Premium Essay

Incident Response Team Case Study

Submitted By
Words 997
Pages 4
An incident response team is responsible for protecting an organization’s network and data making sure that it is secure. This team also needs to be able to quickly act upon and respond to a threat or attack to reduce, prevent, and or minimize any damages or losses during an incident. Where does this process begin?
The first component of responding to an incident is identifying a trigger event or events that alert and information the response team to suspicious or malicious behavior or activity. This identification of a trigger needs to be done accurately to best prevent and resolve any possibility of a reoccurring attack, this allows for a more efficient and timely response to a threat.
A trigger could result from a number of different things. …show more content…
This type of attack can be detected in a network as a mass volume of requests from a single application. These high volume requests from a single host or application for network resources that usually is not requested or required for that application, is a good indicator that an attacker is scouting the surface prepping for an attack. However, these activities happen often throughout an organization’s business day so reports are generated from each department or from an assigned team at the end of a business day to be reviewed and isolate inconsistencies in the processes from the normal processes of activity. On the other hand it would be very inefficient for an organization to constantly be watching all of these processes that occur daily and hourly.
In addition to those triggers, any sign of malicious and infectious software should also be flagged as a trigger. Though many malware programs are very efficient and effective in detection malware and removing malware, however some malicious software are more evasive than others and are able to avoid these defenses; examples of these triggers include alerts and blocking based on IP events, communication with a suspicious host, and DNS requests all of these threats should be handled in a quick and timely manner to reduce damage or …show more content…
Once systems return to expected service levels, an incident response team can then go through post incident. This process involves the team reviewing the attack, gaining knowledge from the attack and are then able to better secure the network and data from future attacks. After recovery and post incident, the organization may pursue legal actions against the attacker which could be an individual or a group that attempted the attack. The team will also report their findings and resolutions to upper management, this includes how the threat or attack was eliminated, what changes were made to prevent future attacks from happening again, and if any information was gathered to pursue legal actions against the

Similar Documents

Premium Essay

Sec280 Week 6 Case Study

...SEC280 Week 6 Case Study Gem Infosys, a small software company, has decided to better secure its computer systems after a malware attack shut down its network operations for 2 full days. The organization uses a firewall, three file servers, two Web servers, one Windows 2008 Active Directory server for user access and authentication, ten PCs, and a broadband connection to the Internet. The management at Gem needs you to formulate an incident-response policy to reduce network down time if future incidents occur. Develop an incident-response policy that covers the development of an incident-response team, disaster-recovery processes, and business-continuity planning. Gem Infosys Incident Response Policy To ensure timely response to a network disruption, an Incident Response Team has been formed. This team comprises contacts in several departments throughout the organization. The following policy outlines who to contact and what steps to take in case of an incident involving network related tasks. Incident Response Team Contacts DUTIES TEAM MEMBERS EXTENSION Team Lead Edward Einright 7001 Network Analysts Dave Firuzio 7002 Paul Gerschadt 7003 Security Analysts Rob Jensen 7004 Natalie Pierson 7005 Legal Affairs Frank Saddich 7006 Public Affairs Michelle Davenport 7007 Duties Team members will establish and implement policies in the following areas: a) Worm response procedure b) Virus response procedure c)...

Words: 870 - Pages: 4

Premium Essay

Military

...Coordination between the Military and Civilian Organisations: Issues and Solutions The work described in this document has been undertaken by the Human Factors Integration Defence Technology Centre, part funded by the Human Capability Domain of the U.K. Ministry of Defence Scientific Research Programme. © BAE Systems 2009 The authors of this report have asserted their moral rights under the Copyright, Designs and Patents act, 1988, to be identified as the authors of this work. Reference ...........................................HFIDTC/2/WP3.1.4/3 Version.................................................................................2 Date............................................................... 19th May 2009 © BAE Systems 2009. Issued by Aerosystems International Ltd on behalf of the HFI DTC consortium. The HFI DTC consortium consists of Aerosystems International Ltd, Cranfield University, Lockheed Martin, MBDA, SEA, Brunel University, Southampton University and the University of Birmingham HFIDTC/2/WP3.1.4/3 Version 2/ 19th May 2009 Authors Paul Salmon Daniel Jenkins Neville Stanton Guy Walker Brunel University Brunel University Brunel University Brunel University ii HFIDTC/2/WP3.1.4/3 Version 2/ 19th May 2009 Contents 1 1.1 1.2 1.3 1.4 1.5 1.6 Executive Summary ................................................................................... 1 Background and reasoning behind the work ...................................................

Words: 16056 - Pages: 65

Premium Essay

Ethc232 Wk6 Case Study

...Case Study Week 6 Incident Response Policy First and foremost my name is XXXXXXXXX and I am the Senior Manager here at Gem Infosys. Here at Gem Infosys we are dedicated to protecting our organizations from attacks such as malware, adware, viruses and DDOS. Here at Gem Infosys we have also implemented some security protocols and a security policy for all our employees to adhere too as well. Under this incident response policy there will be the steps necessary to prepare, detect, contain and eradicate, recover, and reduce the network down time if any future incidents occur. The first thing we have to do is to determine the point of contact. Once that is determined, we will assemble an incident response team. The team will consist of a team leader, a network/security analyst, an internal and/or external subject matter expert, a legal counsel, a public affairs officer, and a security office contact. Once a team is assembled, the team will need to acquire the equipment necessary to detect, contain, and recover from an incident; establish the procedures and guidelines for the use of the equipment obtained; and train those who will use the equipment (Conklin, 2010). Once the suspected incident has occurred, the team must determine what type of incident has occurred, to ensure that it wasn’t a user error. All incidents will be handled as a possible security threat until they can determine whether it is or isn’t. Once the incident response team has determined that an incident most...

Words: 639 - Pages: 3

Free Essay

Conflict

...CASE –iv Conflict in close quarters Overview of the Case Study (3 slides) The case study was an experiment to study the dynamics of isolation in long-term space travel by a team of psychologists at Moscow's Institute for Biomedical Problems (IBMP). Within the confines of a replica Mir space station, three international researchers, including a Canadian, Japanese and Austrian participant were isolated with four Russian cosmonauts for 110 days. At the New Year's Eve party, the participants partook in the drinking of vodka, which was allowed by the Russian space agency. What evolved was a series of events which involved violence, sexual harassment, and questionable ethics. A violent fight erupted between two of the cosmonauts, which was resolved quickly. Later, the Russian commander aggressively kissed, twice, the only female participant, Judith Lapierre. All three of the international participants appealed to the IBMP regarding the Russians behaviour, requesting disciplinary action. The experiment ended in controversy as the Russians downplayed the kiss, saying it was a fleeting kiss and blaming an emotional female participant whilst Lapierre claimed sexual harassment. Thus, was it really sexual harassment or a stolen kiss? Or is the question here that the parties involved here had attached different meanings to the same incident. Cultural differences amongst the participants led to the conflict, which were exacerbated by the influence of alcohol. The Russians...

Words: 1900 - Pages: 8

Free Essay

Paper

...FBI Study Finds Active Shooter Incidents Increasing By: Amanda Vicinanzo, Senior Editor 10/22/2014 ( 9:40am) In partnership with Texas State University’s Advanced Law Enforcement Rapid Response Training Center, the FBI in 2014 initiated a study of active shooter incidents to provide law enforcement and first responders with data to help them better prevent, prepare for, respond and recover from future incidents.   The report, A Study of Active Shooter Incidents in the United States Between 2000 and 2013, evaluated 160 active shooter incidents, including those at Virginia Tech, Sandy Hook Elementary School, the US Holocaust Memorial Museum, Fort Hood, the Aurora (Colorado) Cinemark Century 16 movie theater, the Sikh Temple in Wisconsin, the Washington Navy Yard and numerous other tragic shootings.   Special Agent Katherine Schweit, who heads the FBI’s Active Shooter Initiative, says she hopes the study “demonstrates the need not only for enhanced preparation on the part of law enforcement and other first responders, but also for civilians to be engaged in discussions and training on decisions they’d have to make in an active shooter situation.”   The FBI emphasized that the report evaluates active shootings, a term more specific than “mass shootings,” which does not encompass all mass killings or shootings in public places. The FBI defines active shooters as “individuals actively engaged in killing or attempting to kill people in populated areas (excluding shootings...

Words: 6325 - Pages: 26

Premium Essay

Virus Attacks

...to continue essential functions if information technology support is interrupted.” On average, over 40% of businesses that don't have a disaster plan go out of business after a major loss. What Is Contingency Planning? The overall planning for unexpected events is called contingency planning (CP). CP is the process by which organizational planners position their organizations to prepare for, detect, react to, and recover from events that threaten the security of information resources and assets, both human and artificial. The main goal of CP is the restoration to normal modes of operation with minimum cost and disruption to normal business activities after an unexpected event. CP Components Incident response plan (IRP) focuses on immediate response to an incident. Disaster recovery plan (DRP) focuses on restoring operations at the primary site after disasters occur. Business continuity plan...

Words: 3573 - Pages: 15

Premium Essay

Business

...Carnegie Mellon University MATTHEW A. CRONIN George Mason University We clarify the construct of group learning, encouraging new directions for research. Definitions of group learning vary considerably across studies, making it difficult to systematically accumulate evidence. To reconcile disparate approaches, we first present a set of features for distinguishing group learning from other concepts. We then develop a framework for understanding group learning that focuses on learning’s basic processes at the group level of analysis: sharing, storage, and retrieval. By doing so, we define the construct space, identify gaps in current treatments of group learning, and illuminate new possibilities for measurement. • In an eight-person product development team, one member from Engineering learns a new method for three-dimensional graphing and starts using it in her rough product designs. As a result, the team’s development costs decrease. • Based on its experience with the Love Me cybervirus, a national internet security team agrees that, in the future, the team should wait to send out alerts until it has a tested fix to recommend. Seven weeks later, when the Me Too bug strikes, the team delays sending out an alert for an extra four hours while it develops a patch. This response is roundly criticized in the internet security community. Does either of these examples represent group learning? The answer is difficult to determine because the literature is so inconsistent about what...

Words: 13119 - Pages: 53

Premium Essay

Management

...required to write an email to your manager in response to an incident and develop an electronic presentation to communicate the strategic directions and objectives of your organization to potential employees in regards to a new initiative. As part of this task, you will need to write an email to your manager outlining an organizational response to the case study, including any changes to work practices that will be necessary to ensure a safe and productive work environment. In response to a further case study, you will need to develop a presentation to communicate strategic directions and objectives for use with a range of staff and stakeholders, i.e. a scripted PowerPoint presentation or a script to be spoken with a video presentation, etc. You will need to ensure that you have accurately identified the strategic objectives and mission of your organization, and are able to identify key roles and responsibilities for the realization of those strategic objectives, particularly in regard to the new work unit being established. You will need to ensure that the language and style of presentation you use is appropriate to the target audience (as per the case study). Your presentation will need to clearly state the expectations of the organization for the new work group as a team and individually. 1. Review case studies provided. 2. Case study 1: Write an email to your manager outlining the organizational response to this incident, including...

Words: 3293 - Pages: 14

Premium Essay

Macville

...required to write an email to your manager in response to an incident and develop an electronic presentation to communicate the strategic directions and objectives of your organization to potential employees in regards to a new initiative. As part of this task, you will need to write an email to your manager outlining an organizational response to the case study, including any changes to work practices that will be necessary to ensure a safe and productive work environment. In response to a further case study, you will need to develop a presentation to communicate strategic directions and objectives for use with a range of staff and stakeholders, i.e. a scripted PowerPoint presentation or a script to be spoken with a video presentation, etc. You will need to ensure that you have accurately identified the strategic objectives and mission of your organization, and are able to identify key roles and responsibilities for the realization of those strategic objectives, particularly in regard to the new work unit being established. You will need to ensure that the language and style of presentation you use is appropriate to the target audience (as per the case study). Your presentation will need to clearly state the expectations of the organization for the new work group as a team and individually. 1. Review case studies provided. 2. Case study 1: Write an email to your manager outlining the organizational response to this incident, including any changes to work practices...

Words: 3235 - Pages: 13

Premium Essay

Writing Essay Fema

...Fundamentals of Emergency Management Independent Study 230.a January 14, 2010 FEMA COURSE OVERVIEW Unit 1: Course Introduction Introduction How to Complete This Course Unit 1 Objectives Course Objectives Case Study: Tornado in Barneveld, Wisconsin Your Place in the Emergency Management System Case Study: Hazardous Chemical Release Activity: Where Do I Fit? Unit 2: Overview of the Principles of Emergency Management and the Integrated Emergency Management System Introduction and Unit Overview FEMA Mission and Purpose Response Authorities History Principles of Emergency Management Recent Changes to Emergency Planning Requirements Why an Integrated Emergency Management System? Emergency Management Concepts and Terms Partners in the Coordination Network Activity: Partners in the Coordination Network Emergency Management in Local Government Activity: Where Is Emergency Management in My Community? Unit 3: Incident Management Actions Introduction and Unit Overview Introduction to the Spectrum of Incident Management Actions Prevention Preparedness Response Activity: Response Operations Recovery Mitigation Unit 4: Roles of Key Participants Introduction and Unit Overview The Role of the Local Emergency Program Manager State Emergency Management Role How the Private Sector and Voluntary Organizations Assist Emergency Managers Federal Emergency Management Role The National Response Framework Activity: Emergency Management Partners ...

Words: 35531 - Pages: 143

Premium Essay

Cisco It

...Cisco IT Case Study Organizational Change and Advanced Services for Operational Success How Cisco IT Implemented Organizational Change and Advanced Services for Operational Success New organizational framework greatly improves operations. Given today’s pressing need to optimize IT services and resources while reducing costs and improving organizationwide productivity, the Cisco lifecycle methodology offers the framework needed to make operations more efficient and responsive. Cisco IT Network and Data Center Services (NDCS) changed from using a traditional organizational model to Cisco’s own lifecycle model, with substantial operations improvements across five different metrics. This case study describes Cisco IT’s internal infrastructure, a leading-edge enterprise IT environment that is among the largest and most complex in the world. “By moving from a traditional technology, silo-based organizational structure to a lifecycle-based model, we were able to improve our operational metrics considerably. Our number of cases decreased by approximately 60 percent, and our time-to-repair to get clients back up and running has decreased by almost 70 percent.” John Manville, Vice President, IT Network and Data Center Services, Cisco BACKGROUND An enterprise with 300 locations in 90 countries, Cisco has 46 data centers and server rooms supporting the 65,000-plus employees. Fourteen of the data centers/server rooms are production or customer-facing and 32 are used for product...

Words: 3737 - Pages: 15

Premium Essay

Organisation Behaviour

...An Analysis of Case Studies Prepared by Rafiqul Alam Khan Rakibul Haque Department of Finance Page 1 Dhaka, June 05, 2014 Acknowledgement All the praise and appreciation to Allah, the most merciful and beneficent who has enabled us to submit this humble work. We would like to express our special thanks and honour to our course teacher, Sonia Munmun, who guide us in every minute whenever we sought, and who showed us the right track to conduct the study. Finally, we would be happy if the findings of this study could make any contribution in the field of business efficiency. Department of Finance Page 2 Table of Content 7 Abstract Chapter 01: Context and Rationale Preludes: the General Scenario Rationale of the Study Objectives Methodology: Primary & Secondary Sources Limitation Chapter 02: Framework of Case Study Chapter: Foundations of Group Behavior Case Incident 1 Case Incident 2 Chapter: Understanding Work Teams Case Incident 1 Case Incident 2 Chapter 03: Conclusion & Recommendations Conclusion Findings References Department of Finance 8 8 9 9-10 10 11-14 15-17 17-19 20-21 22-24 25-28 29 30 30 Page 3 Abstract Organizational Behavior (OB) is the study and application of knowledge about how people, individuals, and groups act in organizations. It does this by taking a system approach. That is, it interprets people-organization relationships in terms of the whole person, whole group, whole organization...

Words: 5326 - Pages: 22

Premium Essay

Crisis Management

...Executive Summary In 2005, Bank for International Settlements (BIS) came up with 7 high-level principles on business continuity and was issued to various financial industry participants as guidelines. The 7 principles provide a comprehensive overview of the necessary steps for business continuity planning. Financial industry participants are required to develop respective business continuity planning in accordance to the 7 high-level principles. There are various incidents within the last decade that has resulted in major operational disruption to financial industry. However, with the guidance of the 7 high-level principles, most of the participants were able to cope with crisis well and survive through the crisis. In this report, several case studies were researched and commented on their business continuity planning. Subprime crisis which caused the collapse of Lehman Brothers has caused a significant stir in the financial industry. Many counterparties ended up with huge exposure and default due to the fall of Lehman Brothers. However, Euroclear was able to manage the crisis well after it activated its crisis management plan which has been developed before the crisis. Similarly, terrorist’s attack on New York World Trade Center has not only caused major security issues but has also significantly affecting the financial industry. Bank of America and Deutsche Bank were the direct victims of the terrorist attack. Both banks remained sound operation and survived through the...

Words: 2887 - Pages: 12

Premium Essay

Food Defense

...DEFENSE RESPONSE PLAN September 2006 This document was prepared by Kenadine Johnson and staff Montana Office of Public Instruction Helena, Montana FOOD SAFETY/FOOD DEFENSE RESPONSE PLAN TABLE OF CONTENTS ACRONYMS----------------------------------------------------------------------- 2-3 RESOURCES----------------------------------------------------------------------- 4 A listing of links and papers we used to help compile this document. ACKNOWLEDGEMENTS ------------------------------------------------------ 5 SECTION I: INTRODUCTION Foreword ---------------------------------------------------------------------------- 6 Introduction-------------------------------------------------------------------------- 7 Purpose------------------------------------------------------------------------------- 7 Goals---------------------------------------------------------------------------------- 7 SECTION II: SITUATIONS AND ASSUMPTIONS----------------------- 8-9 SECTION III: CONCEPT OF OPERATIONS A. Incident Identification---------------------------------------------------------- 10 B. Notification and Action Triggers--------------------------------------------- 10 C. Communication----------------------------------------------------------------- 11 D. Interstate Coordination--------------------------------------------------------- 11 E. Food Team----------------------------------------------------------------------- 12 F. Response Actions...

Words: 8970 - Pages: 36

Free Essay

Vbcr

...My name is Dermot Vibert. I work with Rio Tinto Japan. On March 11, 2011 I was in our office when we were hit by an extremely strong earthquake. Among the many issues we faced immediately after the earthquake was what would we do on the Monday morning when we had to supposedly return to the office and recommence business.   What caused this issue to arise and why is it important? B) Causes Identify the importance of the Causes to the organisation concerned. What Caused these Issues to arise? The reasons underlying the Issues will be explicit in the Causes identified. The earthquake in the afternoon of March 11 was, although it struck 520 kilometers from Tokyo, it was an extremely strong one for us in Tokyo. The buildings shook severely two or three times, and then many, many times thereafter because of the aftershocks. On at least two occasions we had to go under our desks with our helmets on and literally hold on to the legs of the tables. It was that strong. The earthquake knocked out a lot of the power system, and as a result the trains were not able to function normally, and because there was not enough power as well, things like traffic lights, lights in buildings, etc., all these things were affected. There were many unknowns such as what damage there really was in the Tokyo area, for how long would trains not be running, would there be adequate food in two or three days time, what was going to happen with fuel supply, because when we were watching on television,...

Words: 2253 - Pages: 10