skip to main content
10.1145/947469.947496acmconferencesArticle/Chapter ViewAbstractPublication PagesuccsConference Proceedingsconference-collections
Article

Incident handling: an orderly response to unexpected events

Published:21 September 2003Publication History

ABSTRACT

Computer viruses, worms, denial of service attacks, equipment failures, vandalism, theft and other unwelcome events can send your computer services staff scrambling and cause a variety of problems for your user community. Even the least of these situations can be a distraction for your staff. The most severe can provide an unscheduled opportunity to test your disaster recovery procedure! How does your organization react to these events? Do you have a clearly-defined process in place to deal with unexpected incidents that threaten the security or operation of your systems.Eastern Connecticut State University is a public liberal arts institution with an enrollment of about 5000 students. Our Information Technology Services (ITS) group has implemented a process that provides a framework for an orderly response to unexpected events. The process is an adaptation of security incident response recommendations from the National Institute of Standards and Technology, Internet Security Systems, Inc. and other resources, which have been tailored for our institutional needs. At the core of the process is the Incident Response Team, which consists of a team manager, a technical leader and other ad hoc team members, depending on the nature and severity of the event. The team concept takes advantage of institutional expertise from law enforcement, human resources, audit, public relations, facilities management, legal services and other technical resources within ITS. The team manages information gathering, analysis, recovery and administrative functions to ensure a controlled, coordinated approach to incident response.Our presentation will focus on the phases of the incident response process and the role of the Incident Response Team. Flexibility, wise use of resources, effective communications and analytical skills are contributing factors to a successful response effort. We will draw upon our own experiences in discussing communication with the user community, severity level guidelines, evidence gathering, essential documentation, and lessons learned along the way.

References

  1. "CERT® /CC Statistics 1988-2003." Carnegie Mellon University Software Engineering Institute, CERT Coordination Center. <http://www.cert.org/stats/> (3 July 2003).Google ScholarGoogle Scholar
  2. Wack, John P. "Establishing a Computer Security Incident Response Capability" (Special Publication 800-3). NIST Computer Security Resource Center - CSD, November 1991. <http://csrc.nist.gov/publications/nistpubs/> (3 July 2003).Google ScholarGoogle Scholar
  3. "Computer Security Incident Response Planning: Preparing for the Inevitable." Internet Security Systems, Inc., 2001. <http://www.iss.net/support/documentation/whitepapers/technical.php> (3 July 2003).Google ScholarGoogle Scholar
  4. "Computer Security Incident Response Planning: Preparing for the Inevitable." Internet Security Systems, Inc., 2001. <http://www.iss.net/support/documentation/whitepapers/technical.php> (3 July 2003).Google ScholarGoogle Scholar
  5. Wada, Kent. "IT Security on Campus: A Fragile Equilibrium." Syllabus, Vol. 16, No. 10 (May 2003), 17--20.Google ScholarGoogle Scholar

Index Terms

  1. Incident handling: an orderly response to unexpected events

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            SIGUCCS '03: Proceedings of the 31st annual ACM SIGUCCS fall conference
            September 2003
            278 pages
            ISBN:158113665X
            DOI:10.1145/947469

            Copyright © 2003 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 21 September 2003

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • Article

            Acceptance Rates

            Overall Acceptance Rate123of170submissions,72%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader