Rational Cybersecurity for Business 2020
DOI: 10.1007/978-1-4842-5952-8_9
|View full text |Cite
|
Sign up to set email alerts
|

Institute Resilience Through Detection, Response, and Recovery

Abstract: Cyber-resilience provides the ability to withstand and mitigate the impacts of information risks. Businesses can start to become more resilient by identifying their critical assets, top risk scenarios, and basic contingency plans. Then, by aligning technical security capabilities with IT operations and other business functions, security leaders can enable the business to detect suspicious or anomalous events earlier, and respond and recover faster from incidents such as breaches or system outages. Incident res… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…Typical IR frameworks are those proposed by NIST (Cichonski et al, 2012), CREST (Creasy, 2013), ISO (British Standards Institution, 2016) and Mitropoulos et al (2006), where each of these contains the following phases: preparation; detection and analysis; containment; eradication and recovery (which can constitute separate phases); and post incident review (or follow up). As such, while there are different IR models, which exhibit some minor differences, the archetypical IR Framework (Figure 1) entails that IR starts with the preparation phase, where the organisation considers the potential types, the impact, and the likelihood of breaches for their assets, and develops the relevant policies for each of these breaches (Blum, 2020). During detection and analysis, the organisation will assess the incident, and whether it constitutes an actual threat.…”
Section: The Incident Response Lifecycle and Current Challengesmentioning
confidence: 99%
“…Typical IR frameworks are those proposed by NIST (Cichonski et al, 2012), CREST (Creasy, 2013), ISO (British Standards Institution, 2016) and Mitropoulos et al (2006), where each of these contains the following phases: preparation; detection and analysis; containment; eradication and recovery (which can constitute separate phases); and post incident review (or follow up). As such, while there are different IR models, which exhibit some minor differences, the archetypical IR Framework (Figure 1) entails that IR starts with the preparation phase, where the organisation considers the potential types, the impact, and the likelihood of breaches for their assets, and develops the relevant policies for each of these breaches (Blum, 2020). During detection and analysis, the organisation will assess the incident, and whether it constitutes an actual threat.…”
Section: The Incident Response Lifecycle and Current Challengesmentioning
confidence: 99%
“…Although this model is conceptually correct, the authors did not specify the different tactics or the mandatory steps to accomplish this goal. More specific academic works, such as [41], have used this conceptual model, but also without deepening its tactics. Although this is a valid high-level approach, it does not specify what a SOC has to execute to achieve it.…”
Section: Techniques and Limitationsmentioning
confidence: 99%
“…Although this model is conceptually correct, the authors did not specify the different tactics or the mandatory steps to accomplish this goal. More specific academic works, such as [75], have used this conceptual model, but also without deepening its tactics. Although this is a valid high-level approach, it does not specify what a SOC has to execute to achieve it.…”
Section: Techniques and Limitationsmentioning
confidence: 99%