10 Deadly Sins in Incident Handling
10 Deadly Sins in Incident Handling
10 Deadly Sins in Incident Handling
1. Introduction
Risks are inherent to the Internet environment. The security threat profile of cyber
space in general, has increased over the past several years. Threats have become
more sophisticated, frequent and damaging. Cybercrime has become a key
component for organized crime. Cybercriminals take advantage of system and
network vulnerabilities by probing, intruding, and attacking to damage, alter or steal
information. The type of chaos caused by cyber-attacks includes denial of service,
unauthorized intrusions, virus, Trojan attacks and malicious mails. Organizations do
take preventive measures such as proper authorization and encryption mechanisms,
regular updates, anti-virus solutions and user awareness. Of Course, it is not
possible to prevent all security incidents. Hackers manage to find vulnerabilities in
security products and in the network infrastructure. Therefore, the response, better
known as incident handling, plays a major role in network defense.
1.1 Incident Handling
Any unusual activity in a system or network may be cause for alarm. For
example, an employee may find an anomaly in the functioning of an application,
or an intrusion detection tool may indicate a suspicious activity in the network.
These unusual activities are better known as events. These are they types of
events that may lead to a security incident.
Incidents are interruptions caused by adverse events, which result in any
violation of standard security policies. Adverse events such as unauthorized
access, system crash, and malicious code execution, denial of service and
unauthorized use of resources may result in a change in the normal functioning of
the computer systems and/or network.
An incident1 in the form of a virus attack, unauthorized access or an illegal activity
by an insider requires a specific, appropriate response. Incident handling refers
to set of procedures, measures and actions initiated to detect, analyze, respond,
prevent and limit further damage. Incident response should be an integral part of
any information security policy of an organization. The incident handling process
involves preparation, detection, analysis, containment, recovery and post-incident
ThewordIncidentusedinthispaperreferstocomputersecurityincidents.
Page | 1
Copyright EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
August 2010
Page | 2
Copyright EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
August 2010
FailuretodetectanactualattackistermedasFalsenegative
Falsepositivesrefertoeventswhereanalarmisraised,evenwhentherearenothreats
Page | 3
Copyright EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
August 2010
Copyright EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
August 2010
Page | 5
Copyright EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
August 2010
Copyright EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
August 2010
Page | 7
Copyright EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
August 2010
Prescribe checklist for dealing with commonly known cyber threats and
incidents.
3. Conclusion
Incident handling is crucial to prevent, detect and mitigate cyber threats in an organization.
Proper procedures must be in place for timely detection and resolution of an incident. An
appropriate incident handling plan must devise effective mechanisms to prevent cyber
threats. It is recommend that organizations incorporate incident handling as an integral part
of their information security policy to ensure minimum disruptions in business activities.
Page | 8
Copyright EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited