Skip to main content

Part of the book series: Springer Series in Wireless Technology ((SSWT))

Abstract

When masquerader tries to cheat online user by applying a mixture of tricks for luring the user to share personal information, it results in a phishing attack. Phishing is very crucial kind of attack which usually happens through social sites or frequently visited websites by the user. Incident or event handling is similar to emergency medicine. The caregiver tends to be under pressure, and mistakes can be very costly. After the occurrence of incidence, users have to face other information robberies. Secure Incident Handling is the need of tomorrow’s wireless cyber world. This chapter elaborates different cyber security aspects for Incident Handling and Phishing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Alteren B (1999) Implementation and evaluation of the safety element method at four mining sites. Saf Sci 3:231–264

    Article  Google Scholar 

  • British Columbia Institute of Technology (BCIT) (2005) Industrial security incident database reporting form

    Google Scholar 

  • Line MB, Albrechtsen E, Jaatun MG, Tøndel IA, Johnsen SO, Longva OH, Wærø I (2008) A structured approach to incident response management in the oil and gas industry. In: Proceedings of the 3rd international workshop on critical information infrastructures security, CRITIS’08

    Google Scholar 

  • Northcutt S (2003) Computer security incident handling—an action plan for dealing with intrusions, cyber-theft, and other security-related events, version 2.3.1, Mar 2003

    Google Scholar 

  • Scarfone K, Grance T, Masone K (2008) Computer security incident handling guide. National Institute of Standards and Technology

    Google Scholar 

  • The Government of the Hong Kong Special Administrative Region (2012) Information security incident handling guidelines, version 5.0, Sept 2012

    Google Scholar 

  • United States Government Accountability Office (2014) Information security-agencies need to improve cyber incident response practices, report to congressional requesters, Apr 2014

    Google Scholar 

  • U.S. Department of Justice (2013) Incident response procedures for data breaches, U.S. Department of Justice Instruction 0900.00.01, 6 Aug 2013

    Google Scholar 

  • West-Brown MJ, Stikvoort D, Kossakowski KP, Killcrece G, Ruefle R, Zajicek M (2003) Handbook for computer security incident response teams (CSIRTs)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ramjee Prasad .

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Prasad, R., Rohokale, V. (2020). Secure Incident Handling. In: Cyber Security: The Lifeline of Information and Communication Technology. Springer Series in Wireless Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-31703-4_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-31703-4_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-31702-7

  • Online ISBN: 978-3-030-31703-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics