Abstract
What should you do? A hacker has penetrated your network and turned a server into a bot. You have a choice of closing the firewall down, closing the inner network down, closing the server down, or keeping everything up. Except the last, each of these might stymie the attacker, but what is it also doing to your organization’s business?
Keywords
- Internet Service Provider
- Social Engineering
- Security Incident
- Information Security Manager
- Forensic Expert
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Johnston R (2011) Security maxims. http://www.ne.anl.gov/capabilities/vat. Accessed 20 March 2011
2014 cost of data breach study: United States. May 2014. Ponemon Institute LLC, Traverse City, Michigan
Verizon (2013) Verizon 2013 data breach investigations report. http://www.verizonenterprise.com/DBIR/2013. Accessed 20 Oct 2013
ISACA (2011) CISM® review manual 2012. ISACA, Arlington Heights, IL, pp 221–227
Cichonski P, Millar T, Grance T, Skarfone K (2012) NIST special publication 800-61 Rev 2 computer security incident handling guide. National Institute of Standards and Technology, Gaithersburg MD, August 2012
Ponemon (2013) Cost of data breach study: United States. May 2013. Pomenon Institute LLC, Traverse City, Michigan, pp 1–22
Murdoch D (2014) Blue team handbook: incident response edition, v. 2.0. www.vmit.com
SANS (2013) Critical controls for effective cyber defense, version 4.1, March, 2013. www.sans.org
Payment Card Industry (2013) Requirements and security assessment procedures, ver. 3.0, November 2013. www.pcisecuritystandards.org
Gibson D (2011) Managing risk in information systems. Jones & Bartlett Learning, Burlington, MA, pp 392–418
Thompson L (2013) Privacy: the tidal waves of the future. In: ISACA chapter meeting, Rosemont IL, 13 December 2013
Brelsford E (2013) 2014: a cyber odyssey. In: ISACA Chicago chapter meeting, Rosemont IL, 13 December 2013
National Conference of State Legislatures (2014) Security breach notification laws. http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx. Accessed 20 Aug 2014
Walker M (2012) All-in-one CEHTM certified ethical hacker exam guide. McGraw-Hill Co., New York, NY
ISACA (2010) CISA review manual 2011. ISACA, Arlington Heights, IL, pp 379–381
Ali KM (2012) Digital forensics: best practices and managerial implications. In: 2012 fourth international conf. on computational intelligence, communication systems and networks, IEEE Computer Society, http://ieeexplore.ieee.org, pp 196–199
Brown CLT (2006) Computer evidence: collection & preservation. Charles River Media, Newton Centre, MA, pp 16–17, 28
Cowen D (2013) Computer forensics: InfoSec pro guide. McGraw-Hill Co., New York, NY, pp 257–282
Grama JL (2015) Legal issues in information security, 2nd edn. Jones & Bartlett Learning, Burlington MA, pp 461–488
Philipp A, Cowen D, Davis C (2010) Hacking exposedTM computer forensics, 2nd edn. McGraw-Hill Co., New York, NY, pp 341–368
Giles S (2012) Managing fraud risk: a practical guide for directors and managers. Wiley, Chichester, West Sussex, England, pp 255–293
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Lincke, S. (2015). Planning for Incident Response. In: Security Planning. Springer, Cham. https://doi.org/10.1007/978-3-319-16027-6_11
Download citation
DOI: https://doi.org/10.1007/978-3-319-16027-6_11
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-16026-9
Online ISBN: 978-3-319-16027-6
eBook Packages: Computer ScienceComputer Science (R0)