Skip to main content

Planning for Incident Response

  • Chapter
Security Planning
  • 2975 Accesses

Abstract

What should you do? A hacker has penetrated your network and turned a server into a bot. You have a choice of closing the firewall down, closing the inner network down, closing the server down, or keeping everything up. Except the last, each of these might stymie the attacker, but what is it also doing to your organization’s business?

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Johnston R (2011) Security maxims. http://www.ne.anl.gov/capabilities/vat. Accessed 20 March 2011

  2. 2014 cost of data breach study: United States. May 2014. Ponemon Institute LLC, Traverse City, Michigan

    Google Scholar 

  3. Verizon (2013) Verizon 2013 data breach investigations report. http://www.verizonenterprise.com/DBIR/2013. Accessed 20 Oct 2013

  4. ISACA (2011) CISM® review manual 2012. ISACA, Arlington Heights, IL, pp 221–227

    Google Scholar 

  5. Cichonski P, Millar T, Grance T, Skarfone K (2012) NIST special publication 800-61 Rev 2 computer security incident handling guide. National Institute of Standards and Technology, Gaithersburg MD, August 2012

    Google Scholar 

  6. Ponemon (2013) Cost of data breach study: United States. May 2013. Pomenon Institute LLC, Traverse City, Michigan, pp 1–22

    Google Scholar 

  7. Murdoch D (2014) Blue team handbook: incident response edition, v. 2.0. www.vmit.com

  8. SANS (2013) Critical controls for effective cyber defense, version 4.1, March, 2013. www.sans.org

  9. Payment Card Industry (2013) Requirements and security assessment procedures, ver. 3.0, November 2013. www.pcisecuritystandards.org

  10. Gibson D (2011) Managing risk in information systems. Jones & Bartlett Learning, Burlington, MA, pp 392–418

    Google Scholar 

  11. Thompson L (2013) Privacy: the tidal waves of the future. In: ISACA chapter meeting, Rosemont IL, 13 December 2013

    Google Scholar 

  12. Brelsford E (2013) 2014: a cyber odyssey. In: ISACA Chicago chapter meeting, Rosemont IL, 13 December 2013

    Google Scholar 

  13. National Conference of State Legislatures (2014) Security breach notification laws. http://www.ncsl.org/research/telecommunications-and-information-technology/security-breach-notification-laws.aspx. Accessed 20 Aug 2014

  14. Walker M (2012) All-in-one CEHTM certified ethical hacker exam guide. McGraw-Hill Co., New York, NY

    Google Scholar 

  15. ISACA (2010) CISA review manual 2011. ISACA, Arlington Heights, IL, pp 379–381

    Google Scholar 

  16. Ali KM (2012) Digital forensics: best practices and managerial implications. In: 2012 fourth international conf. on computational intelligence, communication systems and networks, IEEE Computer Society, http://ieeexplore.ieee.org, pp 196–199

  17. Brown CLT (2006) Computer evidence: collection & preservation. Charles River Media, Newton Centre, MA, pp 16–17, 28

    Google Scholar 

  18. Cowen D (2013) Computer forensics: InfoSec pro guide. McGraw-Hill Co., New York, NY, pp 257–282

    Google Scholar 

  19. Grama JL (2015) Legal issues in information security, 2nd edn. Jones & Bartlett Learning, Burlington MA, pp 461–488

    Google Scholar 

  20. Philipp A, Cowen D, Davis C (2010) Hacking exposedTM computer forensics, 2nd edn. McGraw-Hill Co., New York, NY, pp 341–368

    Google Scholar 

  21. Giles S (2012) Managing fraud risk: a practical guide for directors and managers. Wiley, Chichester, West Sussex, England, pp 255–293

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Lincke, S. (2015). Planning for Incident Response. In: Security Planning. Springer, Cham. https://doi.org/10.1007/978-3-319-16027-6_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-16027-6_11

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-16026-9

  • Online ISBN: 978-3-319-16027-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics