Abstract
When masquerader tries to cheat online user by applying a mixture of tricks for luring the user to share personal information, it results in a phishing attack. Phishing is very crucial kind of attack which usually happens through social sites or frequently visited websites by the user. Incident or event handling is similar to emergency medicine. The caregiver tends to be under pressure, and mistakes can be very costly. After the occurrence of incidence, users have to face other information robberies. Secure Incident Handling is the need of tomorrow’s wireless cyber world. This chapter elaborates different cyber security aspects for Incident Handling and Phishing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alteren B (1999) Implementation and evaluation of the safety element method at four mining sites. Saf Sci 3:231–264
British Columbia Institute of Technology (BCIT) (2005) Industrial security incident database reporting form
Line MB, Albrechtsen E, Jaatun MG, Tøndel IA, Johnsen SO, Longva OH, Wærø I (2008) A structured approach to incident response management in the oil and gas industry. In: Proceedings of the 3rd international workshop on critical information infrastructures security, CRITIS’08
Northcutt S (2003) Computer security incident handling—an action plan for dealing with intrusions, cyber-theft, and other security-related events, version 2.3.1, Mar 2003
Scarfone K, Grance T, Masone K (2008) Computer security incident handling guide. National Institute of Standards and Technology
The Government of the Hong Kong Special Administrative Region (2012) Information security incident handling guidelines, version 5.0, Sept 2012
United States Government Accountability Office (2014) Information security-agencies need to improve cyber incident response practices, report to congressional requesters, Apr 2014
U.S. Department of Justice (2013) Incident response procedures for data breaches, U.S. Department of Justice Instruction 0900.00.01, 6 Aug 2013
West-Brown MJ, Stikvoort D, Kossakowski KP, Killcrece G, Ruefle R, Zajicek M (2003) Handbook for computer security incident response teams (CSIRTs)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Prasad, R., Rohokale, V. (2020). Secure Incident Handling. In: Cyber Security: The Lifeline of Information and Communication Technology. Springer Series in Wireless Technology. Springer, Cham. https://doi.org/10.1007/978-3-030-31703-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-030-31703-4_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-31702-7
Online ISBN: 978-3-030-31703-4
eBook Packages: EngineeringEngineering (R0)