- Main
- Computers - Security
- Cyber Security Incident Management...
Cyber Security Incident Management Guide
Centre For Cyber Security Belgium¿Qué tanto le ha gustado este libro?
¿De qué calidad es el archivo descargado?
Descargue el libro para evaluar su calidad
¿Cuál es la calidad de los archivos descargados?
This Guide aims to draw attention to the importance of planning how to manage a cyber security incident ahead of time.
Cyber security incident management is not a linear process; it’s a cycle that consists of a preparation phase, an incident detection phase and a phase of incident containment, mitigation and recovery. The final phase consists of drawing lessons from the incident in order to improve the process and prepare for future incidents. During this cycle communication with both internal and external stakeholders is of critical importance.
Many organisations may not have the necessary in house expertise and skills to respond adequately to a cyber security incident. When they are facing an incident, they may need to call upon experts to contain the incident and/or to carry out forensic investigations. This does not mean that they cannot do anything themselves. On the contrary, there are a lot of things that can and should be done before an actual incident occurs.
Drawing up an organisation’s cyber security incident response plan is an important first step of cyber security incident management. It is also crucial that top management validates this plan and is involved in every step of the cyber security incident management cycle.
The following elements should be included in the cyber security incident response plan:
• Identification of the assets that need to be protected;
• Identification and assignment of responsibilities in the context of
a cyber security incident;
• In house capabilities or contracts with external experts for
incident response and/or forensic investigation in case of an actual
cyber security incident;
• The equipment and technology to detect and address a cyber
security incident;
• A basic containment strategy: disconnect the systems immediately
in order to recover as quickly as possible? Or take the time to collect evidence against the cybercriminal who perpetrated the system?
• A communication strategy for both internal and external stakeholders and for authorities such as law enforcement and the Privacy Commission.
Finally organisations should consider taking out a cyber insurance. The cost of cyber security incidents often amounts to hundreds of thousands or even millions of euros. A reliable cyber insurance will cover at least a part of this cost.
Cyber security incident management is not a linear process; it’s a cycle that consists of a preparation phase, an incident detection phase and a phase of incident containment, mitigation and recovery. The final phase consists of drawing lessons from the incident in order to improve the process and prepare for future incidents. During this cycle communication with both internal and external stakeholders is of critical importance.
Many organisations may not have the necessary in house expertise and skills to respond adequately to a cyber security incident. When they are facing an incident, they may need to call upon experts to contain the incident and/or to carry out forensic investigations. This does not mean that they cannot do anything themselves. On the contrary, there are a lot of things that can and should be done before an actual incident occurs.
Drawing up an organisation’s cyber security incident response plan is an important first step of cyber security incident management. It is also crucial that top management validates this plan and is involved in every step of the cyber security incident management cycle.
The following elements should be included in the cyber security incident response plan:
• Identification of the assets that need to be protected;
• Identification and assignment of responsibilities in the context of
a cyber security incident;
• In house capabilities or contracts with external experts for
incident response and/or forensic investigation in case of an actual
cyber security incident;
• The equipment and technology to detect and address a cyber
security incident;
• A basic containment strategy: disconnect the systems immediately
in order to recover as quickly as possible? Or take the time to collect evidence against the cybercriminal who perpetrated the system?
• A communication strategy for both internal and external stakeholders and for authorities such as law enforcement and the Privacy Commission.
Finally organisations should consider taking out a cyber insurance. The cost of cyber security incidents often amounts to hundreds of thousands or even millions of euros. A reliable cyber insurance will cover at least a part of this cost.
Categorías:
Año:
2015
Editorial:
Centre For Cyber Security Belgium
Idioma:
english
Páginas:
38
Archivo:
PDF, 3.60 MB
Sus etiquetas:
IPFS:
CID , CID Blake2b
english, 2015
El archivo se enviará a su dirección de correo electrónico durante el transcurso de 1-5 minutos.
El archivo será enviado a tu cuenta de Telegram durante 1-5 minutos.
Atención: Asegúrate de haber vinculado tu cuenta al bot Z-Library de Telegram.
El archivo será enviado a tu dispositivo Kindle durante 1-5 minutos.
Nota: Ud. debe verificar cada libro que desea enviar a su Kindle. Revise su correo electrónico y encuentre un mensaje de verificación de Amazon Kindle Support.
Conversión a en curso
La conversión a ha fallado
Beneficios del estado Premium
- Envía a dispositivos de lectura
- Mayor límite de descargas
- Convierte archivos
- Más resultados de búsqueda
- Otros beneficios