan5 Steps to Improve Your Incident Response Plan
5 Steps to Improve Your Incident Response Plan
 
SEMHIMA Presentation Final 06052012
SEMHIMA Presentation Final 06052012SEMHIMA Presentation Final 06052012
SEMHIMA Presentation Final 06052012
 
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docxABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
ABC Healthcare LimitedIncidence Response Policy1. Purpose. T.docx
 
Resume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and ControlsResume: The Complete Guide to Cybersecurity Risks and Controls
Resume: The Complete Guide to Cybersecurity Risks and Controls
 
Incident response methodology
Incident response methodologyIncident response methodology
Incident response methodology
 
Operationalizing Management of Data Incidents Post Final Rule
Operationalizing Management of Data Incidents Post Final RuleOperationalizing Management of Data Incidents Post Final Rule
Operationalizing Management of Data Incidents Post Final Rule
 
Cybersecurity crisis management a prep guide
Cybersecurity crisis management   a prep guideCybersecurity crisis management   a prep guide
Cybersecurity crisis management a prep guide
 
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc SolutionsCCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
CCPA Compliance from Ground Zero: Start to Finish with TrustArc Solutions
 
Microsoft Navigating Incident Response [EN].pdf
Microsoft Navigating Incident Response [EN].pdfMicrosoft Navigating Incident Response [EN].pdf
Microsoft Navigating Incident Response [EN].pdf
 
The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)The Science and Art of Cyber Incident Response (with Case Studies)
The Science and Art of Cyber Incident Response (with Case Studies)
 
005. Ethics, Privacy and Security
005. Ethics, Privacy and Security005. Ethics, Privacy and Security
005. Ethics, Privacy and Security
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 

More from Nada G.Youssef

مجلة 1
مجلة 1مجلة 1
مجلة 1
Nada G.Youssef
 
Chapter Tewlve
Chapter TewlveChapter Tewlve
Chapter Tewlve
Nada G.Youssef
 
Chapter Eleven
Chapter ElevenChapter Eleven
Chapter Eleven
Nada G.Youssef
 
Chapter Ten
Chapter TenChapter Ten
Chapter Ten
Nada G.Youssef
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
Nada G.Youssef
 
Chapter Eight
Chapter Eight Chapter Eight
Chapter Eight
Nada G.Youssef
 
Chapter Seven
Chapter SevenChapter Seven
Chapter Seven
Nada G.Youssef
 
Chapter Six
Chapter SixChapter Six
Chapter Six
Nada G.Youssef
 
Chapter Five
Chapter FiveChapter Five
Chapter Five
Nada G.Youssef
 
Chapter Four
Chapter FourChapter Four
Chapter Four
Nada G.Youssef
 
Chapter Three
Chapter ThreeChapter Three
Chapter Three
Nada G.Youssef
 
Chapter Two
Chapter TwoChapter Two
Chapter Two
Nada G.Youssef
 
Chapter one
Chapter oneChapter one
Chapter one
Nada G.Youssef
 
Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University
Nada G.Youssef
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
Nada G.Youssef
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
Nada G.Youssef
 

More from Nada G.Youssef (16)

مجلة 1
مجلة 1مجلة 1
مجلة 1
 
Chapter Tewlve
Chapter TewlveChapter Tewlve
Chapter Tewlve
 
Chapter Eleven
Chapter ElevenChapter Eleven
Chapter Eleven
 
Chapter Ten
Chapter TenChapter Ten
Chapter Ten
 
Chapter Nine
Chapter NineChapter Nine
Chapter Nine
 
Chapter Eight
Chapter Eight Chapter Eight
Chapter Eight
 
Chapter Seven
Chapter SevenChapter Seven
Chapter Seven
 
Chapter Six
Chapter SixChapter Six
Chapter Six
 
Chapter Five
Chapter FiveChapter Five
Chapter Five
 
Chapter Four
Chapter FourChapter Four
Chapter Four
 
Chapter Three
Chapter ThreeChapter Three
Chapter Three
 
Chapter Two
Chapter TwoChapter Two
Chapter Two
 
Chapter one
Chapter oneChapter one
Chapter one
 
Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University Preparatory Year of Saudi Electronic University
Preparatory Year of Saudi Electronic University
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 

Recently uploaded

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 

Recently uploaded (20)

How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 

Chapter 11: Information Security Incident Management

  • 1. Security Program and Policies Principles and Practices by Sari Stern Greene Chapter 11: Information Security Incident Management
  • 2. Copyright 2014 Pearson Education, Inc. 2 Objectives ❑ Prepare for an information security incident ❑ Identify an information security incident ❑ Recognize the stages in incident management ❑ Properly document an information security incident ❑ Understand federal and state data breach notification requirements ❑ Consider an incident from the perspective of the victim ❑ Create policies related to information security incident management
  • 3. Organizational Incident Response ■ Incidents drain resources and can be expensive ■ The right time to develop an Incident Response plan is before an incident occurs ■ Incident preparedness includes having policies, strategies, plans, and procedures Copyright 2014 Pearson Education, Inc. 3
  • 4. What Is an Incident? ■ Information security incident is an adverse event that threatens business security and/or disrupts service ■ Every organization should be familiar with and prepared to respond to the following core group of attacks ❑ Intentional unauthorized access or use ■ Occurs when an insider or an intruder gains logical or physical access without permission Copyright 2014 Pearson Education, Inc. 4
  • 5. What Is an Incident? Cont. ❑ Denial of service (DoS) attacks ■ Prevents or impairs the normal authorized functionality of the organization’s networks, systems, or applications ❑ Malware ■ Code that is covertly inserted into another program with the intent of gaining authorized access or causing harm ❑ Inappropriate usage ■ Occurs when authorized user performs actions that violate company policy, agreement, law, or regulation Copyright 2014 Pearson Education, Inc. 5
  • 6. Incident Severity Levels ■ Three severity levels ❑ Level 1 ■ Incidents that could cause significant harm ❑ Level 2 ■ Compromise of or unauthorized access to noncritical systems or information ❑ Level 3 ■ Situations that can be contained and resolved by the information system custodian, data/process owner, or HR personnel Copyright 2014 Pearson Education, Inc. 6
  • 7. How Are Incidents Reported? ■ Employees should be required to report all actual and suspected incidents ■ The employee who discovers an incident may not be trained or an IT technician ■ The culture of the company needs to incorporate this point so that employees don’t feel like they may be ridiculed if they are wrong Copyright 2014 Pearson Education, Inc. 7
  • 8. What Is an Incident Response Program ■ Composed of policies, plans, procedures, and people ■ An incident response plan (IRP) is a roadmap of reporting, responding, and recovery actions ■ Incident response procedures are detailed steps needed to implement the plan Copyright 2014 Pearson Education, Inc. 8
  • 9. What Is an Incident Response Program Cont. ■ Activities in the IRP ❑ Preparation ❑ Detection and investigation ❑ Initial response ❑ Containment ❑ Eradication and recovery ❑ Notification ❑ Closure and post-incident activity ❑ Documentation and evidence-handling requirements Copyright 2014 Pearson Education, Inc. 9
  • 10. Key Incident Management Personnel ■ Incident response coordinator (IRC) ❑ Central point of contact for all incidents ❑ Verifies and logs the incident ■ Designated incident handlers (DIHs) ❑ Senior-level personnel who have crisis management and communication skills, experience, and knowledge to handle an incident ■ Incident response team (IRT) ❑ Trained team of professionals that provide services through the incident lifecycle Copyright 2014 Pearson Education, Inc. 10
  • 11. Investigation and Evidence Handling ■ Incidents should be thoroughly documented ■ Depending on the incident it may be necessary to contact local, state, or federal law enforcement ❑ The IRT team should be acquainted with applicable law enforcement representatives ■ Incident handlers that perform forensic analysis should be familiar with forensic principles, guidelines, procedures, tools, and techniques Copyright 2014 Pearson Education, Inc. 11
  • 12. Investigation and Evidence Handling cont. ■ The process of digital forensic includes ❑ Collection ❑ Examination ❑ Analysis ❑ Reporting ■ Chain of custody applies to physical, digital, and forensic evidence ❑ It is used to prove that evidence has not been altered ■ Evidence should be stored in a secure location Copyright 2014 Pearson Education, Inc. 12
  • 13. Data Breach Notification Requirements ■ Federal requirements that address the protection of personally identifiable information (PII) ❑ Gramm-Leach- Bliley Act (GLBA) ❑ Health Information Technology for Economic and Clinical Data Act (HITECH) ❑ The Federal Information Security Management Act (FISMA) ❑ Federal Education Rights and Privacy Act (FERPA) Copyright 2014 Pearson Education, Inc. 13
  • 14. State Breach Notification Laws ■ 46 states, the District of Columbia, Puerto Rico, and the Virgin Islands have enacted notification laws designed to protect their residents ■ States with no security breach laws include ❑ Alabama ❑ Kentucky ❑ New Mexico ❑ South Dakota Copyright 2014 Pearson Education, Inc. 14
  • 15. Copyright 2014 Pearson Education, Inc. 15 Summary ■ An information security incident threatens business security and disrupts operations. Examples of incidents include unauthorized access, DoS attacks, malware, and inappropriate usage. ■ Companies should have an incident response plan that details how incidents should be handled and the roles and responsibilities of key personnel ■ In most situations data breaches of PII should be reported to the appropriate authority and affected parties notified