Incident response requirements for distributed security information management systems

Author:

Mitropoulos Sarandis,Patsos Dimitrios,Douligeris Christos

Abstract

PurposeSecurity information management systems (SIMs) have been providing a unified distributed platform for the efficient management of security information produced by corresponding mechanisms within an organization. However, these systems currently lack the capability of producing and enforcing response policies, mainly due to their limited incident response (IR) functionality. This paper explores the nature of SIMs while proposing a set of requirements that could be satisfied by SIMs for the efficient and effective handling of security incidents.Design/methodology/approachThese requirements are presented in a high‐level architectural concept and include policy visualization, system intelligence to enable automated policy management, as well as, data mining elements for inspection, evaluation and enhancements of IR policies.FindingsA primitive mechanism that could guarantee the freshness and accuracy of state information that SIMs provide in order to launch solid response alarms and actions for a specific incident or a series of incidents is proposed, along with a role based access control administrative model (ARBAC) based on a corporate model for IR. Basic forensic and trace‐back concepts that should be integrated into SIMs in order to provide the rich picture of the IR puzzle are also examined.Practical implicationsThe support of policy compliance and validation tools to SIMs is also addressed.Originality/valueThe aforementioned properties could greatly assist in automating the IR capability within an organization.

Publisher

Emerald

Subject

Library and Information Sciences,Management Science and Operations Research,Business and International Management,Management Information Systems

Reference25 articles.

1. Aberdeen Group (2003), “Turning IT security into effective business risk management”, An Executive White Paper, available at: www.ca.com.

2. Arvidsson, J., Cormack, A., Demchenko, Y. and Meijer, J. (2001), “TERENA's incident object description and exchange format requirements”, RFC 3067, available at: www.ietf.org.

3. BSI (1999), Information Security Management, BS7799, Part 1: Code of Practice for Information Security Management, BSI, Bonn.

4. CERT Advisory CA‐2001‐26 (2001), Nimda Worm, available at: www.cert.org.

5. Chien, E. and Ször, P. (2002), “Blended attacks exploits, vulnerabilities and buffer‐overflow techniques in computer viruses”, paper presented at Virus Bulletin Conference, New Orleans, LA, September.

Cited by 4 articles. 订阅此论文施引文献 订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献

1. Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness;Computers & Security;2021-09

2. Expanding topological vulnerability analysis to intrusion detection through the incident response intelligence system;Information Management & Computer Security;2010-10-12

3. Digital Forensic Investigations: A New Frontier for Informing Systems;Information Systems: People, Organizations, Institutions, and Technologies;2009

4. Cyber-Crime Investigations: Complex Collaborative Decision Making;2008 Third International Annual Workshop on Digital Forensics and Incident Analysis;2008-10

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3