preview

Incident Response Research Paper

Decent Essays

. Traditional Incident Response 2.1 Incident Response Policy With the development of computer technology especial Internet skills, computer has become an important part of human life. On the same time, there are more and more attacks appearing. Hackers attempt to explore the vulnerability of the host to gain unauthorized access privilege and make unauthorized use. However, no all attack can be considered as an incident. Attacks can be classified as incidents only if they meet the following characteristics (Torres, Alissa. Aug, 2014): 1) Access information assets directly 2) Have a high confidence of success 3) Can threat the confidentiality, integrity, or availability of information assets In other word, only success attacks can be viewed as …show more content…

However, most advanced attack has the ability to hide their trails. The critical attack evidence may be removed when the attack is finished. Because incident response is a passive method, it gives attacker some time to hide themselves. Therefore, nowadays, traditional incident response policy is beginning to lose the data collection ability. (Alberto, Camilli and Isabel, Chagas. Apr 12,2007) 2.Attack information is the best material for further identification. However, as we said before, passive incident response policy cannot collection enough attack details, it causes the disability of the further identification. Worse identification means giving more time for attacker to hide the critical information which cause worse information collection. In sum, passive incident response may suffer a vicious cycle of identification and information collection. In my opinion, this vicious cycle is the biggest problem of the traditional incident response. 3. Most incident response do not have enough protection method. The main purpose of such incident response policy is reducing the attack damage and recovering the system. However, for some critical system such as programming database, financial support system, even a small damage may cause huge loss. For such systems, a better protection ability for incident response policy are extremely

Get Access