Continuity Strategies
Continuity Strategies
Continuity Strategies
A Contingency plan is prepared by the organization to anticipate, react to, and recover from
events that threaten the security of information information assets in the organization and,
subsequently, to restore the organization to normal modes of business operations.
Incident response, disaster recovery, and business continuity planning are components of
contingency planning.
1. An incident response (IR) plan addresses the identification, classification, response, and
recovery from an incident.
2. A disaster recovery (DR) plan addresses the preparation for and recovery from a disaster,
whether natural or man-made.
3. A business continuity (BC) plan ensures that critical business functions continue if a
catastrophic incident or disaster occurs.
1. Incident Planning
Planning for an incident is the first step in the overall process of incident response
planning.
The planners should develop a set of documents that guide the actions of each involved
individual who reacts to and recovers from the incident.
These plans must be properly organized and stored to be available when and where needed,
and in a useful format.
2. Incident Detection
Incident Detection relies on either a human or automated system, which is often the help desk
staff, to identify an unusual occurrence and to classify it properly as an incident.
The mechanisms that could potentially detect an incident include intrusion detection systems
(both host-based and network based), virus detection software, systems administrators, and
even end users.
Once an attack is properly identified, the organization can effectively execute the
corresponding procedures from the IR plan. Thus, incident classification is the process of
examining a potential incident, or incident candidate, and determining whether or not the
candidate constitutes an actual incident.
Incident Indicators- There is a number of occurrences that could signal the presence of
an incident candidate.
Donald Pipkin, an IT security expert, identifies three categories of incident indicators:
Possible, Probable, and Definite Indicators.
Possible Indicators- There are 4 types of possible indicators of events ,they are,
1. Presence of unfamiliar files.
2. Presence or execution of unknown programs or processes.
3. Unusual consumption of computing resources
4. Unusual system crashes
Probable Indicators- The four types of probable indicators of incidents are
1. Activities at unexpected times.
2. Presence of new accounts
3. Reported attacks
4. Notification from IDS
Definite Indicators- The five types of definite indicators of incidents are
1. Use of Dormant accounts
2. Changes to logs
3. Presence of hacker tools
4. Notifications by partner or peer
5. Notification by hacker
3. Incident Reaction
It consists of actions outlined in the IRP that guide the organization in attempting to stop the
incident, mitigate the impact of the incident, and provide information for recovery from the
incident. These actions take place as soon as the incident itself is over.
In reacting to the incident there are a number of actions that must occur quickly, including
notification of key personnel and documentation of the incident. These must have been
prioritized and documented in the IRP for quick use in the heat of the moment.
4. Incident Recovery
The recovery process involves much more than the simple restoration of stolen, damaged, or
destroyed data files. It involves the following steps.
1. Identify the Vulnerabilities
2. Address the safeguards.
3. Evaluate monitoring capabilities
4. Restore the data from backups.
5. Restore the services and processes in use.
6. Continuously monitor the system
7. Restore the confidence of the members of the organization’s communities of interest.