Incident Management Guide: Ways to categorize Incidents

Based on Type of Attack: 

  1. Malware : Malicious code has been successfully  logged into business infrastructure

  2. Unauthorized access (user/admin/other privilege escalations) : Any privilege escalations or access gained which should otherwise be denied to subject

  3. Phishing or Social Engineering tactics : Abuse of mostly employee or other which exploits human behavior by social engineering tactics,phishing mails etc

  4. Resource mis-configuration : Any resource not securely devices as per policies with appropriate measures

  5. Data breach : A super critical scenario, where sensitive data has been leaked.

  6. APT (Advanced Persistent Threat) : A targeted attack in which various techniques may be used to breach security infrastructure

  7. Resource abuse or DOS/DDOS : Denial of Business Services due to excess traffic, once again a targeted attack

  8. False alarms : These are the false-positives, most solutions render such time to time. As it is not actually an incident, it should be classified as separate
  9. Internal Exercises or Red Team Activity : Internal exercises by the CIRT(Computer Incidence Reponse Team) to test the security infrastructure. Red Team attacks are a group of white hat hackers who test your business security.

  10. Others : Some further classification may be done based on other common security issues faced by business.In general, the various varied attacks can be classified into this.

Based on Type of Activities: 

  1. Forensics : Preservation of evidence and tracking incident origin
  2. Local IR 

http://www.sans.org/reading-room/whitepapers/incident/incident-response-fight-35342

http://www.bu.edu/tech/services/security/services/incidents/reporting/types/

Votes: 0
E-mail me when people leave their comments –

Community Head, CISO Platform

You need to be a member of CISO Platform to add comments!

Join CISO Platform

Join The Community Discussion

CISO Platform

A global community of 5K+ Senior IT Security executives and 40K+ subscribers with the vision of meaningful collaboration, knowledge, and intelligence sharing to fight the growing cyber security threats.

Join CISO Community Share Your Knowledge (Post A Blog)
 

 

 

Atlanta Chapter Meet: Build the Pen Test Maturity Model (Virtual Session)

  • Description:

    The Atlanta Pen Test Chapter has officially begun and is now actively underway.

    Atlanta CISOs and security teams have kicked off Pen Test Chapter #1 (Virtual), an ongoing working series focused on drafting Pen Test Maturity Model v0.1, designed for an intel-led, exploit-validated, and AI-assisted security reality. The chapter was announced at …

  • Created by: Biswajit Banerjee
  • Tags: ciso, pen testing, red team, security leadership