Approach for Handling Cyber Security Incidents in an Organisation

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2018 by IJETT Journal
Volume-56 Number-1
Year of Publication : 2018
Authors : Nishant Mehta, Dr.Sonali Patil
DOI :  10.14445/22315381/IJETT-V56P207

Citation 

Nishant Mehta, Dr.Sonali Patil "Approach for Handling Cyber Security Incidents in an Organisation", International Journal of Engineering Trends and Technology (IJETT), V56(1),37-42 February 2018. ISSN:2231-5381. www.ijettjournal.org. published by seventh sense research group

Abstract
Criminals and nation states are increasingly attacking the technology assets of individuals, organisations and governments, stealing and selling valuable information, and in an alarming trend, paralysing critical infrastructure. So handling and responding to such computer security incidents has become an important part of information technology programs due to growth in digitalization of today’s world. To carry out incident response into any organisation requires substantial planning and resources. In this paper, the focus will be on handling variety of incidents which occur in an organisation.

Reference
[1] I. G. Jason Creasey, "Cyber Security Incident Response Guide," 11 2014. [Online]. Available: https://www.crest-approved.org/wp-content/uploads/2014/11/CSIR-Procurement-Guide.pdf.
[2] T. M. T. G. K. S. Paul Cichonski, "Computer Security Incident Handling Guide," [Online]. Available: http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf.
[3] C. Terrill, "How To Plan For Security Incident Response," 31 May 2017. [Online]. Available: https://www.forbes.com/sites/christieterrill/2017/05/31/how-to-plan-for-security-incident-response/#47c07e695bc8.
[4] M. Rouse, "Incident response plan," [Online]. Available: http://searchsecurity.techtarget.com/definition/incident-response-plan-IRP.
[5] J. B. Tucker Bailey, "Ten Steps to Planning an Effective Cyber-Incident Response," 1 July 2013. [Online]. Available: https://hbr.org/2013/07/ten-steps-to-planning-an-effect.
[6] "Types of Cyber Security Breaches – What are the Most Common?," City business solution, 23 September 2016. [Online]. Available: http://www.cbsit.co.uk/2016/09/types-cyber-security-breaches-common/.
[7] T. Campbell, "An Introduction to the Computer Security Incident Response Team (CSIRT)," 2003. [Online]. Available: https://cyber-defense.sans.org/resources/papers/gsec/introduction-computer-security-incident-response-106281.
[8] Symentec, "Internet Security Threat Report," April 2016. [Online]. Available: https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdf.
[9] Cyber Security Coalition, "Cyber Security Incident Management Guide," October 2014. [Online]. Available: https://www.cybersecuritycoalition.be/content/uploads/cybersecurity-incident-management-guide-EN.pdf.

keywords
Incident response, phishing, ransomware, malware