Incident Response Plan

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 171 Experts worldwide ranked by ideXlab platform

Shaun Aghili - One of the best experts on this subject based on the ideXlab platform.

  • An Incident Handling Guide for Small Organizations in the Hospitality Sector
    Trends and Advances in Information Systems and Technologies, 2018
    Co-Authors: Oluwadamilola Ogunyebi, Bobby Swar, Shaun Aghili
    Abstract:

    Security threats to small organizations are on the rise and many small organizations do not have the aptitude to address and properly responds to these Incidents within their organizations. According to a 2016 Ponemon Institute survey of 600 small businesses, fifty percent (50%) had experienced a data breach and fifty-five percent (55%) had experienced a cyber attack in the past twelve months. Having an Incident Response Plan is the most noteworthy cost-saving measure. The 2017 IBM and Ponemon Study found that organizations who can contain a breach in less than 30 days can save about $1 million. Hence, a small organization without an Incident Response Plan is very likely to face great reputational damage and financial losses. The research methodology reviews current Incident Response frameworks, identifies relevant Incident Response guidelines and tailors the current and relevant frameworks into a small business-centric Incident Response guide that tackles threats the small hotels and casinos face.

  • WorldCIST (1) - An Incident Handling Guide for Small Organizations in the Hospitality Sector
    Advances in Intelligent Systems and Computing, 2018
    Co-Authors: Oluwadamilola Ogunyebi, Bobby Swar, Shaun Aghili
    Abstract:

    Security threats to small organizations are on the rise and many small organizations do not have the aptitude to address and properly responds to these Incidents within their organizations. According to a 2016 Ponemon Institute survey of 600 small businesses, fifty percent (50%) had experienced a data breach and fifty-five percent (55%) had experienced a cyber attack in the past twelve months. Having an Incident Response Plan is the most noteworthy cost-saving measure. The 2017 IBM and Ponemon Study found that organizations who can contain a breach in less than 30 days can save about $1 million. Hence, a small organization without an Incident Response Plan is very likely to face great reputational damage and financial losses. The research methodology reviews current Incident Response frameworks, identifies relevant Incident Response guidelines and tailors the current and relevant frameworks into a small business-centric Incident Response guide that tackles threats the small hotels and casinos face.

J.y. Pan - One of the best experts on this subject based on the ideXlab platform.

  • An agent-based model to simulate coordinated Response to malware outbreak within an organisation
    International Journal of Information and Computer Security, 2012
    Co-Authors: J.y. Pan, Chun Che Fung
    Abstract:

    Malware is a major threat to organisations. It affects business continuity and induces risks to organisations. Current anti-malware solutions are challenged to keep the risks at bay. When a malware manages to penetrate an organisation's defences, there is a need to quickly contain the malware and to keep control over the organisation's IT assets before the risk escalates. In such Incident, Incident responders need to effectively carry out their containment Plan. An ineffective containment Plan will induce greater risks. Such infiltration can spread like a biological epidemic outbreak. These epidemic-like outbreaks can be modelled using mathematical models. However there are no models to assess the effectiveness of Incident Response Plan. Additionally, there are many variable considerations that the Incident Response Plan would need to factor in. This research paper proposes the use of an agent-based model to model containment Response Plan to minimise the impact of a malware outbreak.

  • Fighting Fire with Fire - a Pre-emptive approach to Restore Control over IT Assets from Malware Infection
    2012
    Co-Authors: J.y. Pan
    Abstract:

    Malware is a major threat as they induce multiple risks to infected organizations. Current Anti-Malware solutions meant to keep Malware away are challenged on how to keep the risks at bay effectively. When a Malware manages to penetrate an organization’s defences, there is a need to effectively contain the Malware and retain control over the organization’s IT assets before the risk escalates. In Response, Malware Remediation is supposed to contain the effects of the Malware infiltration or outbreak. However Incident Responders face many challenges to contain the malice. One challenge is the logistics of how to coordinate a distributed and timely containment. Another is the need of an effective technique to defunct the Malware as they are able to overcome conventional countermeasures. The final challenge is how to maintain the level of effectiveness of the containment tools in the face of self-preservation attacks by the Malware. This research study evaluates the use of Malware techniques to address the three challenges as a part of Malware Remediation in order to restore control over the IT assets back to the organization. In this thesis, the first proposition to the challenge of coordinating a distributed Incident Response Plan is to use the distributed and coordinated characteristics of a command and control botnet. In order to validate this proposition, an agent based simulation model was developed to show that a good (non-malicious) botnet with its distributed and coordinated containment approach will result in faster Malware containment and reduce the effects of a Malware outbreak compared to conventional manual containment techniques. The proposed solution to the second challenge is to use the offensive techniques used by Malware to defunct the targeted Malware. The evaluation is done through three experiments using three different offensive techniques against live Malware. One of the three experiments involved a smartphone Malware as this form of Malware is becoming increasingly prevalent in recent times. All three experiments showed that offensive techniques could effectively defunct the targeted Malware in the infected devices. The proposition to the final challenge is to adopt Malware resilient designs. The latter is used by Malware to protect themselves against Anti-Malware solutions and attempts to defunct them. The proposal is evaluated by conducting three experiments where a custom developed application that incorporated Malware resilience designs was attacked using Malware offensive techniques. All three experiments demonstrated that Malware resilient designs could aid Malware Remediation tool developers or Anti-Malware solution developers to protect their products against self-preservation attacks of Malware. In order to facilitate the adoption of the three research proposals by Incident Responders, the last proposition in this thesis is to package the knowledge of using Malware techniques for Malware Remediation into Malware Remediation patterns. The latter uses a pattern template derived from common security pedagogical patterns. Samples of the Malware like Malware Remediation patterns are included in the thesis. The thesis concludes with a consideration into future research directions with respect to all the research proposals mentioned in the study.

Oluwadamilola Ogunyebi - One of the best experts on this subject based on the ideXlab platform.

  • An Incident Handling Guide for Small Organizations in the Hospitality Sector
    Trends and Advances in Information Systems and Technologies, 2018
    Co-Authors: Oluwadamilola Ogunyebi, Bobby Swar, Shaun Aghili
    Abstract:

    Security threats to small organizations are on the rise and many small organizations do not have the aptitude to address and properly responds to these Incidents within their organizations. According to a 2016 Ponemon Institute survey of 600 small businesses, fifty percent (50%) had experienced a data breach and fifty-five percent (55%) had experienced a cyber attack in the past twelve months. Having an Incident Response Plan is the most noteworthy cost-saving measure. The 2017 IBM and Ponemon Study found that organizations who can contain a breach in less than 30 days can save about $1 million. Hence, a small organization without an Incident Response Plan is very likely to face great reputational damage and financial losses. The research methodology reviews current Incident Response frameworks, identifies relevant Incident Response guidelines and tailors the current and relevant frameworks into a small business-centric Incident Response guide that tackles threats the small hotels and casinos face.

  • WorldCIST (1) - An Incident Handling Guide for Small Organizations in the Hospitality Sector
    Advances in Intelligent Systems and Computing, 2018
    Co-Authors: Oluwadamilola Ogunyebi, Bobby Swar, Shaun Aghili
    Abstract:

    Security threats to small organizations are on the rise and many small organizations do not have the aptitude to address and properly responds to these Incidents within their organizations. According to a 2016 Ponemon Institute survey of 600 small businesses, fifty percent (50%) had experienced a data breach and fifty-five percent (55%) had experienced a cyber attack in the past twelve months. Having an Incident Response Plan is the most noteworthy cost-saving measure. The 2017 IBM and Ponemon Study found that organizations who can contain a breach in less than 30 days can save about $1 million. Hence, a small organization without an Incident Response Plan is very likely to face great reputational damage and financial losses. The research methodology reviews current Incident Response frameworks, identifies relevant Incident Response guidelines and tailors the current and relevant frameworks into a small business-centric Incident Response guide that tackles threats the small hotels and casinos face.

Eric C. Thompson - One of the best experts on this subject based on the ideXlab platform.

  • The Incident Response Strategy
    Cybersecurity Incident Response, 2018
    Co-Authors: Eric C. Thompson
    Abstract:

    The Incident Response Plan forms the blueprint and strategy for responding to events and Incidents. It contains the purpose, scope, definitions, and elements of Incident Response. Roles and responsibilities, definitions and escalation steps are common elements addressed in the Incident Response Plan. The purpose presents the team with the “why” behind the Plan. Why does the cybersecurity team care about Planning for events and Incidents? And why will time and money be invested in improving the entity’s ability to successfully respond to Incidents? The scope of the Plan highlights the authorization given the Incident Response team to take necessary steps when dealing with events. Taking systems offline until confirmation that nothing malicious occurred will not be popular if business operations are interrupted. Roles and responsibilities dictate who is on the Response team and how he or she is expected to act when events are investigated. Definitions are important as well. What is an event, Incident, or breach? Outlining these in the Plan takes the guesswork and, it is hoped, the debate out of the process. This is particularly important when events are present. Debating these definitions in the early stages wastes precious time.

  • Cyber Risks and the Attack Life Cycle
    Cybersecurity Incident Response, 2018
    Co-Authors: Eric C. Thompson
    Abstract:

    Preparing to handle Incidents requires thoughtful Planning—Planning beyond creating an Incident Response Plan, playbooks, and annual or semiannual testing. With limited time and resources, it makes sense to focus attention on areas in which cybersecurity events are likely to occur. Knowing where to focus is derived by answering the following questions:What risks invite attackers into the network?What attack vectors are likely to be used?

Chun Che Fung - One of the best experts on this subject based on the ideXlab platform.

  • An agent-based model to simulate coordinated Response to malware outbreak within an organisation
    International Journal of Information and Computer Security, 2012
    Co-Authors: J.y. Pan, Chun Che Fung
    Abstract:

    Malware is a major threat to organisations. It affects business continuity and induces risks to organisations. Current anti-malware solutions are challenged to keep the risks at bay. When a malware manages to penetrate an organisation's defences, there is a need to quickly contain the malware and to keep control over the organisation's IT assets before the risk escalates. In such Incident, Incident responders need to effectively carry out their containment Plan. An ineffective containment Plan will induce greater risks. Such infiltration can spread like a biological epidemic outbreak. These epidemic-like outbreaks can be modelled using mathematical models. However there are no models to assess the effectiveness of Incident Response Plan. Additionally, there are many variable considerations that the Incident Response Plan would need to factor in. This research paper proposes the use of an agent-based model to model containment Response Plan to minimise the impact of a malware outbreak.